fffff, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:57 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cuse\x00', 0x2, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x408c4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000002c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r2 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x2, 0x400000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000480)=[@mss={0x2, 0x4}], 0x1) ioctl$VIDIOC_SUBDEV_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f0000000240)={0x0, 0x2, 0x1, [], &(0x7f0000000200)}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/btrfs-control\x00', 0x20000, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x280400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f00000003c0)={0xa, 0x4, 0xfa00, {r4}}, 0xc) 03:24:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:24:58 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000002c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x400000, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000001380)={'broute\x00', 0x0, 0x3, 0x1000, [], 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000380)=""/4096}, &(0x7f0000000280)=0x78) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 03:24:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:58 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:58 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000002c0)={0x0, 0x81, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) [ 235.939612] FAT-fs (loop0): invalid media value (0x00) 03:24:58 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 235.968219] FAT-fs (loop0): Can't find a valid FAT filesystem 03:24:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:58 executing program 2: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x413, &(0x7f0000000000)=""/113) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x200}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:24:58 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2080, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000080)) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x8, 0x4}, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x6, 0x1000, 0xda}, &(0x7f0000000280)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0xc6f7}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0)=r3, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000002c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) r4 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x40001) ioctl$VT_ACTIVATE(r4, 0x5606, 0x9) 03:24:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:58 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 236.433550] ptrace attach of "/root/syz-executor.2"[11105] was attempted by "/root/syz-executor.2"[11107] 03:24:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:24:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45", 0xdf) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:58 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:58 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000002c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) flistxattr(r1, &(0x7f0000000380)=""/237, 0xed) 03:24:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x1, 0xfffffffffffffffd}}, 0x28) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) getresgid(&(0x7f00000002c0), &(0x7f0000000340)=0x0, &(0x7f0000000380)) sendmsg$unix(r1, &(0x7f00000003c0)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000100)="e8343afa13aa399d01c1a90ff6f77c92198b3113da8c8c782f56fa3c8867c4d791398fb260f16731d740f5d6aaa6d7b77350c63758a090f890180a893de9ab5a4a90f5d4a8795845da6b84438d3adb7221d112a0fef97de2c75a66f8de76a8b5807712cfd5fcaad5d24320929387d4bd2aed7ea985a1", 0x76}], 0x1, &(0x7f0000000580)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @rights={{0x34, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}}], 0x58, 0x20000000}, 0x10) 03:24:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0xb18d6047f98e6e3d}, 0x1c}}, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8040, 0x0) ioctl$SIOCAX25GETINFO(r2, 0x89ed, &(0x7f0000000040)) [ 236.776468] FAT-fs (loop0): invalid media value (0x00) [ 236.782347] FAT-fs (loop0): Can't find a valid FAT filesystem 03:24:59 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video1\x00', 0x2, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000002c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000200)={0x5, 0xd9f, 0x10001, 0x9, 0x8}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 03:24:59 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45", 0xdf) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:59 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000002c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000280)={0xa, &(0x7f0000000200)=[{}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000380)={r3, 0x2}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 03:24:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:24:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45", 0xdf) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'%at\x00', 0x19, 0x1, 0x1a8, [0x200005c0, 0x0, 0x0, 0x200005f0, 0x20000620], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x220) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'ip6gretap0\x00', {0x2, 0x4e21, @loopback}}) 03:24:59 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000200)={0x4, 0x1, 0x8, 'queue0\x00', 0x7fff}) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000002c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 03:24:59 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:24:59 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xb, 0x80201) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xf77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x40000008) inotify_rm_watch(r0, r2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x80120, 0x0, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffd}) [ 237.619660] FAT-fs (loop0): invalid media value (0x00) 03:24:59 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3, 0x40000) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000002c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000200)=[@in={0x2, 0x4e21, @rand_addr=0x22}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}], 0x30) [ 237.651339] FAT-fs (loop0): Can't find a valid FAT filesystem [ 237.658547] kauditd_printk_skb: 50 callbacks suppressed [ 237.658555] audit: type=1800 audit(1566098699.853:536): pid=11183 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=217 res=0 03:24:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) [ 237.693242] audit: type=1804 audit(1566098699.903:537): pid=11196 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/149/file0/file0" dev="loop3" ino=217 res=1 03:25:00 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 237.750009] audit: type=1800 audit(1566098699.913:538): pid=11180 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="loop4" ino=218 res=0 03:25:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x14e) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x20b, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000040)={[{0xffff, 0x6, 0x542c764c, 0x6, 0x8, 0x2, 0x3, 0x7, 0x9, 0x495, 0x4, 0x4, 0x3}, {0x3, 0x9b1f, 0x100000001, 0x78a, 0x1ff, 0x8001, 0x6, 0x1, 0x8001, 0x401, 0xfff, 0x11d8dcb7, 0x60}, {0x2, 0xd54, 0x3, 0x4, 0x6, 0x3ff, 0x0, 0x31e, 0x6, 0x9d, 0x1f, 0x2, 0x4}], 0x6}) [ 237.774261] audit: type=1804 audit(1566098699.943:539): pid=11195 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/163/file0/file0" dev="loop4" ino=218 res=1 [ 237.976208] audit: type=1804 audit(1566098700.183:541): pid=11209 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/164/file0/file0" dev="sda1" ino=16960 res=1 [ 238.097530] audit: type=1800 audit(1566098700.193:542): pid=11217 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=219 res=0 [ 238.125963] audit: type=1804 audit(1566098700.193:543): pid=11217 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/150/file0/file0" dev="loop3" ino=219 res=1 [ 238.158316] audit: type=1800 audit(1566098700.183:540): pid=11215 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16960 res=0 03:25:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:00 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x806]}, @mcast2, {[], @icmpv6=@pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x29, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 03:25:00 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x14e) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 238.477137] audit: type=1800 audit(1566098700.683:544): pid=11235 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="loop4" ino=220 res=0 03:25:00 executing program 1: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 238.538722] FAT-fs (loop0): invalid media value (0x00) 03:25:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x14e) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 238.595527] FAT-fs (loop0): Can't find a valid FAT filesystem 03:25:00 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000080)={0x3, 0x0, [{0x37a, 0x0, 0x9}, {0x943, 0x0, 0x88}, {0x8d1, 0x0, 0x3}]}) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c00000006060501ff0080fffdffbf2e0a0000000c000100060000007d0a00010c0002"], 0x23}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:25:00 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 238.673897] audit: type=1804 audit(1566098700.683:545): pid=11235 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/165/file0/file0" dev="loop4" ino=220 res=1 03:25:00 executing program 1: r0 = socket$packet(0x11, 0x4000000000002, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'siz_tun\x00', &(0x7f0000000080)=@ethtool_modinfo={0x42, 0x0, 0x0, "f01663e504757f1c"}}) 03:25:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x186) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 238.950116] protocol 88fb is buggy, dev hsr_slave_0 [ 238.955316] protocol 88fb is buggy, dev hsr_slave_1 03:25:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x186) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:01 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="04"], 0x1) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [], 0xa, "0df65a6400d5f4f9c7ab3767010e20e6f1d37da5040a7915b9c9e6115e6c423e2b116050c41afd94cbcce9d1c687d988f5b4f58e93c0cdfa2526877cb5021e0925a902cabce318ae8d9c474cc2cac32980858b8ecc101fe80b234ce25bc4329388b626a6d34f92e0081a6a9537f21b652f1ed81f0f70da41f5eb7c01faae44e94fb7fc2cd553447b38450fbb19f080e7a34087dc2dd10add51fe76ca9f00e10d120405f2db7102f66ffc578969c0759ffc785c0ae3e6678b3d7894b5b5425e50291f7467159da22e33a968fa38f9d5f1bb78cc4512606e3a6f24a370c0b0ec06ce62a514fa49fe8314eec1d0654ad6536115d224409216075b6f134227379adf5757956874f75d0a1c8bcc74f980617e71bcb58963c602e23bdbd2ab0b5ccc89307c895af47a2f70dc4d25094c1e2d2df0af8c3a63461fac19786ca591220a3a1a7aed06c4f7d086ab2da88947446b9f67e29b02c27fb3057488e2927d381f7bc391bea858d6212c2c5221b597ab9ca86ce42122717844a69cd7291b9f7225b1a3f4fecda8768cca070508f43c8eb276845a8e1562535eeca6247e7e652d13ccd2e4b837f971a59fa39943fecea389ea8f59ccdf33e7247c1dd881e09ec3d68c5e4dafd545ebd3f8a3ba74d45f3032af07be475bdd59020de98c5e3722bddd503e284b6a0d314bb8e06a245cbe693bf330d0ff57299a01f7be95587048b83100713b2d4b97aa0886a92cd30070c1cc4c770c599e5911c867205e851d4cf2b5f555bcf4d675ac4b26623e75c5162d14d619e3075d40f682850c35275b570638c3fb010e2171d15d729fb59250694bc2bcf18219daa7ba689c8b2b07e33ccef07895c2479cd7b6797ab1abefe3a09e1f104e4036c3b2d1ecdaf512637f21dae9c7b9cd34e63c6f0d0f7286a9efa379fa1a659882918d7671b2f18f81bef65a98d81f86244af87a02eb88ee714048285793525d738548185ab0c2ef7b9ec3003612a0b6ffa02fc6c82c96876eb8d3ba2805aa366cbf461f2dc9e41fbb6f82a41a826603ea1daf22d43b53f8477827a3a48090c505793b170f9cb75634c35c9f774ef735c3dac82b9071f3161ec130be582e78cd461032ff3646fe3de28843cf11f56bec746f3bfc3ffb118958bd1722e3706d22020736e4e6bb4b05af35760333e338bff701a63f799674ce058da52e599ad9cd254fb487d8b8e1b2f7ba87042a191486eb8ed104c48428589f01639d4d61344b4baa62da99b4568356fb3f6d284f8dd89a2b3de142c8271b1bb09e4f07d9774607982c5c1b2688df2c3a11adb31594539e47895efd1cdf9918c80261faffbbbb88e6caac8076746a80ef7967a41a251006cb5b69448603e3a413495fa8a3f7c2d87118746c6504c0a30d2bf86bcbfaa9031535d2e934ceec14f8fd351a9edcf5194d710e0e7a5fd176aca63b6f776449fcfeeae1b6b236fa540266e68907a7c415f7c2eda8ae4975f7bd84064ab67b28a38bfc05f7d901731141b9767e18b4b34751c83e0a288770c07b7af4722199b88c0f39819dc6256f616d9fb2f663b33717209ba836372bcc3f4e45d72ecbd50619bdfabd0d81e5b5b3677b5451a2266e2444a0996ce5e3ae75ecf31893a21e2921c157ae00fbf2cc496d28544342339435db21bf674ffd4e7773b7d71203da8567786989cebadb1b2f9585d369a497ae2d4501f1fb8848e77c5497f2d98fc20358609d43273222634e218d9978f25a5cd4b89d47443a986763c6ed332661712ca815e02584deebadaf46872613d1637d3a918ba684dbc350aa0a53960d3a25014011c873fa9668d112bfd5fdcec1d5d8ce4517449278a2b29917039df92abda76444bd8b1a3f36b72eca77ad0cf4ede8e8e9aa29cedcf9bde293e6d4f8e51c9fd1f7749d795d21cfe9e81f1f7503e69f31c826481e541d5a33be0c1600ee987712e04c2c192a4e4a8d6f0c9e05a6991c164bbc30030cbfc73ef6368d4abd8e9add6040df957e6f3b6b8c0ed78900c5203057a63e6a4c00a102bf715c377c022a95dc1a9a56db1e02db1ca11071ebd000d41b004242b06dd2d5b79ab0ed7d2b833cff4ac67623e0e7e8e0f2e4540eda0daebb3a36f87eb6795f8e8eb6e806caf587129adf0f6c56b4170215f50c9ea778c4d571fc4c0dbe17e8c1f33b3ba82502c5c3ef88c36474dc19ad6b4d96c9f5aee80abe49ea6e01e9c08c277917f3d2dba32aae5ccb955c46c5e377ab41f0ec96197db929f11fffd9c559c3e278079df0fe1dbb945d9cc80db6dfc90073d5da35ec42058218d92e987c8f238f97da4ce39e1ca9ddfb544e725d99a5961da8b2ad6fd5cdf4da639f45071276565481cf3ca81250b409057fd009f76cb5a6ff71d6eca69f4a081def30b7e68080f922b852306ad943048fbb620fa17168bfebb4194b308450d281a85d5121f4cfdc47f1e9bdced80dc32865203a510beb5214eb50c8dc98b6ac59d156d3dbf885877337fccf05693b31ea4affe688e2d2f81c9a00d0a8d2012f0cbbcd27ceda28f8e7230ff12e5f40b62728edad6d955de0d3565247c6b5ea110b4bf131b0a045dd58cc4e0f854ee57b0cd24f0b4d25a06c714fa7934171f39763fdc00db2169e0db21c95abf9a33e08ddcdaf1f4c7fd7b4dc84d88289c4406f21ed73170976d73b99d71a47b5b6001981aa4157518df2516cb21b28b5613b569d06e78a60379ec0db5016f22c60e833101acd107ebf824b426ab725523b1e9002c36164efcc659ac39e42cd604318a82aecd818d606f584dfc2ea1a57b3f79722eaee201cb871565863c6f9975d9e7b20cc35cc5ec0fa76756408347affdc1982f0a31670df56a9e1afc9b008bc2d341b953de2e2b382864c9368537543d387328c4cbe58e41a4efa472fdcea4328dd4d0f97eac9df4c14c8e7f82bf170a1f023fafea5481e82da0b569251928d2c0ef2f334d22495f554b8657b0949bb4663318531dd99030ea63767d7b92d21815fed1715c223a7233cb42be16a1df5ef4bc6f4b5701388bb7fd9de499c711288a4e4fe062083560ca03147bf2505fea06e1a6a6acd7ecba4e624475545d7112cd1b3e4cbca010b788ead716994ac56510732eae027d461388ae93268d5e0e799bb591079412df03f3b74f98b85d3e35bf2d6c268683c669dcfd1c36007c434ae4be5944788c5b2d61a0906d29cc78b37011b66d34843b5157c45b10c1a852e08e29953fa9b832586551ab89b704f53c54b234b4d236363aca43e9fc4d22cb8486343949ced2fc0a40502149260603b15aa86aa61b8df98bc9406b2a5c703ff34ca5643344fb0347197c65b1f6eea483986e048c710caaa1d688bb435817285ed31ae306cb9c06bfc2a4037377f8c2f508e1abb3fe39d4b9f0a60c41c0fca5dac1674b4a2230570688fd52b2610525c2494f0d630b7c0c933646d7f564474eb7aad406975b8f21e381636cbda97b7cba88fce73f17ee09f182aab421d6337ea5f2ed4e10a2da7ab15150ec2b5f29a2157bba8cc2782b7052cd8138f40403bd4fcdc9d1819baf52fb70981ecec1568008b4c52cd1ea7c06473b16a20f9fffdafbf481ce9775207c60057e6fdd65f56a3bf0ba5fab8ea67e9c049f35d86fcb368fbef37fc64232959e78c6729b91b85244f6b4d32b5b8a6a116fc69c80d2abdfeb63677bc77bf79d90f31f80ee61fc6e018b7baf95aa52e06dd5246900c272b187d551b1d2ba9c34c306afcf408aac4460d1fbefaefc49edab9f771701322c2b50d9d9eb1a608c3e95f68f259ef0e806b4dcf107259ea41884b74e5677db99e7e6a168824a8554db51debcae988a000ba4fab3272470fbc01c4707d0d8508b8382a96a7e336142503dbcd558cad3a592636262389511db5622aeef4585e260522c63bbaafecabd9c3a55d20d2b5463fdc42174707e698869a16db50d731c42694d23e301d971fb338f32023d4b4a5564eb7f132fc104bb44050ea8a4fd2b746f05e181b1e3be5daa72535427fe259df0f5bd2b19f65a189c629b84fc7307e4f346f35ff95bb7b6a7cbb1f023b65d5b6f500d29d4b04ba748e5555e204296b4ecfc2b20ab595decab45bf80be1005c7bf063a1a168418e0c6ff16f09c0c735620daa50b45ae81e8442e0bc0b04d0745ed85f9348ff6a85a17f7d651a9820f20db436a31345c10a1fb21f11d004d66702d8044a5f4f3472ff6a1da9a0ff6afb25eeecfddc9f2b077bb92b05a8b58d113808c64451e6c7d360c50e3c91729c7797053daadbc6ad578d1ef1ff1a1b68b18229b7b611ea66ad740d2713dc77172932ba898381bdc0d8b7bfb04da72b6fe88fcf24a0b1229c78bfcc639e634037eb90b57d8cd33c2ab7f7c9555eac3f426dd89eab07e443a1f2eb077f38c483bf1e2edcecf8ebca5a5bd041d0aba43cdc987fdb80c1021e3d7bdfdd2d263ffb3a6285753d1cbb149d0c8075e53c52b9647f0f0edb67acc29ffdc88bfe4f5591ddb4c477df9a9e058c6be8f4fb5899c3db4c59b278f8836a128ec09b3f4984192e8e73150ed74fbfbfe35fb0b1767401b8e7d3266bf19d6eeaf011fc0565a1dc2c017f7f2d20688af9f8bf30d41a9da8a92f42320eaaf7cb63cae135b09c75bbd750c745a565f6f7ef8bbdc02d019581811ce3e5d54e1c34b1eedfd892d76798d4062fed3f3fdbb93fb46291f9f2fc651818e48165bcf5c8cd7dda7c2f2e5b2c342721b965cc84e837c27c9b9ab92b117a9111c6dca1162459df1a21b849b70b66478f9ed966b6d1ee7ab69064a00b7acafffb70f334ffd163e0f5e71c2182d600032d5119b1df9a3df1b4d3fe50faf3a190b13c666f19cb60514cd0606f8c2570ab6f6e26f786e8a87aa4edc041ce38ebbdc31f4a903a03a7163111ac4b20c9412b81c9e7788d3ee57d0a7cbb4184eaeee48373e7ab2254793371b506937b9d6d06b795d876a6324cb5a56df51047a238a8f1e321ce88a9190567b19fddda64dd0c3cec83c305e0eae80cc1f1bba14630362827d9ed64607d900b3b264899b6748fd01a88e993de3fd0a1ffea62dc3d00d6df34389f8f102c3f1e803a99f166603d06d07f425b21cf48360581d7e4e83e6c2fe8feb6b34cbc97878bd72c2bc78912964f70b768c37ce7fe0c21d3641fbde9714755eb511d7e6387dea4411722a4fcb985f474f1c0aa1a9fa634c34df2be90d352f2cbd37c12fdbe1771629132df31462ec839ac4383571ba22f0daece9249491b750b3b27db9381242685c48e571999b017355b945f785702bc5187fd62c106018aea96cbbac55b38a2fb3dbf4c745ac190a2c0bf60faa956f1594cdf1c7c1593fd8538452f1440a4bc4aa12556fd20d17dc0d4151401fa630a38a0b5b137beb5e5072d186eaa844b0a76d5cfd4a34b37fe29ad2344dc41bcb19a49519e47b63c0b26577dcf50cda7648c3f093f80560c54a02a8808ec6ff39ad8419b95a370147b770ebfebb17de6a2f693bc3805b2d54df5aea2d77958b58c6dadace36df76c9d8dec1ab25bc090e4886b3926edd6b08631a490d1e0f480d0a0a62f3a887e1f41e93cbe3d8496cfd58ff08119e04a381e77b30b3e8f9858d09d730bc3f1f722d0de5e06239e78d3ece618141622e722812cdc2aa29124e5c431ff8f8e528a8ce41707bf75555f73233f27880190121fb36a84d4bc6e985a899defde50fdb0c031aa6d2011adca09c67e7ebd8a8ceb3b8a836de1c0d40200e58b838de2191d6b62b8c47b2b4612a6ae2a02e2e03200a62d7345129579263f8d8f60c4b4581732"}, 0x1000) bind$alg(r2, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 03:25:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:01 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x186) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:01 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000040)="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") ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) write$FUSE_LK(r0, &(0x7f0000000180)={0x28, 0x0, 0x5, {{0xff, 0xc4, 0x2, r1}}}, 0x28) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, 0x0, &(0x7f00000005c0)) 03:25:01 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x101, 0x7}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000380)={r2, 0x200000000000, 0x3}, &(0x7f00000003c0)=0x8) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="690000e39963d04733d48a7cf0ef438d64b27400", @ANYRES16=r4, @ANYBLOB="00012bbd7000fddbdf25010000000000000007410000004c00180000000373797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff0000000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) unshare(0x40000000) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) futex(&(0x7f0000000080)=0x2, 0x8b, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)=0x2, 0x1) sendmsg$NBD_CMD_RECONFIGURE(r1, 0x0, 0x0) 03:25:01 executing program 1: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x8, 0x40a00) ioctl$TUNSETLINK(r1, 0x400454cd, 0x204) getpeername$ax25(r1, &(0x7f00000001c0)={{}, [@rose, @bcast, @rose, @netrom, @bcast, @null, @bcast, @netrom]}, &(0x7f0000000440)=0x48) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000425bd7000fcdbdf25020000000c00020007000000000000000c00030006000000000000002c00070008000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="080001009c85f68ae40436ec69f4fcd89e2cbfb62df1ebfa5242fca046ff489ea280a91e1fdea3c3328fdfe0269286a42832fe322db8f64fef", @ANYRES32=r1, @ANYBLOB="0c000220e5968ea773f6f400"], 0x64}, 0x1, 0x0, 0x0, 0x8000}, 0x800) sendfile(r0, r0, &(0x7f0000000080)=0x2, 0x400) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000004c0)='trusted.overlay.opaque\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) prctl$PR_GET_NAME(0x10, &(0x7f0000000480)) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000180)={'ip6tnl0\x00', 0x7fffffff}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000340)=0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000540)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x80, 0x0, 0x1, 0x8000, 0x0, 0x99, 0x40000, 0x2, 0x1ff, 0x3, 0xd0, 0x4, 0x3, 0x8, 0x3, 0x1, 0x50c, 0x18000000000, 0x1ff, 0x4, 0xfff, 0x7, 0x8, 0x1, 0xfffffffffffffffa, 0xfffffffffffffff8, 0x0, 0x3, 0x7, 0x8, 0x0, 0x1000, 0x8001, 0x10000, 0x0, 0x3, 0x0, 0x6, 0x4, @perf_config_ext={0x4, 0x400}, 0x2, 0x4, 0x6e95, 0x9, 0x80000001, 0x8, 0xffffffff}, r3, 0x3, r1, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x6) [ 239.333580] FAT-fs (loop0): invalid media value (0x00) [ 239.368084] FAT-fs (loop0): Can't find a valid FAT filesystem 03:25:01 executing program 2: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05e", 0x186) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:01 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240), 0xfffffffffffffe69) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0xffffffa2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getuid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000280)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) setreuid(r3, r4) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x7c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], 0x0) sendmsg$key(r2, 0x0, 0x4005) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='westwood\x00', 0x9) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) getpriority(0x0, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$EVIOCGPROP(r7, 0xc004743e, &(0x7f0000000300)=""/246) ioctl$EVIOCGREP(r2, 0x40047459, &(0x7f0000000240)=""/174) pread64(r6, 0x0, 0xd2, 0x0) write$binfmt_elf64(r6, 0x0, 0x0) 03:25:01 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, &(0x7f0000000100)) 03:25:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000180)={0x80000000, 0x7, "16c3eb823c229f966452e65654bc3eb9f0016d2e78caaf39251445d3dd32066e", 0x5, 0x2, 0x6, 0x3, 0xaa, 0x9, 0x7, 0x1, [0x8, 0x2, 0xfffffffffffffff4, 0x9]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x40) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r4, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100080}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB='\t\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000226bd7000fedbdf250f0000003c0004002c000700080001000b00000008000400200000000800030000000040080001001100000008000200000000000c00010073797a3000000000"], 0x50}}, 0x81) sendto$netrom(0xffffffffffffffff, 0x0, 0x0, 0x20000014, &(0x7f0000000280)={{0x3, @default, 0x1}, [@null, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) dup3(r2, r3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 03:25:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 239.973831] IPVS: ftp: loaded support on port[0] = 21 03:25:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000040)=0x2) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r1, 0x14) ptrace$cont(0x20, r2, 0x3, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x47e, 0x132}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:25:02 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, &(0x7f0000000100)) 03:25:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 240.249274] FAT-fs (loop0): invalid media value (0x00) [ 240.261456] FAT-fs (loop0): Can't find a valid FAT filesystem 03:25:02 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x101, 0x7}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000380)={r2, 0x200000000000, 0x3}, &(0x7f00000003c0)=0x8) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="690000e39963d04733d48a7cf0ef438d64b27400", @ANYRES16=r4, @ANYBLOB="00012bbd7000fddbdf25010000000000000007410000004c00180000000373797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff0000000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) unshare(0x40000000) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) futex(&(0x7f0000000080)=0x2, 0x8b, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)=0x2, 0x1) sendmsg$NBD_CMD_RECONFIGURE(r1, 0x0, 0x0) 03:25:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:02 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, &(0x7f0000000100)) 03:25:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7", 0x187) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x187) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:02 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) [ 241.028722] FAT-fs (loop0): invalid media value (0x00) [ 241.035352] FAT-fs (loop0): Can't find a valid FAT filesystem 03:25:05 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000180)={0x1}) 03:25:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7", 0x187) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:05 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:05 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ae0f6625968aea9c74fe44544a8d3f871aef9592c40136e109934c00005d01f367f2db759e01e26816b04f08c571ad206fdd4080016244acb72d267cbde9406d0fd5b347608bb08803ab263ce150730d637e75673a36b58134e27b79fdba834eb3ea3da6eea15283a3978ae895d0", 0x6e) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 03:25:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) [ 243.256168] kauditd_printk_skb: 41 callbacks suppressed [ 243.256177] audit: type=1800 audit(1566098705.463:587): pid=11436 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16995 res=0 03:25:05 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) [ 243.269623] audit: type=1804 audit(1566098705.473:588): pid=11436 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir892364557/syzkaller.94IxA4/144/file0" dev="sda1" ino=16995 res=1 [ 243.327107] FAT-fs (loop0): invalid media value (0x00) 03:25:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:05 executing program 1: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) fallocate(r2, 0x1, 0x0, 0x369e5d84) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpgrp(0x0) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000002a40)=0x0) r8 = getuid() getresgid(&(0x7f0000002a80)=0x0, &(0x7f0000002ac0), &(0x7f0000002b00)) r10 = getpgrp(0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002b40)={0x0, 0x0}, &(0x7f0000002b80)=0xc) stat(&(0x7f0000002bc0)='./file0\x00', &(0x7f0000002c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002cc0)={0x0, r3, 0x0, 0x1, &(0x7f0000002c80)='\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002d00)='./file0\x00', &(0x7f0000002d40)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002dc0)='./file0\x00', &(0x7f0000002e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002ec0)={0x0, r3, 0x0, 0x5, &(0x7f0000002e80)='vfat\x00'}, 0x30) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002f00)={0x0, 0x0}, &(0x7f0000002f40)=0xc) getresgid(&(0x7f0000002f80)=0x0, &(0x7f0000002fc0), &(0x7f0000003000)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000003040)=0x0) r20 = geteuid() stat(&(0x7f0000003080)='./file0\x00', &(0x7f00000030c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r22 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000035c0)='/dev/btrfs-control\x00', 0xd0fa3c8dc2397c2c, 0x0) r23 = fcntl$getown(r3, 0x9) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000003900)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000003a00)=0xe8) getresgid(&(0x7f0000003a40), &(0x7f0000003a80), &(0x7f0000003ac0)=0x0) r26 = fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000003b00)={{{@in, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000003c00)=0xe8) getgroups(0x4, &(0x7f0000003c40)=[0xee01, 0x0, 0x0, 0xffffffffffffffff]) r29 = gettid() fstat(r1, &(0x7f0000004400)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f0000004480)=[0x0, 0x0, 0xee01, 0xee01, 0xee00, 0xee00, 0x0, 0xee01, 0xee01, 0xffffffffffffffff]) r32 = getpid() lstat(&(0x7f0000004b80)='./file0\x00', &(0x7f0000004bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r3, 0x10, &(0x7f0000004d00)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000004d40)={{{@in6=@ipv4={[], [], @local}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000004e40)=0xe8) getgroups(0x2, &(0x7f0000004e80)=[0xee00, 0xee00]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006500)={0xffffffffffffffff, r3, 0x0, 0x5, &(0x7f00000064c0)='vfat\x00', 0xffffffffffffffff}, 0x30) r39 = getuid() lstat(&(0x7f0000006540)='./file0\x00', &(0x7f0000006580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000006680)=[{&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002580)=[{&(0x7f00000000c0)="a6727a1833faaafeb407e16437c6abc9e54d98c42f145be4f8e5f03f4e50b029352b5f335d11a5bddb9d8f3749b20b", 0x2f}, {&(0x7f0000000340)="9c2595bec316c9b704effe4211ed7d176a1ab3a661e3ca5248833afabd059b60483215595697ac8a3fbd41f894e10037423fe32c53e1e39a6645256051959456703fec80d220097f16ed6f57ec3647f525da2b05797c5141809ad34d4bcae8a11d1443b1a9c9cff2edf0da4e1ade1d4b2c855a7d9600d78565ad513c9bc8", 0x7e}, {&(0x7f00000003c0)="c6cabacd9e9fc7636c8d1b27cde7e0add1625669c2158ca7f174db854376db5723143eabf5549802b941dd985122a31e7dd05ccb3a7854ca6ff3d447bd8b3c4ad743a295bb9156ec76ceb9cfd31c6a287cdc7125c3f7864245fc54b6487a71377ed819a1ed2ccd9b48e81634091f78c04caca614fe6380385e49df35eed83d492670c1", 0x83}, {&(0x7f0000000480)="404307ca5671e72aebd4356391d6577a25fc12e7c5f535959a40b5176127935c9b4c9ef94ad9117c4c025db8beb982d4d88041d6942957b3a2ea2cd1e372b51a5ed779f71d1df7b879c1fb7545976c8e5bd08fcfb26df843c65c3eabfa62d5cc86f03dd5ebb4770fa8d117670aa70a6c073d5aa0b61766b76832803a0fa1aa054879c8ccb919fb5992aa9fa4beb552eba5418b1e6e7592305aca9f1d5a866dbe0edf4a1e1fe5839d588e29ecb77bb3b1f4ce72843068f9c92882cab7287d24ae3aabb4c8bf4b5b4009673f62a83027b58afe010e57a146", 0xd7}, {&(0x7f0000000240)="761bbe533784da86ec8a01015752", 0xe}, {&(0x7f0000000580)="ce3ad47981f3225cbff350af8c07c619693c06bf57b1df77fa6d3c843445dd1664d18d795611cdad1b52707b41af2d5d3ab70b21e0f1d1adece7f49ca810b273afc160db9b3d008465a514bf5f1411327114a3b168c418ce9186bd5f8313d5483d76a04e53a995212b03d01f75559f57b9395c6123934aced1e0a0eb10ade00fe50cdd2c27140a2b3792f14fd857dae771bea15494abc47e523497179efaa816ad8ef084456b8e9e291e4fae52cad2971f77debfd10293b1e20aa5bd885534f5a497d6d7af3ea8b3986ae9cd25bb6cd1da95814aa69ee5a9c19f0f8545f6addd474e2954aa14e7fdf1638862b6c4cf31f92f46cfef19f78c1d3525892647d470cc848069c32cccfbc710457732a9144e5a7a2f291284ad633957447352aa85967535767e142221d34c422ac8c07e1d20b9f98c1ecf43879c66eb258de5692b0ace5f7a03a72337cd01a22f6f0ddf8f8b8d51af8ca93686e89b99ae34381f60bdd985120632a02361aec775969dcc3a460ae2e5778f96b060779cebfa0a4a8a02e99090d78620a63294c71636855062f8710c9f3ac874b3047511a46d9cdab593a52a41762d14ec9a137c8c4bba892679f920440be31de486bb4715082813c548ddb7e36d1aa19163635003e883e494dff0076ca25e9f7c7e9e4ce2f876f6d2d4dc829fee52e3f9865fd906c7ee7776e8ede9f92e9c23ddb3b70a5fe1f5606374f0af81317531a415fa92c855e3f0e6f2ca53f23f77a377ea1aac94e2d0c0d20106d52de01de1f63293a2510e9bd5753cbff25925b9c0d7e992979e6bd127be7fc8ea2142a9cd4495f30831bf90f3e047c82296fede2e0fc1cf02fa816147fb5ec562ca3180cb9245dbec493b3bfe39c9fadf4569b812181ecfea4ca9dc7be39e17985b3c885c43ccb2e7182caa38a8c5b9f5b171c857cd921a8964bf4638c412bad1e83a78c8f818a989d00382ad0d26a749dca93a45e37e21d1dc105f90d164ef996e97b4793e10898c668a5dc76b7f813918070165706243043b139664f479ebce3494b769cab311909bba5051dd43937ed6349916624cbaf7f1a5c1968e2476de6d3f9a2bc107d106b9b1abc8f882ebcf6e523308e2861f9f4f50aa17e68b89a12ba17e20560f55047ab99d3d92ac968820d37f038ab8d1a327960449b3bc8be8470339a0bdc84c1af9542fa059b7af0fba105ba05a62cb199158076563adcb498c5a2baa29d6d1147a2c2b769655d8f48bdcb52d2ecc9d205f9ce6c095affe705e598bd9e56460fab20c28f99b9d98a3b72b7f10f8aab7d874fd95d642762433f859940025cf354af9719fd5c351636a5e9171feb194b257bd0823e36be7acb94f0e495da79246966779dc99d6dc46d511fd2e65dab6ad748671d5e8c9540f12109f27a798052a5a3ac064f95c65868b08fc096a6d40c4b6fe389505e4836dd5f4044986b076c84743ac2ee80f8744bbe9515c7fb17d4ee70ee1c57110d63ace3d89f4c56c46d62288d3343ef6d792f6448941fa9ef55b38fdf0b070116e2f367672b77889ea91d86a160e7b31a0a58517e426175474d3abfcefb5921549663041304100b554f4936e7549ed572e00be8903fda295438365f64bedfd779c2b05d5a9beac5fc26eee2efb715bfd55a15895171a62c278fbfe658434e6796487b9e560f9c4a6ecb3e99705f0761d0b99bb32d787a4c1f4d12fcc5ab99a3388b32d9bde5d03448d80fc93f9075cad65c7f2230721617c767c924044f4c038ed74a1129a5a72328c9dc5a131a97dad8349c184d9f6f439b28e8e1980f8280b16376fc680c5028316c995ba80e5a32c8ccc497e2f492d05d147a557a33c004cff21b3529eca9b903b09b5726ca930f0920f52d53eee6428b04a12361e3729b8e2a5c68bfbf20caeb085f7f34d418db4a5ec066b10891ac444e2837d2bac9c9fa87f13c4b20fe71e267b8c5da8b7ad150018d58375392487d4f444e3198c2f79e1cf2b60072354b2ea48fe1f94887faa0d244cd954ac48643165968533442417883ee95bcfb8d72b0f92f55295258e9e287342ca41005326720545419e6a5423e95425165d81b07a93084c5cf7d050f00b7d3e0a510c8bd0e1ade09879b99c0bacd5254cafe107c6dc702f9f693e905dd0912bcc91aa521de96412c33707ebf4d1b6421a18d91cc36ffd8800b956bc7a6e819601377f7796366e879ddd63508ad9451c58c88cf0bf4c68ae1e343c13dc92d532b18004a5513eb090274754738400a520f2fce58669520a84d29a17948e3e6eadc39466604c7367832f88532511227ae10ab59739908d8c262fab13bc23e46368642032c1646d0d8a6e2219c7834fce565e773aa56a5ef77c18185783070bd813b5a201c2490e2245eecf049aedd9449bbe91cc3532f609cfac93ae76c5bd0d55cd81e60d4cfebb8fe407273ad70559b5720c41b5a71b0574ba8a8cc18224a7de29130016f4fef9ff9849f548ec1b1152e8c8fd6b4d3ed0dcdb09d4b6f1ad046b3d6612a47fc1dbd6b3d34fb7f5e58a778bc556513ed0d3fc17b3ad24f78e8de919a1bc9b10959ec9e3ba548a452e9c1c745e3bc30416320181a43a10b551cb69247a2a09673cdea8f313f574015134e7cc0bf33631ef0451c1d0c501f6cdc129f9e8f11f39f8e02405cbc322abc6ae342d8996ea7616082104152b7fb1de6cf91053e29d0bd732e3c96cac5fbb4598b6072fbbc2fc6e227ff617520a5993a2a4944ddb6255b4702d9a50410f66acd2630fa8aeaf72ce051592305db840dadfb0ab48ab9179157a87fb59304e1e44d0d108dd680434c78b18379cb53d3af0dbdc2aab30c88a9c60e98d46ba05a3525008e54c67b2013cfc189321c8a0561167eaa69410629db2d4560f202eec3f2f975f3af63e3db412b72d6bd861eee0692854b88c187dc34415149b8107d00e4bb4a3469a52372e18e2fbc1b40a4496c26da66d80e90ba5b2f6cb7a3a4146bc8b7717180581f0e5d76b7d1231a45345937d0179775d10209601c788c9bcbad3ad0fdb42d304b48e3680e0dd5c883e912c5caf6cad002c20e59ea6ff6765b658f7fac4c19d44a2e974865118068089f2907749360bd40d01acfe49c74a8ad60affb394a17ad345b45f3943c8b1e4d04ed45996f77508fa22da52359ee5556fdababce96543823c1e063ba9330e15543282ac35f23a9ecd714151fa3a5163398d0946395464509a2681187802e5cac1117c6605aae60eb1c12381ebe897bcb67a9aac267b73c94358a78280eabe96f3aa4d8564e020038a3c6fa19c35931339f3391e9a60fa41c099c9b8cf9f28438af5b529ddb647b1473628177a44b7fcf760a714556f6bec3749768fd2d54ff133f3c0f6b57e2aa901b2c0ae1f5161e89939cf0a09c7cfc99ce0f393197a35eeb3486096297dff6e154a2d00639b32e6cd6c2d49d10da770054253e61f4b39781b0724611f3feca6abdec81d79650e7a82da267744542a4106fc05fdc01a8c4c81a4cb28ad7d93990c3d95843f0e8cd48f97fd09871f8d607f112bfb564aca65074d46b4cc3d47e08e1450e90416df6ed099ca38b465aefd9b3c94c148118d5bbdcc2faddb862fc6a54f97afb3c944f5316de3df75ad5996817fc639141b4550fc91594b586f27044358d22e7dd91a0cb5377b1f8e4249253852c788d838ebd04d2acf16484691c3cc5cf9b345165a2de7dc45be0f291ef9b2833341ab9c0d575208c892bbe980cd8aea1ecc9ff2033b31638a2031abbc685e136aee19f8b350c8026124c295e04d8de0f6082f9b8206fcfffc03dcc3cf379d2e2c28c117a5767c8fd9d4b652f7b216b7391f61598c7f35a77f3b7924c0dd8c8349462faa0961c0155828f0bcb23a629dfdcc8589d7461f2eb3a76a8182482843bd76629b96ca65bcf4ac753420b98164afd1fabeb080beff480b756a81eac9029aa2020a9768616111146fbf3abbff473add89929c6365bc80c34f555a757b0589da7864ad144305c779d6ebb654b95bd2fcd8fa71b42bb74d43b09bf1632349937c618cef6e3e38e4b011c9e1179679a4c2c3299c245e5670086aac962ce94e7572b52ae11c3e63424b68f638cfbad6051e294258c3d1edb5ef0e2fb3c426316c9fb65d89f7e67ee9ef0051af47a4cdb50624ac0bed440221fb85bdd7a0e65699c5a857df0cfbb229d9ba2375176dc546a76c78139cd624a42f43223e2ffc8c470cf4b14bbf73f69d34baa4cec18f4d3169979193a29a8f1f61efc0864e1b55311747ba778b8f7fc4dc246aef979255432111948164369205c5ba1ca525fcd44bce1c3437cb88e260674a62102dc8912014071085194388d85568990140b70445fbf816de1d0731e52e40e2ee67b2118ac8e904383dac410f4e99644b3565e4572846a25f7902716b1a81f87b7f787433989341fabf0709709916c0c77c532b3becd350855af18d044c8f9a733c7b81fe283bfa1f128a2242b7f9c28cba4f81101a396f9354552b380d5e3634f71cf960e979d1693f2f619e77324976e7996c568e3f107d5817131869411680a3fde00adfdc0284c6e841703803d91d279aa007f14379d066a49fb66018c4efc8191a59e6fef7ed7c23fe16cfdf760c2cd5fa3c4b614be15ca5fbb4e2f6cf0d132f115d60b2cac1748b8c82a1a0f4a18cc5bf7d0538b60afef31066bc17b2cfbbdd36f3ad28a8b46c72071eda8c0b3f9db011d84fbf1072452e9bb0c9121ad463deb5d1ca84d05dfe4bbbd850afc32a16aa7087ec6380ce9ef9a0ee8483b91ecc9a14b552e7f6231e784b7de18402e24582131636a22aaa5c20181ee058507bc6c48e09c47f70b3eb16725154a1e90fef42055b768de90f6318519c19a3af164616217de814aa24be0ba26fe8a94f9a5741b075c175683fa8771311af4014600d613d2e19b7db34dbaf881c8216d8436af27253c00abd1ec32a2b8dd92f3ca9d8fda0be30339b3da2535a8ec58fcc8815fa86ba104388efd3fb0cee16208fbdb1fa8a0161f76c38265ec6f7399fce6ff46ac8d606b791d6bd26b4663dc4150b0e520b66ea7e4c52e123973faade56e2cc472442e85e74682863103bd87f5bcccfeae27b70e153b30dd54dfd9f8a9869efb80fcc1985fc5bec7d1098fdba9f5abd6bee919880e5e40530fe66a9a128de1ba1e6e3d2861ec2ab00d9b3c8439530aad7a2271d472844ede4f96e8679599133cb098901da5e8ebb1cfca192378f50c100cccd447bc626bba527a0357eefe57b2a6d4ac48b7423263076bcf0e125ce12cb75490902702747b2e8ac28700790b4399d2a02693d352669b4d4ab1c8915beebf09b8eba2acfa8e56ce3869bbcf6f85a0dbaf8a0c7ef92ce8b68ecfbc3c4a50e5a7033e1acc71e34998321609777571d5018407175c54f39763039501f726dd474a7b3083b58bffe96ed6916e23da6af5afdaa644eb2f780d9f8586ecd1ffbe7a10a41e04bf08c2779df1b4e8b88a2c9262ddcbbc2af59088930f46f98ab9800166f7fe34670e67800b138f15b2c207ce9f3ca4f8be4d71697ba7d5b71e3bc5195940c7b3b8a35b31eb43fd38332e1bcaff2e72eba6d728994c280a14ebd6fe89cd30ed1385cda76f44c515562a6fb3287b930c44a641f5c93ac23ef9cbc8090e0bf31baae929c72ad5741f3c36b5125e1acec34accc4860d0c80578ecce55424262aa721d284c99ba0875942b7858c346672878c98de7fa82868636b1020c1ad8f6cfa3c485fb353d74113b951b0556841ce59b21543f324649c435c1a5d8954b6ad01ca65175d855f9", 0x1000}, {&(0x7f0000001580)="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", 0x1000}], 0x7, &(0x7f0000002780)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x20, 0x800}, {&(0x7f00000027c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002a00)=[{&(0x7f0000002840)="68690674f720734dcc8805d70758ed63f661827870a9e2a4661442f29166e4f566be824b954d4c3028de60f74631b6986cddb17fff5ea588f1c258cc53f3bb0aa90f5f4595294c7b95d9c0dce94386a0b00a31f74b2ada4f97b9761942ae683ca13fb53ad2c8abc17e1f74ea5732e11183fa36e08c0227fe7abeecc6474336277661357158ab3e67c936bf2150d02530a5eed30433", 0x95}, {&(0x7f0000002900)="2397be1fb3ab8a9857969c3a8daebe7790a47c7388b828e71d5ff526ee2466de4ea6eb6f73c90403fd776710a8a1cdae15ce9d1b949920b04451c5497789fca084f345c760f33b327242906b8a19fc756988409167f940c6bf1b90c3818aa5c948d5d55f549e0244b973e9773a5584773783f49c9b7406f1fa8e587a1f921d3646501188507dc3b79157240304bb589df6275242eeac08195b1e9de0cb42b1a2a4e07ba824bd535d575919d0b612db71be679f075203cc6c7ed8266005556e634f7c8f6839b7f13920d206a0f47883", 0xcf}], 0x2, &(0x7f0000003140)=[@cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}, @rights={{0x1c, 0x1, 0x1, [r3, r3, r0]}}, @cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @rights={{0x28, 0x1, 0x1, [r3, r0, r2, r0, r3, r2]}}, @cred={{0x1c, 0x1, 0x2, {r19, r20, r21}}}], 0xe8, 0x8010}, {&(0x7f0000003240)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003540)=[{&(0x7f00000032c0)="9d510c0a6221af", 0x7}, {&(0x7f0000003300)="d6844d1e8079a33aeb555496c1261be89ba34b774ad71ce9ec0e8a22a4bc792af4ad0eb3408e56668bdffbb7cfbf40f9bbd70a4c2f", 0x35}, {&(0x7f0000003340)="66f0cdaf33f85b9256e768b48432aec4ee645e7532eb884744145a0f5f23563d02ac7fbb2175626795f5c9f6e2c88465fa74382805ff4a6e3eaa2545627fe1b5d612481a056b0f2657b6796e6f850215801ec288333ddc2caf128956b9f7a5dedfb710fc3f6b24a761fd0c90e3eaad37fdf400a493ada918f104dbdf4fea67286162edb5ce8f7de98314b8286646bdfcc2cccf9d9b8c26cfebdb0becfaa9ba0f7e56e271f9d39bed31fd6bdf47f21fc409af00c9d0674d611d952ba638836bfeb646e313851fae80c6e7b8e1dd137ed5d400a6fd95b6cc93c32ffe6cb09eafe98bfcdea41484dead3fbfa74f33a37513113f5078ceadd6d548918edaf6f1", 0xfe}, {&(0x7f0000003440)="06871f74221c9753d5a8c15f0bc72b6606f820b20064d96b7d486e0af396fe407ecc972d2325a91a4bb54e88e3fb23d493ea573fe4ab8e2ab3e80b1b207503686a1140cf93de71", 0x47}, {&(0x7f00000034c0)="d629702379b63253856beeb29749761160a19e9aa6970c0d2870cb77bf8f7347d25e603fdb44582a1d2206c1653685162953cac5ad84cdc81fde7ef11d5ea96532c28a028daa3424229c7e85fef199d8ffc3b2901d9dfa2fe849224c65540e4ff4c1b4f1b300c7ebc4fd489efbbf35329715ee4b9851248a858bcb", 0x7b}], 0x5, &(0x7f0000003600)=ANY=[@ANYBLOB="20000000000000000100000024000000", @ANYRES32=r22, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r2], 0x80, 0x4000}, {&(0x7f0000003680)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000038c0)=[{&(0x7f0000003700)="acd2a17e06eea58a3b751ad8fa5e37c8fd5cd435c828a8fb4b363b5db89bc9e7ad2e815494148dbd480bc04c65c3ff26a4cde7315fb58e13b90e9f3c3967289a718700e26321e100108c994905d7aa2c966f896a84e2877dc680097fb12b96935063890af6813f14f912bcd3ea82a6f5b59e4187c4144b92856e575a", 0x7c}, {&(0x7f0000003780)="f1d72fbf22bcf6cd1e29ed30c784efc8b2a440d8a0f34f2a8eaca4ddb46b074885c5c7103b60836226254efb77dd6508eb6693d06b10c42b3022effff9ccc61582c325488d52c81d3334e4e961f2ed0f999639a0446aad1afd0b5cb070e26e1278afc1ca7b587a9d9e99ef3bbd60249a55404ca818e70dfb49a97ca4471873348e1a522d94833de8de4ed2cc706a1477f0e8ab88e7611a73c539bc3c0290db3c4a47d230d4dcc6be5fc8dffa6a5c244c689797b97e323928119cf54a7ff3b5f6a29bb8df2782d7833be98e5630ca135d1acb6cce066a8396031ca8e06ff2c636b5f4c1d59062a49587e29feb86c8203589294ea307d68eae62", 0xf9}, {&(0x7f0000003880)="0888390a8af0d873d4711b54303e13980a430b971a66da982a34fdc560fc9ae7bb425a1838d51ef70bf378bb18", 0x2d}], 0x3, &(0x7f0000003c80)=[@rights={{0x30, 0x1, 0x1, [r1, r0, r0, r1, r0, r3, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r23, r24, r25}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @cred={{0x1c, 0x1, 0x2, {r26, r27, r28}}}], 0x88, 0x8000}, {&(0x7f0000003d40)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000003f80)=[{&(0x7f0000003dc0)="8892599c5580a847b884e6a3de6c90af84c67f3b533ef9d8f4eac5cdc46f378f0aec6debd5f50f0dd1793680dacd298f3311c8f79eb80ba0e0bd1dfda3229207e3b7aaa2381c634bf76ef9ef93cb885faf57d80ad289002f0e3edd50d1716ca509a166bcfc4c15fdd6ed96e4ec92ed86afa75e897bed7bf681994ac3a07f5c5ef84aa975569e889ded405ab8c8f165a479076cca9b3de1c16ca048e2240009e6f00f0893660c2290d089", 0xaa}, {&(0x7f0000003e80)="828fd755da74c4d725941bf63d60beb9519166f78d1908bf480d67ea0ee67621b015404ce1165f5d342fdb2d32e69e08a08f334c48223ff51a3c3dfd98c00cdcc83fb3dbc2cf0f932d4dccb342a204c7f1c03a7cc21c71b489748dd3ceeb689556a55cead53a7183627bf1f034292ebb51a11fc9d6f314be9026d826c7b73537d9e62777b674554cef68d5468eb63911b60974d706429dd465766a68c0b78859c86efa9f7a7028d5714575e8edb879e348c22afa6736ff8caa0c3c189c950e1ae5ce867175706d", 0xc7}], 0x2, &(0x7f0000003fc0)=[@rights={{0x24, 0x1, 0x1, [r2, r3, r2, r3, r2]}}], 0x28, 0x800}, {&(0x7f0000004000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000004380)=[{&(0x7f0000004080)="b04ce44dead7906e634101fcef95517a413cb79211ff803953263098234ccaa833c764d2838d6b70105c219bc8ac73d180b850e0ad5c3a2bb48584f9788662ec3751483c3b05cfec5534d0737e6b8fb940f58b1c61cdb5586baefeb96f7bbdf2389567c2d9624fdb53d40178d94effa6a5792077e64fbd91eb4da92285434920e11cf54d3478d1123675ea3cf4a3de22aa752f6dbed9957003a86cdac4f97c7a4533c858daafd1b19265501d6f5542def4881c974fc7db7339e7d3830ac6cd615174c39e551913f5e9936172f78cf816c5a87db9fdface9097e673f747f17aa3893e86820126de69597d5174d972", 0xee}, {&(0x7f0000004180)="62368cb59250fea8d30043fdb443681ca7f7c063c0f61f28f21ec8989d31ea26ccb0304558d07f012fca61ab476d5c4cca3ce6a050ddd00bc492d5a1c5b387a47fdc62a87023", 0x46}, {&(0x7f0000004200)="4aa74a700bfd4d6d33466246a6fecb34e2e3f2c32fd842d5d9e6297b6088b5469a75ec86d859557dd64c880216977c6cb7e4a97f84505945b8f89262b769a2d563d9ceb3c3c37eca0d3b6e24af7c4a3cdf1019125d51e0292a5d38425f4833e68b2a89d6ba3d7fdfa50b9af1c03479a3389f260c1bbc70607005567270de8d5ba504f83125527122d6e84b9269e03a2aa80e00cce33f16dbe9517223057c8a4039be5d", 0xa3}, {&(0x7f00000042c0)="9a28246eaa3123fd4ce98792c11ee58e6219645fa8c8de13a1336479ec8fe634ad35cb0bd34348890f5edd741a03f7e03d811e612924787f79f0611867130d5abf9811251832114a6349f1f55b137e6de8f6d778ff3de5ebebf0931846173621ae2363f57c263e292610", 0x6a}, {&(0x7f0000004340)="bbedfae96df0361e83ca768b8ceac76a3ab1e0252723c4bdb9e9c4cab742890b3e00", 0x22}], 0x5, &(0x7f00000044c0)=[@rights={{0x18, 0x1, 0x1, [r2, r2]}}, @cred={{0x1c, 0x1, 0x2, {r29, r30, r31}}}], 0x38, 0x10}, {&(0x7f0000004500)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000004900)=[{&(0x7f0000004580)="2ee44d2d5149edc55c0c291dca44353bf2747c2d613bee71e0c995e2483fa227a6b8c34c8b3d982bc12a723f0f79797179f151d3cf2f6edbbcc9cd1bd2afb68271e3e2e83be86448550120737a3d196212da6259", 0x54}, {&(0x7f0000004600)="d3033d510e1fe6c3a830d74139e6d5b607ab6f78d99fdda73f693d656c8a25787c84e4b01888cc25e6", 0x29}, {&(0x7f0000004640)="6aa0662409a2e02d54f615a2f269a95483659c24d8add557681c8e39ebf39418eed1789a4de3d2f3b03929da462e5082a6a0e5fbcc37f520bfaca94d306c106bbb9c913fd1b1af140c003da71c99e4b2281bc655", 0x54}, {&(0x7f00000046c0)="0e8fe1c48fe4fc177a46906e72e57809588409efe7c6989a5c07289f34599909d0b5ab200ff09a1668a23116bb5694d8cc08e2e8856e910df46740ae9bcdef8669615f2a8c69217e9f06031c786e5085d430d408741ccade58ea59a7f9098b3230c9b27f5707cc1ef64a05f481dffd93b218ad3b8ff1ac19f1e3b41e", 0x7c}, {&(0x7f0000004740)}, {&(0x7f0000004780)="9680baa4a24b99bf256bcac3fc27abfc4043e40f91b86a0257cc63182110ce20a17ef04873cdb651fc715926b250f0845bd1563445da9a6f6d9846618bc04157786e941be3cbc2bb9672f7e470befb6f9b2ed89d34e58973014fe58343bb4bf2ee1e14c636c168c9bed706aaef9aeb9ce6ead37341d9fd8e76898b283fa2e53390cbb432a883ab1d62cca77a698d40cc49cb", 0x92}, {&(0x7f0000004840)="3fa08585918708f288f2a48e4458a5739d758e7b50574d17b04455b27fe8d6b40b42eee4b65a37243f9364b1324c873dc7658be340433ef655eccd688edf096e7b88351f9216ab7a4c8dad801d345694288773ce58fb4ae1ae7b986f00440a96a09d4842ddbe4d719751eb21d190bdd5f947422da2e484874d5b1dd6ccbbac191f79fbfb14ddaa8c910af43be36a8ac85504f53ff0f725439450de", 0x9b}], 0x7, 0x0, 0x0, 0x40000}, {&(0x7f0000004980)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004b40)=[{&(0x7f0000004a00)="28c2d557d2e19c63ab33bc9492d0a7f64624671bbf46fa21", 0x18}, {&(0x7f0000004a40)="565ed70974751e7049b85691f2bc94eacf955e7d039c2ef3ef37", 0x1a}, {&(0x7f0000004a80)="a0b273690bd1d09996439ef49a932d086df6db4933be1edcfd0610ba87a45450c1f65d5a83b67ceeb42d72fe1fde6bdae5392bcd688b86f5f5441673771c8e423770f1ff00af55e71fc6de7f23880be7394c93a1594fe66bf0f080513983adbb05e4ce92f872db20e8c219a491788eb5d2d1969c67e3ccf1f02faf1302b19554b26327b87ff1de20ff42ce5ffe3453", 0x8f}], 0x3, &(0x7f0000004ec0)=[@cred={{0x1c, 0x1, 0x2, {r32, r33, r34}}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r35, r36, r37}}}, @rights={{0x14, 0x1, 0x1, [r3]}}], 0x78, 0x4}, {&(0x7f0000004f40)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000006100)=[{&(0x7f0000004fc0)="7f250d45c04016aa3405b1363bfc1fed49c46f4add4fa1e99eb99c83b16c15124b30928c3320ea6177272fc1e4a2212625d7274ae22ec1485ebf03ed7a220c292dd356dbd273f12ee4ae3d680a4bc7aecc6ddc5f568cf769170e534df9b4ed3bfcd12e991b510e1bc16e48aa2b996a17a8775fdbf50d5769677eabff6a4fc946990816a6a155a5e963ee2785b9355993b9a251651f2e7de9305444c834076728f8be1649276ba459b4ef440f2d1ffd7abc0e42fc3006935df0940db69984db31d30bcc03a2fcb95c267950843950bce3fb8db9eb8f80d8fa284c39", 0xdb}, {&(0x7f00000050c0)="d45236d3", 0x4}, {&(0x7f0000005100)="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", 0x1000}], 0x3, &(0x7f0000006140)=[@rights={{0x2c, 0x1, 0x1, [r3, r2, r2, r1, r0, r1, r2]}}], 0x30, 0x4000}, {&(0x7f0000006180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000006480)=[{&(0x7f0000006200)="4dc6ac9fbb239a4ebddb20e36514798dbc8f9e0e3f0b052e15124abf3e2083398cd581f2f18701c60150fc4645edaafb50d895ebee449ce82ec3fec1a214594285f3ef5a2ca954fa6798878dd2815c8e9253b9f86f6b7b6930894249cda04ed70431fae193ef32ffc784d2334d3a85f743d56ff2f44bef97306787389705b7622ac64e9b0719c57298d0c375a99fbdb847dc49b3394ad128183057a4e9ba8e1caff36c6455741627e99a20a40517b6c332f969baf45f241e90848dfe96dcb88a65eb8f2ba42fbd967ffb123550776da07362647505356b6ac5127697ebf0c0e516", 0xe1}, {&(0x7f0000006300)="859171462bd21f5844fc53db033d862510fba51cecd2ac135395340539cb037c1f8f5d3c672b77bbfba4ebc9b5ffaa32f3601ca946fc3430193fbbf0c941877d740acfd141bfe21b05d0d3e056242cde5b6030f42887c20baddf55c7f7547a7b68f6d34b8289c117250e0420923952dace66ee4e538a7fd47b1731d5e092377a893d3b5fc3d75bb7efc27f4721f5058eb52dd2a72750b9295192020b827267c2a8e05528a035de6e05d90f7fc0b88e22416c7e6c0d6189c204af5a5c08442331f5cda7e16d79352c37619a80740e0968343dcc489c24aec2c707807c076554c04a99fb7ff4b3", 0xe6}, {&(0x7f0000006400)="4f1d51c249bf1885b592983390be67a08b926bd1e07433f742772f64921e4d5773e9bc4a08ca4744588639b60d40e4d523ebfb0bb03f0ad77bb67bbe69c1cdce8704c4275048ebb0393aa83cf5620814ee4fe562bcfa231450026dd3", 0x5c}], 0x3, &(0x7f0000006600)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x30, 0x1, 0x1, [r2, r0, r3, r3, r0, r0, r1, r3]}}, @cred={{0x1c, 0x1, 0x2, {r38, r39, r40}}}], 0x68, 0x20004010}], 0xa, 0x48800) creat(&(0x7f0000000200)='./file0\x00', 0x0) [ 243.363978] FAT-fs (loop0): Can't find a valid FAT filesystem 03:25:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x195) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000100)="11eea5055f0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) dup2(r0, r0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xf9}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 243.517730] audit: type=1800 audit(1566098705.533:589): pid=11445 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=17001 res=0 03:25:05 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, 0x0) [ 243.664860] audit: type=1804 audit(1566098705.533:590): pid=11445 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/160/file0" dev="sda1" ino=17001 res=1 03:25:05 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x8000, 0x1a, 0x0, 0x40, "c1418d1b78bab6bd5ca0bb402fa3ade852469bbb0146d7314dde31f189cac338"}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000300)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x7}}, 0x18) 03:25:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) ptrace(0x10, r0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000000c0), 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000180)=0xe8) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) [ 243.729990] audit: type=1800 audit(1566098705.603:591): pid=11455 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16995 res=0 [ 243.775523] audit: type=1804 audit(1566098705.613:592): pid=11455 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir892364557/syzkaller.94IxA4/145/file0" dev="sda1" ino=16995 res=1 [ 243.808326] audit: type=1800 audit(1566098705.773:593): pid=11478 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=17002 res=0 [ 243.840995] audit: type=1804 audit(1566098705.773:594): pid=11478 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/173/file0/file0" dev="sda1" ino=17002 res=1 [ 243.874820] audit: type=1800 audit(1566098705.833:595): pid=11475 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=17003 res=0 03:25:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x195) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x195) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:06 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, 0x0) 03:25:06 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) [ 244.080511] audit: type=1804 audit(1566098705.853:596): pid=11484 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/161/file0" dev="sda1" ino=17003 res=1 03:25:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x195) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:06 executing program 1: r0 = socket$inet6(0xa, 0x800, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000080)={'ip_vti0\x00', @ifru_ivalue}) 03:25:06 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, 0x0) [ 244.244296] FAT-fs (loop0): invalid media value (0x00) [ 244.255304] FAT-fs (loop0): Can't find a valid FAT filesystem 03:25:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x19c) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xfff, 0x0, 0x1, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r2, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000000)=[{0x18, 0x84}], 0x1f}, 0xfc) 03:25:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_open_procfs(0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) socket$caif_stream(0x25, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000540)=""/4096, &(0x7f0000000040)=0x1000) unlink(&(0x7f0000000180)='./file0\x00') 03:25:08 executing program 5: r0 = open(&(0x7f0000000240)='./file0\x00', 0x8000, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000001300)={0x10001, 0x7}) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) r1 = add_key(&(0x7f0000000280)='trusted\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="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", 0x1000, 0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, r1) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x800, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x9, 0x0, [{0x40000001, 0xee1, 0x3, 0x3, 0x2}, {0xc0000001, 0xd579, 0x2, 0x9, 0x5}, {0x80000008, 0x100, 0x100000000, 0xd25}, {0xb, 0x5, 0x0, 0x9, 0x4}, {0xb, 0x3fd, 0x7, 0x0, 0x6}, {0xece61063084121dc, 0x44336d05, 0x100000000, 0x98f, 0x8001}, {0xc000000f, 0x0, 0xd13, 0x7ff, 0x80000000}, {0xc0000000, 0x5, 0x9, 0x80, 0x8}, {0x6, 0x7, 0x4, 0x81, 0x9}]}) setreuid(0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000001340)=0x6, &(0x7f0000001380)=0x4) keyctl$chown(0x4, r2, 0x0, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, 0x0) 03:25:08 executing program 4 (fault-call:8 fault-nth:0): ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x19c) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) [ 246.549000] FAULT_INJECTION: forcing a failure. [ 246.549000] name failslab, interval 1, probability 0, space 0, times 1 03:25:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x19c) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 246.645407] CPU: 1 PID: 11564 Comm: syz-executor.4 Not tainted 4.14.139 #35 [ 246.652565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.661934] Call Trace: [ 246.664535] dump_stack+0x138/0x19c [ 246.668184] should_fail.cold+0x10f/0x159 [ 246.672349] should_failslab+0xdb/0x130 [ 246.676337] kmem_cache_alloc_trace+0x2e9/0x790 [ 246.681024] alloc_pipe_info+0xb0/0x380 [ 246.685013] splice_direct_to_actor+0x5d2/0x7b0 [ 246.689693] ? avc_policy_seqno+0x9/0x20 [ 246.693761] ? selinux_file_permission+0x85/0x480 [ 246.698608] ? generic_pipe_buf_nosteal+0x10/0x10 [ 246.703459] ? security_file_permission+0x89/0x1f0 [ 246.708395] ? do_splice_to+0x170/0x170 [ 246.712373] ? rw_verify_area+0xea/0x2b0 [ 246.716440] do_splice_direct+0x18d/0x230 [ 246.720598] ? splice_direct_to_actor+0x7b0/0x7b0 [ 246.725452] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 246.730209] ? __sb_start_write+0x153/0x2f0 [ 246.730224] do_sendfile+0x4db/0xbd0 [ 246.730242] ? do_compat_pwritev64+0x140/0x140 03:25:08 executing program 5: r0 = open(&(0x7f0000000240)='./file0\x00', 0x8000, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000001300)={0x10001, 0x7}) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0xee00) r1 = add_key(&(0x7f0000000280)='trusted\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="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", 0x1000, 0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, r1) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x800, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x9, 0x0, [{0x40000001, 0xee1, 0x3, 0x3, 0x2}, {0xc0000001, 0xd579, 0x2, 0x9, 0x5}, {0x80000008, 0x100, 0x100000000, 0xd25}, {0xb, 0x5, 0x0, 0x9, 0x4}, {0xb, 0x3fd, 0x7, 0x0, 0x6}, {0xece61063084121dc, 0x44336d05, 0x100000000, 0x98f, 0x8001}, {0xc000000f, 0x0, 0xd13, 0x7ff, 0x80000000}, {0xc0000000, 0x5, 0x9, 0x80, 0x8}, {0x6, 0x7, 0x4, 0x81, 0x9}]}) setreuid(0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000001340)=0x6, &(0x7f0000001380)=0x4) keyctl$chown(0x4, r2, 0x0, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, 0x0) [ 246.730252] ? fput+0xd4/0x150 [ 246.730262] SyS_sendfile64+0x102/0x110 [ 246.730271] ? SyS_sendfile+0x130/0x130 [ 246.730282] ? do_syscall_64+0x53/0x640 [ 246.730292] ? SyS_sendfile+0x130/0x130 [ 246.730302] do_syscall_64+0x1e8/0x640 [ 246.730309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.730325] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 246.775983] RIP: 0033:0x459829 [ 246.779175] RSP: 002b:00007fa47ae52c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 246.786883] RAX: ffffffffffffffda RBX: 00007fa47ae52c90 RCX: 0000000000459829 03:25:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x400, 0x0) write$P9_RLERROR(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="09000089ae58bf3eadb1426628c8beb9b8c40007010000d6"], 0x9) r2 = socket$l2tp(0x18, 0x1, 0x1) poll(&(0x7f0000000000)=[{r2, 0x8}, {r0, 0x80}, {r0, 0xc}, {r2, 0x2004}, {r2, 0x80}, {r0, 0x4544ae53dfd39ab1}, {r0, 0x6300}], 0x7, 0x7) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) connect$l2tp(r2, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x4, 0x3, 0x2, {0xa, 0x4e20, 0xe0e6, @rand_addr="bfb7433e080ed2cea2c9ff61c1b51fdd", 0x8}}}, 0x3a) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") sendmmsg$nfc_llcp(r1, &(0x7f0000000640)=[{&(0x7f0000000180)={0x27, 0x0, 0x1, 0x1, 0xcc, 0x40, "5305d614838e7b29a687fdb2437d3305b8a0a6c1d497724e44a4d7d991fcee1ac55c5d571f1dc977da866a862f82e3c1feae7f1ea6848f48f42d7d5a26a075", 0x9}, 0x60, &(0x7f00000004c0)=[{&(0x7f0000000240)="156782c2ff0cd3e44476750a4b279d7887c5619dce82b1221ed93999fc14", 0x1e}, {&(0x7f0000000280)="eb9fec2acd19716ff3698bf602cf0a727ced8a89d67c40c87df526276a62c7e46f96f1ba3635dc99c76fd150201dc58541663579a61459aa5111e8e134e871ecb16c973f1541fbe374c23650e4785885f6883b09e9bdfc9301bd018882be7e8fa0e05c62a4cf629d199a3f9094b895a8179e17a12cdbba7bc5955efb58a1926a897319377dab3e6cfcdd463641cf9323a10309fdf193f42d16b6b193c189525e4c36a903abadbd", 0xa7}, {&(0x7f0000000340)}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="d10844d5cdb772abf6c78228fe8e5bb8", 0x10}, {&(0x7f0000000400)="6a085d157373f51cb0fdce05d8aa556c0caa4b685356dc90323e274cb2972d1d312bddc2418128ab68a4bcccc3439eec92078991569ffd4dca026adc8195972f3f988213e4d3f916ff07d5cf266e0f3036656a8158467e34ee93be4fe5fb8aa19d10c8a78f13f073fbc88c796dc687e5a5d1b09b468a56b414f3aeba41d9697fb20430c7", 0x84}], 0x6, &(0x7f0000000540)={0xd8, 0x6, 0x100000000, "0ed9ac6995fbb7c14b3a7a9688e5232f75564e210c29a1efcdb2bb426efd8b669ee6a5cc1ce773766495133438f300c0bffffb6485f402e8aab161d1183bb68060456af724c1115e3c4af08aeefbde7e7ab7a3d4ef91ca81b16ec38f7e2a6d1cb33b61db3acc5d821cdea85ea91b7e6881b7dcb1442f49a19f5afcf1be7ae0c6acfa4eb0a3105a4317055053827055cc521c54796084c450f33d87a0b86e42a1bfa70669c97edaeee6d8c28564ea60c02a7ad7d5fb76d7dfc7f185a2ddf3ef4e5d62f9"}, 0xd8, 0x1}], 0x1, 0x80) dup3(r0, r2, 0x0) 03:25:09 executing program 4 (fault-call:8 fault-nth:1): ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000200)=0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {&(0x7f0000000280)=""/91, 0x5}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000001300)='./file0\x00') prctl$PR_SET_TIMERSLACK(0x1d, 0x0) syz_open_dev$video(0x0, 0x11a, 0xa696d5fb958e0910) [ 246.786889] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 246.786895] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 246.786901] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fa47ae536d4 [ 246.786907] R13: 00000000004c7005 R14: 00000000004dc630 R15: 0000000000000007 03:25:09 executing program 5: syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) 03:25:09 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) memfd_create(0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xb0000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x204400, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000500)=@gcm_256={{0x307}, "f5d794cfe7132904", "4aa591f0194c402ffe646fdb8d11eb16d97b76795df23bb286c0fcc1bcaa433b", "a22ba143", "64d8b25d72eb674b"}, 0xffffffffffffffa6) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0}, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffff0180c289030086dd6076605100303afffefa4200054e7d660dff00000000000000ffff020000000000000000000000000001860090780007030060c5961e00000000130400000000000018030000050000011109000000000000000200000000"], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000400)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x3, {0xa, 0x4e22, 0x42, @dev={0xfe, 0x80, [], 0x25}, 0x6}, r2}}, 0x38) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r1, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000180)='\x00', 0xffffffffffffffff}, 0x30) getegid() r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') getsockopt$inet6_opts(r3, 0x29, 0x0, &(0x7f0000000280)=""/78, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(r3, 0x116, 0x7f, &(0x7f0000000440)=0x100, 0x4) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0xffffffaa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x200000000000011, 0x80000000000003, 0x0) fcntl$setstatus(r5, 0x4, 0x2400) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000380)=0x595, 0x4) sendmmsg(r5, &(0x7f0000000d00), 0x400004e, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000400)=[@timestamp], 0x1) 03:25:09 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x22f2715f46e81093, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x4000, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000240)={{0x2, 0x4e20, @rand_addr=0xdc}, {0x6, @broadcast}, 0x24, {0x2, 0x4e20, @loopback}, 'team_slave_1\x00'}) write(r1, &(0x7f00000007c0)="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"/441, 0x1b9) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x9, 0x30, 0x8, 0x6}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={r3, 0x1}, &(0x7f0000000100)=0xffffffffffffff8c) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 03:25:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x19f) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:09 executing program 5: mknod(&(0x7f0000000080)='./file0\x00', 0x8040, 0x81ee) 03:25:09 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f0000000300)=0x54) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) accept4$tipc(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x10, 0x80000) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x19f) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000200)=0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {&(0x7f0000000280)=""/91, 0x5}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000001300)='./file0\x00') prctl$PR_SET_TIMERSLACK(0x1d, 0x0) syz_open_dev$video(0x0, 0x11a, 0xa696d5fb958e0910) 03:25:09 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000140)={0x9, 0x4, 0x5d, 0x400, 0x6, 0x1ff00000000000, 0x7258a6c622526a0d}) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) write$UHID_INPUT(r0, &(0x7f00000007c0)={0x8, "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", 0x1000}, 0x1006) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcb", 0x19f) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x19f) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:10 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) r2 = getpgid(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f0000000140)) sendfile(r1, r1, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010085000019890f7c0c5811a10008000600000000000800050000000000412341fbd7222348095316f51682dbbbd20bf6ec08998615cccd052eebd2b6abe680dc5fa4468e04000000b6cf847605229ab61097ad9608d4601ff69c975fd88f1d070f8578e13ba98125b07fc1535db2bf06887138c10ac3f0022b424e6bf3be1a2071d69b7e21df39c526f63669701f9d7389a46dc5bed9711d5c30522b58cc3659791e8a9856cf32e0e7fefc726d61fa412bf791e2f663e9ef90410000bbb3fd817ca93fa0b896498bd553a404ddc1"], 0x24}}, 0x0) 03:25:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a1) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:10 executing program 1: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x2000000000000010, 0xa, 0x3) write(r1, &(0x7f0000000300)="2400000016001f0014f9f407000904000a00071008000100040000000800000000ccecbf820000009626beb97fe84da11a0324703d1dbece3cf045fd6686ff365886ca21a1faf3bf6b2e24f5af8336130b3ff885137070bc859de1482bb6dc82dec87d050941add034f7c209cd48000000000000000000000000a8135fcdc302af768e8f80c5616e0556a01f38e59fdb6643c3072b71aae6f706e0a06ef079d891d96dc08bb9", 0xa6) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000080)=0x5) 03:25:10 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x1, 0x10000) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x200, 0x80) ioctl$TIOCCBRK(r1, 0x5428) write$P9_RREADDIR(r0, &(0x7f00000003c0)={0xa6, 0x29, 0x2, {0x5b, [{{0x24, 0x3, 0x7}, 0x3f, 0x6af, 0x7, './file0'}, {{0x0, 0x2, 0x8}, 0xf450, 0x0, 0x7, './file0'}, {{0x7ec054b95964d514, 0x0, 0x6}, 0x4, 0x949d, 0x7, './file0'}, {{0x1, 0x2, 0x1}, 0x800, 0x1ff, 0x7, './file0'}, {{0xab, 0x4, 0x1}, 0x7f, 0x9, 0x7, './file0'}]}}, 0xa6) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1bd) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000240)) 03:25:10 executing program 1: syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r2, 0x10c, 0x5, &(0x7f0000000080)=0x800, 0x4) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000240)={{0x5, 0x8}, {0xe6, 0x6}, 0x40, 0x5, 0x7f}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:25:10 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x15d, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xcf}) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x8a80) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:25:10 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) ioctl(r0, 0x6, &(0x7f00000003c0)="561bd5c61e150adb9311906b3619720d926ceb9bd6996dd20b125ac8f5a635759c890adccbbb8433e7e0e4a4d6e6577fdacc8261889e4b5b5c070543b24ff1527231581cb25e5e2cf28af78e0d480b8a7f775eb59abdca294c6e3a395eb3b7c93d48bf4d2747dce224cc1051fa9f53a6f4e7ac474adc2c9b9f7323832449d2115dcc8bd95851451da27798f75ce14c368ae37bb36dcabfdafbbae30d3338a9241f5f8b9deac8abb799f2f0e7830f6e") r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)='>k\n', 0x3) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f0000000080)={{0x3, 0x19da}, {0x20, 0x9}, 0xb2, 0x2, 0x3}) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) sched_yield() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000000)=""/24, 0x18}], 0xfc}, 0x4}], 0x1, 0x10102, 0x0) 03:25:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a1) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:10 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x8000000000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80280000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x198, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffffffffffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0xac, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xa4e}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x406d}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8602}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x11}, 0x40000) [ 248.458367] kauditd_printk_skb: 36 callbacks suppressed [ 248.458374] audit: type=1800 audit(1566098710.663:633): pid=11722 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="loop4" ino=238 res=0 03:25:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a1) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:10 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) open$dir(&(0x7f00000001c0)='./file0\x00', 0x101000, 0x40) 03:25:10 executing program 5: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) ioctl(r0, 0x6, &(0x7f00000003c0)="561bd5c61e150adb9311906b3619720d926ceb9bd6996dd20b125ac8f5a635759c890adccbbb8433e7e0e4a4d6e6577fdacc8261889e4b5b5c070543b24ff1527231581cb25e5e2cf28af78e0d480b8a7f775eb59abdca294c6e3a395eb3b7c93d48bf4d2747dce224cc1051fa9f53a6f4e7ac474adc2c9b9f7323832449d2115dcc8bd95851451da27798f75ce14c368ae37bb36dcabfdafbbae30d3338a9241f5f8b9deac8abb799f2f0e7830f6e") r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 248.614324] audit: type=1804 audit(1566098710.703:634): pid=11722 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/184/file0/file0" dev="loop4" ino=238 res=1 [ 248.648159] audit: type=1800 audit(1566098710.703:635): pid=11714 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=16689 res=0 [ 248.675992] audit: type=1804 audit(1566098710.703:636): pid=11714 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/171/file0/file0" dev="sda1" ino=16689 res=1 [ 248.708867] audit: type=1800 audit(1566098710.883:637): pid=11746 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=16801 res=0 03:25:11 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) syncfs(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000940)={0x1000, {{0xa, 0x4e22, 0x7, @ipv4={[], [], @loopback}, 0xffffffffffff0001}}, {{0xa, 0x4e21, 0x6, @rand_addr="6f701c7e6a15814f2514d9e391a2170d", 0x100000001}}}, 0x108) getpeername$ax25(r1, &(0x7f0000000240)={{0x3, @rose}, [@remote, @remote, @rose, @bcast, @rose, @rose, @null, @netrom]}, &(0x7f0000000140)=0x48) renameat(r2, &(0x7f0000000a80)='./file0/file0\x00', r2, &(0x7f0000000ac0)='./file0/file0\x00') sendfile(r1, r2, 0x0, 0x10000) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000b00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) execveat(r2, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000580)=[&(0x7f0000000300)='vfat\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='securityGPL%%+)\x00', &(0x7f0000000400)='vfat\x00', &(0x7f0000000440)='{[lo\xbd(\x00', &(0x7f0000000480)='vfat\x00', &(0x7f00000004c0)='trustednodevkeyring,%em1\x00', &(0x7f0000000500)='vboxnet1lo\x00'], &(0x7f0000000900)=[&(0x7f00000005c0)='vfat\x00', &(0x7f00000007c0)='keyringcgroup-wlan0\x00', &(0x7f0000000800)='vfat\x00', &(0x7f0000000840)='vfat\x00', &(0x7f0000000880)='keyring\x00', &(0x7f00000008c0)='cgroup\x00'], 0x1000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000600)={{0x9, 0x7fff, 0x7fff, 0x3, 0x5, 0x3}, 0x6, 0x7, 0x4a}) 03:25:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 248.787488] audit: type=1804 audit(1566098710.883:638): pid=11746 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/172/file0" dev="sda1" ino=16801 res=1 [ 248.877211] audit: type=1800 audit(1566098710.973:639): pid=11750 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="loop4" ino=239 res=0 [ 248.901854] audit: type=1804 audit(1566098710.973:640): pid=11750 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/185/file0/file0" dev="loop4" ino=239 res=1 [ 248.930294] audit: type=1804 audit(1566098710.993:641): pid=11750 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/185/file0/file0" dev="loop4" ino=239 res=1 03:25:11 executing program 1: ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, 0x0) [ 248.978766] audit: type=1800 audit(1566098711.173:642): pid=11759 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=16593 res=0 03:25:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r0, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r1 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r2, 0xa, 0x3f) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:11 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)=0x0) io_destroy(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000000c0)={0x18, 0x0, {0x3, @remote, 'gre0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f0000005b40), 0x40000000000014d, 0x0) 03:25:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80020000005e510befccd7", 0x2e}], 0x1}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x1, @mcast1, 0x5}}, 0x40, 0x1, 0x1, 0x5, 0xf080618198182576}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x9, 0xbd0, 0x8000, 0x98, 0x5, 0x6, 0x3b, 0x5e, r2}, 0x20) keyctl$link(0x8, 0x0, 0x0) 03:25:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:11 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000140)={0xe, 0x1, 0x0, 0x81, 0x2b, "1cd5238109e9cd7bdaab18623466306a695f74606a23418afdeca7e3d43786f78da8c8b1475d299f5eb9bc"}, 0x37) 03:25:11 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) mkdir(&(0x7f0000002540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d353ff072d68b2e4dc14aa5fa8b3d94c22") 03:25:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80020000005e510befccd7", 0x2e}], 0x1}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x1, @mcast1, 0x5}}, 0x40, 0x1, 0x1, 0x5, 0xf080618198182576}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x9, 0xbd0, 0x8000, 0x98, 0x5, 0x6, 0x3b, 0x5e, r2}, 0x20) keyctl$link(0x8, 0x0, 0x0) 03:25:11 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f00000007c0)="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", 0x14a) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x581000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000140), 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz0\x00') setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x6, 0x2}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) socket$isdn_base(0x22, 0x3, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000100)={0x1}, 0x8) 03:25:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket$inet(0x2, 0x801, 0x84) bind$inet(r1, &(0x7f0000000080)={0x2, 0x2, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000000c0)={0x0, 0x2710}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)='-', 0x1}], 0x1}, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x401, 0x0) ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f0000000140)={@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) 03:25:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:12 executing program 1: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x78) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) getpid() syz_open_dev$sndctrl(0x0, 0x40000000000001, 0x480006) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) unlink(&(0x7f0000000140)='./file0\x00') socket$rxrpc(0x21, 0x2, 0x440010004000007) getgid() setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000010}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="170000df2502108000fe00000807000000000001000000000000000000000000b8783cdb3d37508bfa927c8ab1976b62a196747fae6187c3d4722871e81fc3d3e7cd8da0066eb205fb288efd1cb8c5ba963460bbd63a888666a9d955673ae10fa9a804353eec675e82bdb3ab9d9f48902135dc5ab2055628ab33957b6d0f35fe2141ce531c9df6acca0000010000000000228e16392543466cac56184c649cc9"], 0x20}, 0x1, 0x0, 0x0, 0x8004}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r1) unshare(0x40000000) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x5}, 0x8) 03:25:12 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x4) fchdir(r0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x9, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="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", 0x1000, 0x4}], 0x40000, &(0x7f0000000280)=ANY=[@ANYBLOB='nodeceland,fowner=\x00'/34, @ANYRESDEC=r2, @ANYBLOB=',\x00']) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x1bd) sendfile(r3, r4, 0x0, 0x10000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000003c0)=@assoc_value={0x0}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={r5, 0x1}, &(0x7f0000000100)=0x8) 03:25:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:12 executing program 5: setrlimit(0x1, &(0x7f0000000100)={0x800000006, 0xffffffffffffffff}) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000007500)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000240)=""/242, 0xf2}, 0x6}, {{&(0x7f0000000340)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000480)=""/228, 0xe4}, {&(0x7f00000003c0)=""/66, 0x42}, {&(0x7f00000001c0)=""/46, 0x2e}], 0x3, &(0x7f00000005c0)=""/241, 0xf1}, 0x3}, {{&(0x7f00000006c0)=@caif=@rfm, 0x80, &(0x7f0000000900)=[{&(0x7f0000000740)=""/95, 0x5f}, {&(0x7f00000007c0)=""/1, 0x1}, {&(0x7f0000000800)=""/221, 0xdd}], 0x3, &(0x7f0000000940)=""/62, 0x3e}, 0x9}, {{&(0x7f0000000980)=@caif=@dbg, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000a00)=""/108, 0x6c}], 0x1, &(0x7f0000000ac0)=""/180, 0xb4}, 0xef}, {{&(0x7f0000000b80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000002200)=[{&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/182, 0xb6}, {&(0x7f0000001cc0)=""/231, 0xe7}, {&(0x7f0000001dc0)=""/49, 0x31}, {&(0x7f0000001e00)=""/4, 0x4}, {&(0x7f0000001e40)=""/24, 0x18}, {&(0x7f0000001e80)=""/151, 0x97}, {&(0x7f0000001f40)=""/198, 0xc6}, {&(0x7f0000002040)=""/245, 0xf5}, {&(0x7f0000002140)=""/181, 0xb5}], 0xa, &(0x7f00000022c0)=""/4096, 0x1000}, 0x73}, {{&(0x7f00000032c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000004380)=[{&(0x7f0000003340)=""/4096, 0x1000}, {&(0x7f0000004340)=""/20, 0x14}], 0x2, &(0x7f00000043c0)=""/147, 0x93}, 0x8}, {{&(0x7f0000004480)=@ipx, 0x80, &(0x7f0000005500)=[{&(0x7f0000004500)=""/4096, 0x1000}], 0x1, &(0x7f0000005540)=""/53, 0x35}}, {{&(0x7f0000005580)=@nfc, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000005600)=""/233, 0xe9}, {&(0x7f0000005700)=""/192, 0xc0}, {&(0x7f00000057c0)=""/227, 0xe3}, {&(0x7f00000058c0)=""/4096, 0x1000}, {&(0x7f00000068c0)=""/100, 0x64}, {&(0x7f0000006940)=""/185, 0xb9}, {&(0x7f0000006a00)=""/96, 0x60}, {&(0x7f0000006a80)=""/175, 0xaf}, {&(0x7f0000006b40)=""/111, 0x6f}, {&(0x7f0000006bc0)=""/212, 0xd4}], 0xa, &(0x7f0000006d80)=""/221, 0xdd}, 0xb57}, {{&(0x7f0000006e80)=@nfc_llcp, 0x80, &(0x7f0000007440)=[{&(0x7f0000006f00)=""/245, 0xf5}, {&(0x7f0000007000)=""/182, 0xb6}, {&(0x7f00000070c0)=""/147, 0x93}, {&(0x7f0000007180)=""/244, 0xf4}, {&(0x7f0000007280)=""/17, 0x11}, {&(0x7f00000072c0)=""/118, 0x76}, {&(0x7f0000007340)=""/248, 0xf8}], 0x7, &(0x7f00000074c0)=""/19, 0x13}, 0x3f}], 0x9, 0x2, 0x0) dup2(r0, r1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200202, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f0000007740)={0x48, ""/72}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RLINK(r2, &(0x7f0000000000)={0xfffffffffffffd15}, 0x10230) write$eventfd(r2, &(0x7f0000000200), 0x1000000fc) 03:25:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r0, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r1 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r2, 0xa, 0x3f) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:12 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0x5dba) lsetxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="1ee59b7c6aeba2a48230052f3d56af881647d4f9f20144f68c56693b03"], 0xa, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U-', 0xfffffffffffff844}, 0x28, 0x1) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xe) fstat(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000680)={0x3, 0x0, 0xe05deb1658678fa9, 0x7}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000d80)={r2, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000a00)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000b00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b40)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000c40)=0xe8) syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000200)='.\x00', 0x6, 0x9, &(0x7f0000000880)=[{&(0x7f0000000240)="a8bc564940d7a62d1cfdcc8607eb47fe4f97101946868620bd6518d5da542874480de5794a86ca0951667afa69d9c6a426ef74ceac202ecf02c72d8c4bfa5986ff0a12438543e5df20c6a0faa348d6d34307c0221130e77725f361b0e17d2b9fee51a490ed86cad41bbbf259746f133bb639d60080f2d90bd4a12e166782c10fe8c6bed15696", 0x86, 0x800}, {&(0x7f0000000300)="50eb9276935a61d7df01c58b88338b940e057ac472430eb6809a6b1bd1f79f78df0bfe45d16b60633f38b74efa1efa8eb8097febe313000dead4e760941ed28dde98fcda0675d2b293994a5777d8e55351ac47c0e0e8c34366de09bd72b078ddc74f6f92dd030cde9852d8", 0x6b, 0x100000000}, {&(0x7f0000000380)="7f983ed6d5cad2f56b30981d64a5e7ebc15da85cfc5626efc7aa816985ca551975f48d38fe2e0b598f7284e240db3161f0f6bec718a0fd161ae948246e", 0x3d, 0x3}, {&(0x7f0000000480)="106c48cf806d5304406f27a0de745002ecff34f81e5f1aaaf0d0d68a0485eff3756dd685ab853fcf21028ce0574f01eb29b68f0eff52146716dccd3a11ae73d813bd55e09460e42226db9d5e369f640059b9d12aa02e32a8db62779bd21bb2902da952ce7995cc6b603ab42da2bbf27af2b0a09a5827a728981e3f7bdbf8b72e7cfb165dc6f83ddf2a358c6b8d88962d2e8e2a7cb32034f8f95ef5edcbbeb75fee7ab3b9233274cd71e6cd6076ca310435632568051b5da3f30e246985de48036aeebb1469c351d053d6a54e7dd98592418c1f4f0f62c5a544eb0758e1b1d6e894b0f01c490d5ce52d5fa807c5cc256159", 0xf1, 0x1}, {&(0x7f0000000580)="1b5f52cf4a937a5487262c4eebfecdf27ee35f32d474821f822bfea1ebd9acfcc670e0b51b7d1feacbbb000aa719f987e1efd18a0c0fb1da85ab60ffadb4172ee8062bde190b3c90308a78d818b98d06519ce731dc42dbdaeae12b8eb96b2230ede1e37a8543211f5acccee90406ece32299ad030329b6210b02b0f6c06c5ab2df451b2886c795ada2f90fc73be2ded2f53ffbcdd2c2031e292dc549b94cc7f0f45dc224eb337bc1091c91298c84e48cd588482c959761b4053bedafc783d2ecab3fa38580b29fa07ef65fa5943daff154f5d4e541883b223db5326352", 0xdd, 0x4}, {&(0x7f00000003c0)="e7706729ecb46ee1f0a33e41c60ecdb3636981df0768f42e61ad92752088ef89108b40627a0f51114d078ff86ff9635eaee2e552ba1ea8e2e35f0eef2ffd7b9e09a93f5415ee5c97be4f7e94e887ce881218d346da926581732de34fa156e35fc30a3ebd34151ee4e1ed904990d9fceaa532ac39a64a73c0fd8752c9b8", 0x7d, 0x5}, {&(0x7f0000000680), 0x0, 0x9}, {&(0x7f00000006c0)="49d1cc55337d72425618792ce993f5d6c26e271f9df778978ca7b687f0c6e26ee69337941c13af7d25bba14b242f52bfac0d06ed6ea6e58058febe8da96bdf27654e2bfd262545ed4debaa4ac3d268e75b28a8a4fbbdc341b3827fd1b91a28be871a4dfb96ff73623f3ad71e06cd2c5cef6c2fee8c13bd83528003ae70437c3e663f4f11f8ab16fe91a5a0d4a2daea02332f91cd851352e435982b9b69fbd3935fd59652218d45ee65ca802baeb54116b461f4d7ac6119d1a16723e1f9b33735b43eadd701304b355ea42451213d033b86ecc939a571a7c8c462", 0xda, 0x2}, {&(0x7f00000007c0)="56672308c01cc8db5ecd855d246acbaca8e2a9477d1f863360d2985fbeca7ad0ac188d7a17a40c314fa80c3a583ff5a0bab28171b19c5c0d111883d3028d7db7b23fb12baca9531d3807b635a4de1157edbf15ad274f40aeaf347a64ddbd581048f438cab081c06a392a4c47158e10154632a583694765471aba944fc9be4b0af5d5aca72573e44cb53376", 0x8b, 0xfffffffffffffff8}], 0x2000, &(0x7f0000000c80)={[{@debug='debug'}], [{@smackfsroot={'smackfsroot', 0x3d, 'trusted.overlay.nlink\x00'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@euid_gt={'euid>', r1}}, {@dont_appraise='dont_appraise'}, {@fowner_eq={'fowner', 0x3d, r3}}, {@subj_role={'subj_role', 0x3d, 'selinuxGPL^'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@uid_lt={'uid<', r4}}]}) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) 03:25:12 executing program 2: r0 = getpgrp(0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x9) r1 = geteuid() stat(0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x40) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x3000100}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, r3, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xe41}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x20040000}, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000000000100000002000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32, @ANYBLOB="000000003000000000000000010000000100", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x45, 0x2}, 0x40) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r4, 0xc0106403, &(0x7f0000000140)={0xe29, 0x7, 0x44489d30, 0x3}) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000000)=0x80) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x6, 0x0, 0x7, 0x842, 0x9, 0x6}}, 0x8) ioctl$sock_ifreq(r5, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r5, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000180)=0x7, 0x4) [ 250.287920] IPVS: ftp: loaded support on port[0] = 21 03:25:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 250.346182] bond0: Releasing backup interface bond_slave_1 03:25:12 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+', 0x2}, 0x28, 0x3) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f00000000c0)={0x0, 0x40, 0x201f}) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000280)={'hwsim0\x00', 0x1}) setsockopt$inet6_int(r2, 0x29, 0x1a, &(0x7f0000000000)=0xdf8, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='personality\x00') ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000240)) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x1) bind$inet6(r2, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000100)={0x0, 0x100, 0x3, {0xbd3514f39313664b, @sdr={0x59455247, 0x3ff}}}) 03:25:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:12 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) connect$nfc_llcp(r1, &(0x7f0000000240)={0x27, 0x1, 0x1, 0x3, 0x4, 0x5, "b5c7b1e68a41bd45a1794703843a05aa7c0696666927e1f0079ecb85cff3a494fd4f3642d566a7d48fc0d7cdb6e3546eb78bb00fdcf9887f798f52a85e4d8d", 0x1e}, 0x60) sendfile(r1, r2, 0x0, 0x10000) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000140)) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={@null=' \x00', 0x0, 'nr0\x00'}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 251.076157] IPVS: ftp: loaded support on port[0] = 21 03:25:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r1, r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:13 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r1 = getpgid(r0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x80000038) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xf4}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x453751ea31ad8f9f, 0x0) open_by_handle_at(r3, &(0x7f0000000180)={0x30, 0x4, "fa69afffc491f412e3c3011f36909293630c17bf52baaf96441aa6b5c25734f9e3401f4c74d93993"}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 03:25:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r0, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r1 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r2, 0xa, 0x3f) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r0, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r1 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r2, 0xa, 0x3f) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:13 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0xa0c0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f00000001c0)='security.SMACK64EXEC\x00', &(0x7f0000000240)='user-]b\x00', 0x8, 0x1) write(r3, &(0x7f0000000600)="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", 0x1bd) sendfile(r3, r4, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) getsockopt$inet_buf(r1, 0x0, 0x20, &(0x7f00000003c0)=""/152, &(0x7f0000000140)=0x98) 03:25:13 executing program 5: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) connect$nfc_llcp(r1, &(0x7f0000000240)={0x27, 0x1, 0x1, 0x3, 0x4, 0x5, "b5c7b1e68a41bd45a1794703843a05aa7c0696666927e1f0079ecb85cff3a494fd4f3642d566a7d48fc0d7cdb6e3546eb78bb00fdcf9887f798f52a85e4d8d", 0x1e}, 0x60) sendfile(r1, r2, 0x0, 0x10000) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000140)) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={@null=' \x00', 0x0, 'nr0\x00'}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:13 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$selinux_create(r0, &(0x7f0000000240)=@objname={'system_u:object_r:cpu_device_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x80000000, 0x20, './file0\x00'}, 0x5d) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:14 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xd, &(0x7f00000003c0)=""/208, &(0x7f00000001c0)=0xd0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1bd) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:14 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x400c0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000340)) accept4$inet6(r2, 0x0, &(0x7f0000000240), 0x80000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) fcntl$lock(r1, 0x5, &(0x7f00000001c0)={0x1, 0x0, 0x1000, 0xfffffffffffffc00, r4}) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000280)) 03:25:16 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f00000000c0)={0x0, 0x3, 0x80, [], &(0x7f0000000080)=0x5}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000000)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000140)={r1, r2, 0x100}) 03:25:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, 0x0, &(0x7f0000000100)) 03:25:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000014c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[]}}, 0x4000040) 03:25:16 executing program 5: timer_create(0x1, 0x0, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000140)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x43e2a34782805647}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x84, r1, 0x308, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa5f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6f78}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x0) 03:25:16 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000140)=""/45) write(r1, &(0x7f00000007c0)="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", 0x269) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) pipe2(&(0x7f0000000300), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000800)={0x0, 0x26, "8ad1f82a14d5e52bdabff323c70d3ee4baacb66195a7b51b1c7172bc0bfc11a9679810215728"}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f00000004c0)={[{}, {0x3, 0xffffffffd927d9bc, 0x0, 0x0, 0x0, 0x0, 0x62c, 0x3, 0x0, 0x0, 0xffffffff, 0x0, 0x100000000}]}) bind$llc(0xffffffffffffffff, &(0x7f0000000480)={0x1a, 0x338, 0x0, 0x8, 0x5, 0x3f, @dev={[], 0x16}}, 0x10) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000840)) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000180)={{0x0, @dev, 0x0, 0x0, 'dh\x00'}, {@multicast2, 0x0, 0x0, 0x0, 0x0, 0xbbf}}, 0x44) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[]}}, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f00000006c0)={0x0, &(0x7f0000000080)}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:25:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) [ 254.252525] kauditd_printk_skb: 42 callbacks suppressed [ 254.252534] audit: type=1800 audit(1566098716.453:685): pid=12002 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="loop4" ino=254 res=0 03:25:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, 0x0, &(0x7f0000000100)) 03:25:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, 0x0, &(0x7f0000000100)) [ 254.410175] audit: type=1800 audit(1566098716.463:686): pid=12007 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=255 res=0 03:25:16 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) getsockname(r0, 0x0, 0x0) ioctl$TIOCNXCL(r0, 0x540d) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000100)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xfffffffffffffff9, 0x88300) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f00000000c0)={0xb, 0xc6, 0x9, 0x80000, r3}) r4 = dup2(r0, r0) ioctl$VT_RESIZE(r4, 0x5609, &(0x7f0000000000)={0x10, 0x4, 0x8}) 03:25:16 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000080c0)=[{{&(0x7f0000000240)=@xdp, 0x80, &(0x7f0000000140)=[{&(0x7f00000003c0)=""/184, 0xb8}, {&(0x7f0000000300)=""/67, 0x43}], 0x2, &(0x7f00000007c0)=""/4096, 0x1000}, 0x7fffffff}, {{0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000480)=""/103, 0x67}, {&(0x7f00000017c0)=""/196, 0xc4}, {&(0x7f00000001c0)=""/37, 0x25}, {&(0x7f00000018c0)=""/190, 0xbe}, {&(0x7f0000000580)=""/125, 0x7d}, {&(0x7f0000000500)=""/50, 0x32}, {&(0x7f0000001980)=""/147, 0x93}, {&(0x7f0000001a40)=""/43, 0x2b}], 0x8, &(0x7f0000001b00)=""/105, 0x69}, 0xc699}, {{&(0x7f0000001b80)=@nfc, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001c00)=""/61, 0x3d}, {&(0x7f0000001c40)=""/110, 0x6e}, {&(0x7f0000001cc0)=""/182, 0xb6}], 0x3, &(0x7f0000001dc0)=""/244, 0xf4}, 0x7593}, {{0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000001ec0)=""/208, 0xd0}, {&(0x7f0000001fc0)=""/55, 0x37}], 0x2, &(0x7f0000002040)=""/4096, 0x1000}, 0x9}, {{&(0x7f0000003040)=@alg, 0x80, &(0x7f0000005540)=[{&(0x7f00000030c0)=""/83, 0x53}, {&(0x7f0000003140)=""/192, 0xc0}, {&(0x7f0000003200)=""/98, 0x62}, {&(0x7f0000003280)=""/241, 0xf1}, {&(0x7f0000003380)=""/127, 0x7f}, {&(0x7f0000003400)=""/192, 0xc0}, {&(0x7f00000034c0)=""/4096, 0x1000}, {&(0x7f00000044c0)=""/106, 0x6a}, {&(0x7f0000004540)=""/4096, 0x1000}], 0x9, &(0x7f0000005600)=""/236, 0xec}, 0x8}, {{&(0x7f0000005700)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000006b00)=[{&(0x7f0000005780)=""/147, 0x93}, {&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/89, 0x59}, {&(0x7f00000068c0)=""/182, 0xb6}, {&(0x7f0000006980)=""/140, 0x8c}, {&(0x7f0000006a40)=""/148, 0x94}], 0x6, &(0x7f0000006b80)=""/49, 0x31}, 0x4}, {{0x0, 0x0, &(0x7f0000006d00)=[{&(0x7f0000006bc0)=""/108, 0x6c}, {&(0x7f0000006c40)=""/150, 0x96}], 0x2, &(0x7f0000006d40)=""/49, 0x31}, 0x7}, {{&(0x7f0000006d80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000007f80)=[{&(0x7f0000006e00)=""/64, 0x40}, {&(0x7f0000006e40)=""/4096, 0x1000}, {&(0x7f0000007e40)=""/22, 0x16}, {&(0x7f0000007e80)=""/114, 0x72}, {&(0x7f0000007f00)=""/79, 0x4f}], 0x5, &(0x7f0000008000)=""/186, 0xba}, 0x6}], 0x8, 0x40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008380)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000008480)=0xe8) bind$packet(r0, &(0x7f00000084c0)={0x11, 0xf6, r1, 0x1, 0x80000000, 0x6, @local}, 0x14) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x1bd) sendfile(r3, r2, 0x0, 0x5) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:16 executing program 1: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000140)=""/45) write(r1, &(0x7f00000007c0)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a8e7cfc7e65676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6ca56d7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeb051699847087584924be0e7bdbb716ed65e6c3b6035c9d3ac8e6401f07dfbbb8f273ebb47fcd1d24435a0624150cca529249a38b5ceff7e7f65395d518ceb0aa2d903948b19bb4f3c48dc0300000000000000e1450523f0fbd742db2db783749cd87d73f864145afbde2a94c209323125ded4919f4da6ebddd75f886cd12f7a96280b0537c3f38e80405731006c97c92f2620e54eb8d9f0ce587e45be92ec2f728118b789d3e5e8e09aab9cfa66d63cc3b5ca19ae619ec75dbd104c08e65b8ea0a422799a59e394a6e1c2151f31fe4a7062796102509970d832576a16890a79d442eb7e5da42b118acdc978b227c1308d468be6252bfbfe5c5108b4d5a49df1857c1bf8b408c8aec20f395b2d5fe0f5321909ee63caa9c40cbb925ddd2210b5b35d82541199eac1ca5cf8d283e7c699e7e5aff2cac9952f90810b6e3d83e0200c", 0x269) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, 0x0, &(0x7f0000000100)) 03:25:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) [ 254.594858] audit: type=1804 audit(1566098716.473:687): pid=12007 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/185/file0/file0" dev="loop3" ino=255 res=1 03:25:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, 0x0, &(0x7f0000000100)) 03:25:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, 0x0, &(0x7f0000000100)) 03:25:17 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) setxattr$security_capability(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f0000000440)=@v3={0x3000000, [{0x0, 0x8}, {0x6, 0x9}], r0}, 0x18, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) timer_create(0x6, &(0x7f0000000140)={0x0, 0x1a, 0x4}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timer_settime(r4, 0x0, &(0x7f0000000280)={{}, {r5, r6+30000000}}, 0x0) write(r2, &(0x7f0000000600)="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", 0x3a2) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 254.825203] audit: type=1804 audit(1566098716.493:688): pid=12002 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/196/file0/file0" dev="loop4" ino=254 res=1 03:25:17 executing program 1: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000003060d01ff0488fffdffff57ffccad000c000100060d0010091900010c00020000002208f6f0006151548b63c5f26b5806c4ef3375b6202c2a56774244661599b8a576b04c558b80ce7d59bbd0fa4e6734931038418098900200596e0187c602d82be184102190e4a2da6af5e43e716c3e63f483e80d6db1f06e594806b19026d051b181641a2f8ad2799470825d8f4e99aeab13a7a3"], 0x2c}}, 0x0) exit_group(0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) lseek(r2, 0x0, 0x2) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000400)=""/162) ioctl$NBD_DO_IT(r2, 0xab03) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x67cd158b8fcd6120, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) 03:25:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:17 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)='proc\x12', 0x100000080, 0x0) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{{}, 0x12, 0x0, 0xdd29}, {{}, 0x17, 0x6}], 0x30) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321397e63222eb377c929fe77e3f08b16cbb0f5c44024fa39304c405d63909596a875881c6e6fcff090403b0d3a7a2fbe3f40c6b9e49d781692507d5636e50f725bb8dca2c20a067556344ec7a45d621f832ed31febc3f58b52e510aad85ccb2873ce3bb6df5c6d03f071d1447e"], 0x3) clone(0x2102201ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040)={{0xbeee, 0x400}, 0x34}, 0x10) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:25:17 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x1, 0x2) r2 = socket$pptp(0x18, 0x1, 0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x80000001, 0x7, 0x1000}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={r3, @in6={{0xa, 0x4e22, 0x3, @remote, 0x8}}, 0x7, 0x401, 0x2, 0x10001, 0x20}, &(0x7f0000000380)=0x98) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x5, 0x5, 0x2}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x123000, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r4, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @raw_data=[0x8, 0x90000000000, 0x800, 0x800, 0x20, 0x8, 0x7, 0x200, 0x80000000, 0x6, 0x2, 0x2, 0x1, 0x2a4, 0x0, 0x3f, 0x0, 0xfffffffffffff074, 0x7, 0x6, 0x7, 0x0, 0x0, 0xe7, 0x4, 0xdbe3, 0x7fff, 0x7f, 0x3f, 0xfff, 0x400, 0x1]}) fcntl$setflags(r0, 0x2, 0x1) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r5, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) getpid() getsockopt$inet_udp_int(r4, 0x11, 0x67, &(0x7f0000000180), &(0x7f00000001c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10a1, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8990, &(0x7f00000003c0)={'bond/\xfc\x00\x00\x00\x00\x00\x00\x00\x03\x02\x00', @ifru_names='bond_slave_1\x00'}) 03:25:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) [ 254.920372] audit: type=1800 audit(1566098716.683:689): pid=12026 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=17053 res=0 [ 254.991766] audit: type=1804 audit(1566098716.693:690): pid=12026 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir892364557/syzkaller.94IxA4/158/file0" dev="sda1" ino=17053 res=1 [ 255.019185] audit: type=1800 audit(1566098716.843:691): pid=12036 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="loop1" ino=256 res=0 03:25:17 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x7520a99b, 0x7, 0x40, 0xc862}, 0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 255.042756] audit: type=1804 audit(1566098716.853:692): pid=12045 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir487107732/syzkaller.e0SpMP/219/file0/file0" dev="loop1" ino=256 res=1 03:25:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, 0x0) prctl$PR_SET_MM_MAP(0x34, 0xe, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x2400, 0x4004400}) r2 = socket$kcm(0x29, 0x0, 0x0) sendmsg(r2, &(0x7f0000005880)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e21, 0x74, @mcast1, 0xc1f}}, 0x80, &(0x7f0000003540)=[{&(0x7f0000000280)="1f3598fbfaca542c4249c3f73f859180f33185a62e5f817cf352b43e12577a663703384895c50d8006e86a572cda477bf12788922025d1342fc7da8ad475d9a794b5138f4849bac1fd7a64acfd0a7f8cd8da6b7bae3f333e14432924ef7eed1625a698cb785be82bafcb829e6fe28f8e9eb1e149710bbfc787e0adc958", 0x7d}, {&(0x7f0000000340)}, {&(0x7f0000001340)="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", 0x707}, {&(0x7f0000002340)="00678342cfe1202de70d77633483b41d8df9374b9d55f78fc2b9421e18e4e15bc882b39abee1ce2e1aafb61c56062cb096bc14b5c120a899f5de202abbb7e82d26d26741744e3dc145d36603c4", 0x4d}, {&(0x7f00000023c0)="be2a6f40f5f2c90974d0a3a3d9b56a1cf034b5aa483cef5cf1824a706c3f5dbf3376de4bb3290b062a74161ce493b5bc68c6fecb2c790a14b6cdc6333a922d5dfafa44320c25d816e79db115f0f55834db407d2c68d2eea58e6c1f503e5534640172ecc3cafd70d0000614ed17218b15b98170d13591e7ef6ca21a82017f41ff404876566cff3eb8edffdaa9819612f9278acfa9905c71dc4f2465292bd7b35e13710dc5ec32ea8cf2942bbf1c130fe6e8ebc70c939b36ac3ca49dcc9d682194bf22", 0xc2}], 0x5, &(0x7f00000035c0)=ANY=[]}, 0x4000) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000140)={0x1, 0x5e9, 0x4, 0x0, 0x0, [{r0, 0x0, 0x4}, {r1, 0x0, 0x80000000}, {r1, 0x0, 0x7}, {r0, 0x0, 0xffff}]}) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) r4 = accept4(r3, &(0x7f00000058c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80, 0x80800) accept$alg(r4, 0x0, 0x0) [ 255.177443] audit: type=1800 audit(1566098716.863:693): pid=12047 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=17049 res=0 03:25:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:17 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x41, 0x0, 0x0, 0xfffffffffffffffd, 0x116}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 255.286543] audit: type=1804 audit(1566098716.863:694): pid=12047 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir892364557/syzkaller.94IxA4/159/file0" dev="sda1" ino=17049 res=1 03:25:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=ANY=[@ANYBLOB="0004040000000000ff010000000000000000000000000001ff01000000000000001770000000000137"], 0x28) 03:25:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), 0x0) 03:25:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), 0x0) 03:25:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:18 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x80000000) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000140)=""/194) times(&(0x7f0000000240)) ioctl$EVIOCSCLOCKID(r1, 0x80284504, &(0x7f0000000000)=0x18000200) 03:25:18 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x7fff, 0x4, 0x0, 0x2, 0x0, 0x0, 0x80004, 0x2, 0x28, 0x7f, 0xffffffffffffff78, 0x4, 0x200, 0x486, 0x0, 0x0, 0x1000, 0x9, 0x9, 0x5, 0x3, 0x1, 0x8, 0x3, 0x2, 0x7b2, 0x1, 0x100, 0x7, 0xef1, 0x3, 0x6c8, 0x4, 0x7f, 0x148, 0x6, 0x0, 0x78, 0x1, @perf_config_ext={0x3941, 0x8001}, 0x10040, 0x4, 0x200, 0x5, 0x8, 0x200, 0x400}, 0x0, 0x9, r0, 0x3) 03:25:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), 0x0) 03:25:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xd) writev(r0, &(0x7f0000003780)=[{&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="e1f0d099594dc2b5884534ad12657b0130a90338e83685d11a335387cd7d8f7a0e12bd2fdef359a4fd0e794716e8f8c762d427ac806f492d396978da472ffef3784ccb05f0259e4499114aba2c598ff6dd53d1f7c0b3da589c32d6d35e381e1a1fac896a266385220e185aa7dbefe2e4b2f8d935e5bbe59cc82919c3f4c546dbcf24a26ed92c1d94847ecb9a3b49eade53970b18ad9220b60051f25b048dd27fac72a2839c0edd77c72cf06c2fb7650c24ec6b411342ecc673e4c0c429a6fc3462c242f897865f579eeb7bf7b7155c1d734b04406585c5f11557c400149ae239e61fde9501", 0xe5}, {&(0x7f0000001240)="ad1b76dcc7d1620264c368e422fa4ef21d57386fbb18b720cef5fff92706495170605efb9f1e7fade5a127ace03b5cc2a284af3baf6bed615a8e3dd817af6eacef37eded5a93a58fb8edc91af671526023c7c153385dba26202bcbad79686dc6412b4b9c0aaf62525dec582369b8b2545b8532326891ec49e5682480e65bafb90a1c2c503cb1aad7a2bc84453d3af0c5199c266914a32f76026450c78c88eb1d6aba5258f592c8d68a18da76975d634103f935358ad47646ff6cbad32ab78a301af830b2d78cdc92b8a00c0a7bb2bbdd0184275165bfdaaef1f39ed687917343a58d812c346fc8b858c0bbeb36cc0e1715a9ce8a", 0xf4}, {&(0x7f0000001340)="dc1a0eed1fc6800d7774994bdee05977172448823341a604dcd35daeec905a6245aa91ff38d2e37900b3118f3e60dfabc9e022088e96afe444be1804c3128a8e919da21572cd8d89d1d9ad0f096fed6bf583f4f76eed8b88b7bed289f614ac3d00f07dcd23363e39f3fea8dbe0102eb4bf7757957f353e0ae120ea8cc6d6c59443432e85b1712c6e3a9a90324597e4931df2e8a10cb76c2ccaed5ea3facdcb2bb9ea60eb623896deeed392e33d510d6a924a2a10d136d5b52586e2959988f4854023551dcb9b35a2fd524db3618e19cb5399d1637b8604102762", 0xda}, {&(0x7f0000001440)="ebf5a6fb3e420b336e01d4caf65b2c034148a38ca7ca2984916c2e3c6cbe5175f27b4b98ddfa2e951753609296e1440ad33cd12d7426269ab2e6360ec866f4506bb2d9248ac7cb1f411f1ecc09c4cadea4f667863115d2127bbea9ece574d6b8e45c130d8c221ba014f606832f3a0fbcd96fa801dda1e37af8937e9f299ead23a452265215618af9b41d7f36d234", 0x8e}, {&(0x7f0000001500)="76afa1c35862f01d8430564b361896f9c74f82b57650bd867e8f7a427fe62ce5567279e56ada65edcdef10be4acbe2b18445edab2fc1b8bc25191c01da4cfe8d735be4a6b37ae2d38bf601b595e51c9a0c338bbe15d88a39a49bf750d27e9f48ea47e32c7b7887844e8afd82847f1cf37b63b0bbbe514ad636be1b448e41074095cc49b7c287486d5ec7ee671cc541a670bea6f1f892b50c7d8998f6be164607ba51d5b0b870c6f37b95638bcb16cfdf4982d1992ff951523d165106f819cbdc474591c596d147", 0xc7}, {&(0x7f0000001600)="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", 0xfc}, {&(0x7f0000001700)="657942d28704c0824284d3d0c93f48a6c7f37b7d345778410b4c23a3547dc6d22b6d0dcbdb93867346f265fcdd25a5ccb5a3fd7108979d81e1c0e9366574903214d3592dc5e8405641f31266b7d5ebbe8503175d5fc53513b0ed6e06d60df27d846a58", 0x63}, {&(0x7f0000001780)="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", 0x1000}, {&(0x7f0000002780)="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", 0x1000}], 0xa) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46010305009903f6ff370000006103000001000000c105200001000000080009000000008051e5746401000080e7070000060000000100000002000000040000008100000007000000030000000900000002000000060000000002000001010000d10f009bdf2a8f6d254c28352b4d412265eb7d00"/135], 0x8f) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b0000000100ff0714000000450001070000001419001a00120002000e00010009002500"/57, 0x39}], 0x1) 03:25:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:18 executing program 1: r0 = socket(0x10, 0x80003, 0x2) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={0x0}}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x22600, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') getpeername$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000440)=0x14) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="0ae6a142d7580ff0e49836004cc9d970"}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x8000) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000040)={0x0, @reserved}) 03:25:18 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7, 0x1b, 0x2}, 0x7) 03:25:18 executing program 2: unshare(0x400) r0 = socket$inet6(0xa, 0x2, 0x0) syncfs(r0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'nlmon0\x00', {0x2, 0x4e23, @empty}}) 03:25:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), 0x0) 03:25:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:18 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) r1 = accept(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f0000000000)=0x80) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000001c0)={'nr0\x00', 0x80000001}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000380)={0x200, 0x0, 0x0, 0x7730}) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f00000003c0)={0x2, r4}) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000300)) getsockname$llc(r1, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000240)=0x10) fcntl$setstatus(r2, 0x4, 0x400) fcntl$setflags(r2, 0x2, 0x1) pwritev(r2, &(0x7f0000000280)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, 0x0, 0xa000005) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000002c0)) 03:25:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x4000, 0x0) getsockopt$packet_int(r2, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f00000001c0)={0xfffffffffffffffa, 0x0, 0x8001, 0x1540e00000000000}, 0x10) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @local, 0x2}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x0, @loopback}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) 03:25:18 executing program 2: close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x9) socket$inet(0x2, 0x3, 0x1) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=r2) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r3 = signalfd4(r0, 0x0, 0x0, 0x800) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000003c0)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) fcntl$getownex(r3, 0x10, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000980)) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) ftruncate(0xffffffffffffffff, 0x200004) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x5, 0x4, 0x0, 0x2, 0x0, 0x665, 0x80, 0x1, 0x6, 0x4, 0xff1, 0x8001, 0x8000, 0x8001, 0x7fff, 0xfffffffffffffff9, 0x0, 0x401, 0x80, 0x703a, 0x5, 0x65a, 0x3ff, 0x0, 0x6, 0xdb, 0x5b5ead0f, 0x6ff6, 0x0, 0x9, 0xa8c9, 0xfffffffffffffff8, 0x1, 0x4, 0x8, 0x8, 0x0, 0x4, 0x1, @perf_config_ext={0x7, 0x81}, 0x1000, 0x401, 0x401, 0x50f45e84b370e979, 0x7, 0x100, 0xff}, r2, 0x0, r0, 0x8) 03:25:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:18 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="480000000000000014010000010000000000000000000000000000c600000000000000000000000000000000000000000000e700"/63], 0x28e}, 0x0) 03:25:18 executing program 3 (fault-call:7 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:18 executing program 4: syz_open_dev$mouse(&(0x7f0000000a40)='/dev/input/mouse#\x00', 0x2a, 0x2) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x1) r0 = syz_open_dev$radio(&(0x7f00000003c0)='/dev/radio#\x00', 0x0, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x2) ioctl$TIOCCBRK(r1, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x100000000, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x2, 0x0) ioctl$TIOCCONS(r2, 0x541d) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/member\x00', 0x2, 0x0) fchdir(r3) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000440)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000480)=0x69, 0x4) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000500)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000a00)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000009c0)={&(0x7f0000000580)={0x58, r4, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x12a}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r1}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x800) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r6 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000600)="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", 0x1bd) sendfile(r5, r6, 0x0, 0x10000) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000280)={0x5, 0x10, 0xfa00, {&(0x7f00000007c0), r7, 0x2}}, 0x5) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x10000, 0x0) fallocate(r1, 0x1, 0x0, 0x369e5d84) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) 03:25:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:18 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1e, 0x0, &(0x7f00000000c0)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200002, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x1f}}}, &(0x7f0000000040)=0xfffffffffffffc5b) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={r2, 0x5549, 0x6}, &(0x7f00000001c0)=0x8) [ 256.567726] FAULT_INJECTION: forcing a failure. [ 256.567726] name failslab, interval 1, probability 0, space 0, times 0 [ 256.592331] CPU: 1 PID: 12239 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 256.599489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.608842] Call Trace: [ 256.611418] dump_stack+0x138/0x19c [ 256.615047] should_fail.cold+0x10f/0x159 [ 256.619184] should_failslab+0xdb/0x130 [ 256.623138] kmem_cache_alloc_trace+0x2e9/0x790 [ 256.627793] alloc_pipe_info+0xb0/0x380 [ 256.631747] splice_direct_to_actor+0x5d2/0x7b0 [ 256.636402] ? avc_policy_seqno+0x9/0x20 [ 256.640487] ? selinux_file_permission+0x85/0x480 [ 256.645306] ? generic_pipe_buf_nosteal+0x10/0x10 [ 256.650129] ? security_file_permission+0x89/0x1f0 [ 256.655036] ? do_splice_to+0x170/0x170 [ 256.658987] ? rw_verify_area+0xea/0x2b0 [ 256.663025] do_splice_direct+0x18d/0x230 [ 256.667149] ? splice_direct_to_actor+0x7b0/0x7b0 [ 256.671972] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 256.676703] ? __sb_start_write+0x153/0x2f0 [ 256.681007] do_sendfile+0x4db/0xbd0 [ 256.684726] ? do_compat_pwritev64+0x140/0x140 [ 256.689296] ? fput+0xd4/0x150 [ 256.692466] SyS_sendfile64+0x102/0x110 [ 256.696415] ? SyS_sendfile+0x130/0x130 [ 256.700368] ? do_syscall_64+0x53/0x640 [ 256.704324] ? SyS_sendfile+0x130/0x130 [ 256.708278] do_syscall_64+0x1e8/0x640 [ 256.712143] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.716967] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 256.722137] RIP: 0033:0x459829 [ 256.725328] RSP: 002b:00007f6d7cea1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 256.733034] RAX: ffffffffffffffda RBX: 00007f6d7cea1c90 RCX: 0000000000459829 [ 256.740284] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 256.747534] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 256.754795] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6d7cea26d4 [ 256.762039] R13: 00000000004c7005 R14: 00000000004dc630 R15: 0000000000000007 03:25:19 executing program 3 (fault-call:7 fault-nth:1): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18Mo\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x00\x00\xe0b\xd1\r$\xde\xd5@i\x18\xa6k\x00\b\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xeca\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xd3\xaf7\x94PX\x83\x9e\x81\"`\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\x00u\xbd\x88e\xb9j\x90\xbd\xe8\xfdMb\x98\xefod9KO\x8fm\x82?\b\x87#\xd2\x9f\xc2\xfc\r\x8e\x96\xf0\x1b&\a\xf9\n\x80\x83\xd8\xceq\x9d\x91i\x8f\xd6h\xdcT\xdf\x8a\xcb\xa8\xd9\xaf:W#?\x17\xa7\v\xa3\xd1\xeb\xb3\x11%\xe5\xaa\xc0\x89M\a6o\xe3EE@y\x12\xd8\x9a\xceP1\x80\xa7\xbb\x88\x95^\ru\xd2\x017MbMT\xcf\x01\xb2\x81\x05\xb65y\xb3', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7ff, 0x0) syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x0, 0x8000) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, 0x0, 0xb6) write$P9_RSTATu(r1, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32], 0x4) write$P9_RCREATE(r1, &(0x7f0000000080)={0x18, 0x73, 0x1, {{0x21, 0x1, 0x4}, 0x81}}, 0x18) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x8000) syz_emit_ethernet(0x2, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESOCT], 0x0) unshare(0x40000000) flistxattr(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000300)={0x7, 0x70, 0x9, 0x0, 0x40, 0x9, 0x0, 0x4525, 0x8410, 0x1, 0x1, 0x5, 0x4, 0x61, 0x800, 0xffffffffcebc358d, 0x3, 0xf2, 0x649, 0x4, 0x7, 0x3, 0x2, 0x10000, 0x2, 0xfff, 0x0, 0x9, 0x8001, 0xe743, 0x8, 0x10000, 0x5, 0x2, 0xffff, 0xfffffffffffffffc, 0x8, 0x100000001, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x823198f432ea41bc, 0x795, 0x0, 0x1, 0x6, 0x2, 0xfffffffffffffff8}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000200)='./file0\x00', 0x200) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) quotactl(0x96c1, &(0x7f0000000380)='./file0\x00', r3, &(0x7f0000000700)="c032dc94056cd83d688ae8a43b04be8459b425973caf934b1dbd7501f09e7443fb114eea34d186efb2be065a153d78de649d62ef795dbcf84bb6d406ed1bff9313f1fe42ea7b588f73e275a8b8595db9def5e97ff9ee591bfb05a78e876f250b576f936708cd42082368c10e881adf006a20b90b643dce9dcbffe068882c3f9eea9547464b96bb3e3a9e851d00bcffc9dbec89e90c62d43552eb3f08e9b29363de6228436b758af4f97046eed94715a24792d213d2527652033d292a8bde87e4971a68ece950849830c924479a5176ed7c78249e693a8a7d73dc9a49e5d5d7c95b13f284e7") ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000240)) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L+', 0x100}, 0x28, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x602042, 0x20) getdents(r2, &(0x7f0000001580)=""/4096, 0x1000) 03:25:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:19 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x7, 0x10201) ioctl$TIOCCBRK(r0, 0x5428) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000240)={0x1, 0x7f}, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) prctl$PR_GET_FP_MODE(0x2e) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x5, 0x1ff) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1bd) open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0xb6) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 256.989679] FAULT_INJECTION: forcing a failure. [ 256.989679] name failslab, interval 1, probability 0, space 0, times 0 [ 257.036925] CPU: 0 PID: 12271 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 257.044087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.053453] Call Trace: [ 257.056060] dump_stack+0x138/0x19c [ 257.059707] should_fail.cold+0x10f/0x159 [ 257.063889] should_failslab+0xdb/0x130 [ 257.067872] __kmalloc+0x2f0/0x7a0 [ 257.071413] ? kmem_cache_alloc_trace+0x623/0x790 [ 257.076256] ? alloc_pipe_info+0x15c/0x380 [ 257.080495] alloc_pipe_info+0x15c/0x380 [ 257.084564] splice_direct_to_actor+0x5d2/0x7b0 [ 257.084580] ? avc_policy_seqno+0x9/0x20 [ 257.084591] ? selinux_file_permission+0x85/0x480 [ 257.084602] ? generic_pipe_buf_nosteal+0x10/0x10 [ 257.093354] ? security_file_permission+0x89/0x1f0 [ 257.093365] ? do_splice_to+0x170/0x170 [ 257.093375] ? rw_verify_area+0xea/0x2b0 [ 257.093385] do_splice_direct+0x18d/0x230 [ 257.093395] ? splice_direct_to_actor+0x7b0/0x7b0 [ 257.093410] do_sendfile+0x4db/0xbd0 [ 257.093426] ? do_compat_pwritev64+0x140/0x140 [ 257.093449] ? fput+0xd4/0x150 [ 257.093458] SyS_sendfile64+0x102/0x110 [ 257.093466] ? SyS_sendfile+0x130/0x130 [ 257.093475] ? do_syscall_64+0x53/0x640 [ 257.093487] ? SyS_sendfile+0x130/0x130 [ 257.108054] do_syscall_64+0x1e8/0x640 [ 257.108065] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.108082] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 257.108089] RIP: 0033:0x459829 [ 257.108097] RSP: 002b:00007f6d7cea1c78 EFLAGS: 00000246 [ 257.125062] ORIG_RAX: 0000000000000028 [ 257.125068] RAX: ffffffffffffffda RBX: 00007f6d7cea1c90 RCX: 0000000000459829 [ 257.125073] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 257.125079] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 257.125084] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6d7cea26d4 [ 257.125090] R13: 00000000004c7005 R14: 00000000004dc630 R15: 0000000000000007 [ 257.249603] IPVS: ftp: loaded support on port[0] = 21 03:25:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:19 executing program 3 (fault-call:7 fault-nth:2): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0xb18d6047f98e6e3d}, 0x1c}}, 0x0) 03:25:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) close(r0) r1 = socket(0x9, 0x803, 0x4) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000400)=0x7, 0x4) write(r0, 0x0, 0x0) 03:25:19 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f00000001c0)=0x4, 0x4) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) fsetxattr$security_ima(r2, &(0x7f0000000140)='security.ima\x00', &(0x7f00000007c0)=@v2={0x5, 0x2, 0xd, 0x3000, 0x1000, "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"}, 0x100a, 0x3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 257.530627] FAULT_INJECTION: forcing a failure. [ 257.530627] name fail_page_alloc, interval 1, probability 0, space 0, times 1 03:25:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockname$netrom(0xffffffffffffffff, &(0x7f00000006c0)={{}, [@null, @rose, @rose, @netrom, @default, @null, @null, @netrom]}, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x7) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000007c0)={0x16, 0x98, 0xfa00, {0x0, 0x4, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0xa0) add_key$keyring(0x0, &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(r2, 0x0, 0x800) r3 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x400) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720656372797074667320757365723a24e220303030303030303030303032383739343234380000"], 0x2a, 0x0) close(r2) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x24009) ioctl$SIOCGETLINKNAME(r3, 0x89e0, &(0x7f0000000640)={0x3}) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffb) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) 03:25:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:19 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 257.595689] CPU: 1 PID: 12311 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 257.602981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.612367] Call Trace: [ 257.614967] dump_stack+0x138/0x19c [ 257.618613] should_fail.cold+0x10f/0x159 [ 257.622768] ? __might_sleep+0x93/0xb0 [ 257.626669] __alloc_pages_nodemask+0x1d6/0x7a0 [ 257.631351] ? proc_tid_base_lookup+0x2a/0x30 [ 257.635849] ? lookup_open+0x612/0x1860 [ 257.639849] ? __alloc_pages_slowpath+0x2930/0x2930 [ 257.644875] ? __do_page_cache_readahead+0x28e/0x960 [ 257.649992] alloc_pages_current+0xec/0x1e0 [ 257.654352] __page_cache_alloc+0x248/0x3e0 [ 257.658772] __do_page_cache_readahead+0x2d9/0x960 [ 257.663726] ? read_cache_pages+0x5f0/0x5f0 [ 257.668061] ? lock_downgrade+0x6e0/0x6e0 [ 257.672215] ondemand_readahead+0x50a/0xb40 [ 257.672223] ? ondemand_readahead+0x50a/0xb40 [ 257.672239] page_cache_sync_readahead+0xab/0x100 [ 257.672253] generic_file_read_iter+0x1269/0x21b0 [ 257.672267] ? save_stack+0x45/0xd0 [ 257.672272] ? kasan_kmalloc+0xce/0xf0 [ 257.672288] ? save_trace+0x290/0x290 [ 257.672298] ? filemap_range_has_page+0x1e0/0x1e0 [ 257.672304] ? save_trace+0x290/0x290 [ 257.672312] ? fsnotify+0x92f/0x11e0 [ 257.672326] ? iov_iter_pipe+0x9f/0x2c0 [ 257.672337] generic_file_splice_read+0x37d/0x600 [ 257.672343] ? fsnotify+0x11e0/0x11e0 [ 257.690925] ? add_to_pipe+0x340/0x340 [ 257.690942] ? rw_verify_area+0xea/0x2b0 [ 257.690950] ? add_to_pipe+0x340/0x340 [ 257.690959] do_splice_to+0x105/0x170 03:25:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) r2 = socket$unix(0x1, 0xe2b6af03970c6782, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000280)=""/187) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) finit_module(r0, &(0x7f0000000100)='@', 0x24d1331c14f9142e) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x3}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000080)={'batadv0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="0c8ce54b51971312d034bfda0750b2705200b050ccaacebacc0ffbc6843d1e433dca963b15c7659afcbad2a7f00a5eeb1672d3e02d71fc41195e88345915c3ae794f507ac32027e4a25107f847525fe224f42e4ea84501ace4931ce53b9af4ad6ed9534af05e5f96cbdbca95f72161a97d84de51d09ec972c123b10c47d5cf23a14709e35b9c6719789d8d4155639d3adbe933414f3bc16e82071f429385"]}) r5 = dup2(r0, r4) r6 = dup3(r5, r1, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r6, 0x10f, 0x83, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 257.690969] splice_direct_to_actor+0x222/0x7b0 [ 257.707449] ? generic_pipe_buf_nosteal+0x10/0x10 [ 257.707458] ? do_splice_to+0x170/0x170 [ 257.707466] ? rw_verify_area+0xea/0x2b0 [ 257.707472] do_splice_direct+0x18d/0x230 [ 257.707482] ? splice_direct_to_actor+0x7b0/0x7b0 [ 257.707497] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 257.707505] ? __sb_start_write+0x153/0x2f0 [ 257.707515] do_sendfile+0x4db/0xbd0 [ 257.707531] ? do_compat_pwritev64+0x140/0x140 [ 257.707545] ? fput+0xd4/0x150 [ 257.707556] SyS_sendfile64+0x102/0x110 [ 257.707564] ? SyS_sendfile+0x130/0x130 [ 257.707576] ? do_syscall_64+0x53/0x640 [ 257.715057] ? SyS_sendfile+0x130/0x130 [ 257.715069] do_syscall_64+0x1e8/0x640 [ 257.715078] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.715093] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 257.715102] RIP: 0033:0x459829 [ 257.723896] RSP: 002b:00007f6d7cea1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 257.723908] RAX: ffffffffffffffda RBX: 00007f6d7cea1c90 RCX: 0000000000459829 [ 257.723914] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 257.723919] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 257.723925] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f6d7cea26d4 [ 257.723930] R13: 00000000004c7005 R14: 00000000004dc630 R15: 0000000000000007 03:25:20 executing program 3 (fault-call:7 fault-nth:3): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:20 executing program 2: r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:25:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18Mo\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x00\x00\xe0b\xd1\r$\xde\xd5@i\x18\xa6k\x00\b\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xeca\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xd3\xaf7\x94PX\x83\x9e\x81\"`\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\x00u\xbd\x88e\xb9j\x90\xbd\xe8\xfdMb\x98\xefod9KO\x8fm\x82?\b\x87#\xd2\x9f\xc2\xfc\r\x8e\x96\xf0\x1b&\a\xf9\n\x80\x83\xd8\xceq\x9d\x91i\x8f\xd6h\xdcT\xdf\x8a\xcb\xa8\xd9\xaf:W#?\x17\xa7\v\xa3\xd1\xeb\xb3\x11%\xe5\xaa\xc0\x89M\a6o\xe3EE@y\x12\xd8\x9a\xceP1\x80\xa7\xbb\x88\x95^\ru\xd2\x017MbMT\xcf\x01\xb2\x81\x05\xb65y\xb3', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7ff, 0x0) syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x0, 0x8000) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, 0x0, 0xb6) write$P9_RSTATu(r1, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32], 0x4) write$P9_RCREATE(r1, &(0x7f0000000080)={0x18, 0x73, 0x1, {{0x21, 0x1, 0x4}, 0x81}}, 0x18) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x8000) syz_emit_ethernet(0x2, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESOCT], 0x0) unshare(0x40000000) flistxattr(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000300)={0x7, 0x70, 0x9, 0x0, 0x40, 0x9, 0x0, 0x4525, 0x8410, 0x1, 0x1, 0x5, 0x4, 0x61, 0x800, 0xffffffffcebc358d, 0x3, 0xf2, 0x649, 0x4, 0x7, 0x3, 0x2, 0x10000, 0x2, 0xfff, 0x0, 0x9, 0x8001, 0xe743, 0x8, 0x10000, 0x5, 0x2, 0xffff, 0xfffffffffffffffc, 0x8, 0x100000001, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x823198f432ea41bc, 0x795, 0x0, 0x1, 0x6, 0x2, 0xfffffffffffffff8}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000200)='./file0\x00', 0x200) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) quotactl(0x96c1, &(0x7f0000000380)='./file0\x00', r3, &(0x7f0000000700)="c032dc94056cd83d688ae8a43b04be8459b425973caf934b1dbd7501f09e7443fb114eea34d186efb2be065a153d78de649d62ef795dbcf84bb6d406ed1bff9313f1fe42ea7b588f73e275a8b8595db9def5e97ff9ee591bfb05a78e876f250b576f936708cd42082368c10e881adf006a20b90b643dce9dcbffe068882c3f9eea9547464b96bb3e3a9e851d00bcffc9dbec89e90c62d43552eb3f08e9b29363de6228436b758af4f97046eed94715a24792d213d2527652033d292a8bde87e4971a68ece950849830c924479a5176ed7c78249e693a8a7d73dc9a49e5d5d7c95b13f284e7") ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000240)) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L+', 0x100}, 0x28, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x602042, 0x20) getdents(r2, &(0x7f0000001580)=""/4096, 0x1000) 03:25:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x100, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000980)="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", 0xffffff72) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:20 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x40000, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x101400, 0x0) fanotify_mark(r0, 0x8, 0x10, r1, &(0x7f0000000400)='./file1\x00') r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f00000001c0)='./file0\x00', 0x100, 0x1, &(0x7f0000000280)=[{&(0x7f0000000240), 0x0, 0x1}], 0x10004, &(0x7f0000000300)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@noattrs='noattrs'}, {@jdev={'jdev', 0x3d, './file1'}}, {@noquota='noquota'}, {@replayonly='replayonly'}], [{@smackfsroot={'smackfsroot'}}, {@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}]}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x1bd) sendfile(r3, r4, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR], 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:20 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) sysinfo(&(0x7f0000000100)=""/243) ptrace$getregs(0xc, r0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0xcf, 0xf12a7d593e433481) poll(&(0x7f00000000c0)=[{r1, 0x20}], 0x1, 0x3) 03:25:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x20000, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_newaddr={0x40, 0x14, 0x509, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x4}, @IFA_LOCAL={0x14, 0x2, @local}]}, 0x40}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') write$P9_RSETATTR(r2, &(0x7f0000000080)={0x7, 0x1b, 0x2}, 0x7) 03:25:20 executing program 4: pipe(&(0x7f00000001c0)) r0 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x5, 0x8000) ioctl$TIOCCBRK(r0, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1bd) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) open(&(0x7f0000000280)='./file0\x00', 0x400000, 0x1c0) ioctl(r3, 0x99, &(0x7f0000000140)="42129a2d40176d3d0b77aede9d33012f91d11f") ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) 03:25:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x61, 0x100000001, @buffer={0x0, 0xcd, &(0x7f00000003c0)=""/205}, &(0x7f0000000240)="aea120bac55222a216fbda34c1a8283657f84132382624bf5c6e3eb1aab4fd7a1391c321ec2025d0ca7e999e0ac8699fe71412cdaf84ef70a4392ad12680cc8f1190de8164ea052dd59d4a209048618a9286a9d8ae747ae205a0f6dd2334b60e6a", &(0x7f00000007c0)=""/251, 0x8b, 0x12, 0x0, &(0x7f0000000140)}) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f00000001c0)=0x1d002) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:20 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x4, 0x4002) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x80000, 0x0) ioctl$TIOCCBRK(r1, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x1bd) sendfile(r3, r4, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000340), &(0x7f0000000100)=0x8) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000240)) 03:25:20 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r0, 0x406, r1) getpeername$inet6(r3, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x28, 0x1, 0x0, &(0x7f0000000000)=0xffffffffffffff42) 03:25:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000140)={0xfffffffffffffffb, 0x1000}) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) bind$unix(r1, &(0x7f0000000240)=@file={0x1, './file0/file0\x00'}, 0x6e) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) [ 258.984895] attempt to access beyond end of device 03:25:21 executing program 5: syz_open_dev$ndb(0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000200)=""/139, 0x8b}, {0x0}, {0x0}, {&(0x7f0000000400)=""/71, 0x47}], 0x4, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0xff4) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:25:21 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/205, 0xcd, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x10000, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(r1, 0x3b71, &(0x7f0000000040)={0x20, 0x1, 0x5, 0x8001, 0x8}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:25:21 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x4000, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x20000, 0x10) fchdir(r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000012}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000280)=0x8) [ 259.017436] loop0: rw=2049, want=78, limit=64 03:25:21 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR], 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xfffffd8f) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0x0, 0x3}) r2 = dup(r1) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000040)=0x8) fcntl$addseals(r1, 0x409, 0x4) [ 259.039807] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:25:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x4) syz_mount_image$nfs(&(0x7f0000000140)='nfs\x00', &(0x7f00000001c0)='./file0\x00', 0x6, 0x3, &(0x7f0000000300)=[{&(0x7f0000000240)="074e7245426a53f13db11cfcef0db9e2cdee73ff", 0x14, 0x1}, {&(0x7f00000003c0)="241174579ef3e7fba8e558637f94d482a433e0c4aa02f759b87fc5e335b2508159b149a222a8e2f929f1b25b235478bd6c2f8caab2d2878d5fddb471d82caa495a3ecd5170ba8227b952a1e55ddc70f83b4c510474ccfd38a4ee57fb85e1e9c1f32f73ac11f5c66532ca2aa762a06d5dafafd19283841d1335675f92b2594f966a6754e93b9c34", 0x87, 0x7fffffff}, {&(0x7f0000000280)="5347deadf7e49fdf", 0x8, 0x123c}], 0x2000000, &(0x7f0000000480)='^/selfsecurity!\x00') fcntl$getownex(r1, 0x10, &(0x7f00000004c0)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1a2) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f0000000000)="11abdca4fd5e0b12867bf0") r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000200)=0xd831) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x8000, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/306]}, 0x1aa) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) r4 = dup3(r2, r2, 0x80000) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r4, 0x408c5333, &(0x7f0000000040)={0x371, 0x52, 0x7f, 'queue1\x00', 0x6}) r5 = msgget(0x2, 0x7c) msgctl$IPC_INFO(r5, 0x3, &(0x7f0000000180)=""/67) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f0000000300)={0x30, 0x5, 0x0, {0x0, 0x2, 0x0, 0x3}}, 0x30) write$rfkill(r4, &(0x7f0000000100)={0x1, 0x9, 0x0, 0x0, 0x1}, 0x8) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$SG_GET_VERSION_NUM(r4, 0x2282, &(0x7f00000002c0)) ioctl$DRM_IOCTL_IRQ_BUSID(r4, 0xc0106403, &(0x7f0000000340)={0x100000000, 0x1, 0x7ff, 0x7}) 03:25:21 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) fcntl$dupfd(r0, 0x406, r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x880, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000c00)=ANY=[@ANYBLOB="040000000000000002004e20ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000002004e227f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e2300000fff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e2300600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e2300"/1042], 0x410) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:21 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x1, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x84000, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x40, 0x101) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000040)={0x3, 0x1}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, 0x0) 03:25:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x10000) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:21 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff0c, &(0x7f0000000080)=[{&(0x7f0000000280)=""/254, 0xa7}], 0x1, 0xffffffffffffffff, 0x1000}, 0x0) [ 259.345390] kauditd_printk_skb: 55 callbacks suppressed [ 259.345398] audit: type=1800 audit(1566098721.553:750): pid=12476 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="loop4" ino=276 res=0 03:25:21 executing program 2: mmap(&(0x7f0000000000/0xa73000)=nil, 0xa73000, 0x2, 0x32, 0xffffffffffffffff, 0x0) getpgrp(0x0) gettid() r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) mq_timedsend(r0, &(0x7f0000000040)="bab263f7a0e36a25dc08a3c2a4e3c95cb7ea396c73b43124c10d2f6b347ad2b85e68d61b1cf0dc11e9b41ae1db85fc92b7a0aba76b0260ad293b664f38244ca81cf2f36e0155b9826a1b0c7aa5753ea5d60c5fe0f95918b4a48fbca4f268953fd5cf3c211a6307bfc7f81ed442e9b7749a409e61c78aa98407735a4c40", 0x7d, 0x0, &(0x7f0000000140)={r1, r2+30000000}) rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000200)={0x7fffffffffffff66}, &(0x7f0000a72ff0), 0x0, 0x8) 03:25:21 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x1, 0x4, 0xfffffffffffffffd, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:21 executing program 1: r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x6, 0x80000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000200), 0x1) sendto$inet(r0, &(0x7f0000000140)="5d9c6a35576d06f554cd36a9969f373e5b1fb07ee7ac8546dad53b11ecaf09780bea0eb6f43c2da4215badfb547d8297dfa11d887f7fd13a2be95c6a0c23df21ae899d40496d6127a6f172ed23f8157c0147c2c7e2b1aec4396c4cd86a9cb2bc9b9cb40c343d79", 0x67, 0x404c8c1, &(0x7f00000001c0)={0x2, 0x4e24, @remote}, 0x10) r1 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000006000)=@llc={0x1a, 0x304, 0x6, 0x6, 0x3, 0x6, @random="4877fbe97815"}, 0x80, &(0x7f0000007f80)=[{&(0x7f0000000000)="0117eb2e1fff52bf8cdeb3f894a7c77b5309a012f0c411486632c37330a06656208ec8beff066bd13a8f6f9015cc7740053051904e9554407a7ce249318995dcf596ed3f8875aee190b32c4123826a09", 0x1}], 0x0, 0x0, 0xfffffffffffffdcf}, 0x1) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x4, 0x200) [ 259.535337] audit: type=1804 audit(1566098721.583:751): pid=12476 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/210/file0/file0" dev="loop4" ino=276 res=1 03:25:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) fsetxattr$security_selinux(r0, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:pam_console_exec_t:s0\x00', 0x28, 0x3) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000004c0)='./file0\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x401, 0xfffffffffffffffd, 0x4, 0x97, 0x88}, &(0x7f0000000300)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000340)={r3, 0x4, 0x7}, &(0x7f0000000480)=0x8) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000140)=""/1, 0x1, 0x0) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x6004, 0x0) write(r2, &(0x7f0000000600)="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", 0x1a2) sendfile(r2, r4, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) [ 259.730940] audit: type=1800 audit(1566098721.783:752): pid=12497 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=17066 res=0 [ 259.826920] audit: type=1804 audit(1566098721.803:753): pid=12497 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/201/file0/file0" dev="sda1" ino=17066 res=1 03:25:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR], 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:22 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f00000003c0)='./file0\x00') r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) splice(r1, &(0x7f0000000080)=0x3, r0, &(0x7f00000000c0), 0x56, 0x2) write$binfmt_aout(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB='\x00'], 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x5d) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setxattr$trusted_overlay_origin(&(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0, 0x0) 03:25:22 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f00000007c0)="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", 0x22d) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:22 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000011c0)='cgroup.clone_children\x00', 0x2, 0x0) r2 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000300)) r3 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x7}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e21, @local}}, 0x4, 0xed6, 0xba7, 0x100, 0x7f}, &(0x7f0000000280)=0x98) r5 = dup3(r2, r1, 0x0) r6 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x20, 0xa6597619dc45af92) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000080)=r6) 03:25:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) [ 259.895198] attempt to access beyond end of device [ 259.902084] loop0: rw=2049, want=78, limit=64 [ 259.917350] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:25:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x0, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fstat(r2, &(0x7f0000000ac0)) stat(0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) write$binfmt_elf32(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/1955], 0x7a3) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB='\b', @ANYBLOB='\b\x00\a\x00', @ANYRES32=0x0], 0x7, 0x1) sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, 0x0, &(0x7f0000000000)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000340)={0x5, &(0x7f0000000300)=[{}, {0x0, 0x0, 0x0, 0xfffffffffffffe3b}, {0xaf58000000000000, 0x0, 0x0, 0xdf}, {0x1, 0x0, 0x80000001, 0x8}, {0x4}]}, 0x10) r3 = fcntl$dupfd(r1, 0x0, r0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r5 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000240)='/dev/zero\x00') sendfile(r1, r4, 0x0, 0x102000002) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x2) bind$tipc(r3, &(0x7f0000000180)=@name={0x1e, 0x2, 0x1, {{0x41, 0x2}}}, 0x10) [ 259.965946] audit: type=1800 audit(1566098721.913:754): pid=12503 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="loop4" ino=277 res=0 03:25:22 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x80010, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, 0x0) r0 = dup(0xffffffffffffff9c) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f00000002c0)={0x0, @bt={0x81, 0x7, 0x1, 0x3, 0x1e6, 0x7, 0x0, 0x0, 0x401, 0x100000001, 0xfff, 0x0, 0x2, 0x101, 0x4, 0x2}}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) fcntl$notify(r1, 0x402, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000cc0)={"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"}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000480)='/dev/urandom\x00', 0x20080, 0x0) r4 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000100)={0x14, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB="1163484000000000000000000000000000004a5c"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000004c0)="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", 0x468, 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000180)={r5}, &(0x7f00000011c0)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6372637431306469662d67656e6572696300000000c14b33a200"/83], 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000380)=""/254, &(0x7f0000000140)=0xfe) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000010c0), 0x4) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ubi_ctrl\x00', 0x400000, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000001140)='cpuset.effective_cpus\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x19, &(0x7f0000001180)=0xfffffffffffffa01, 0x4) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x53, 0xb1c, 0x7, {0x5, 0x7}, {0x2, 0x5}, @period={0x0, 0x0, 0x7f, 0x65, 0x7, {0x1, 0x4, 0x5}, 0x0, 0x0}}) clone(0x20002104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) socket$inet(0x2, 0x0, 0x0) 03:25:22 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x40c480) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x4) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x440000, 0x0) ioctl$TIOCCBRK(r0, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 260.136633] audit: type=1804 audit(1566098721.913:755): pid=12503 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/211/file0/file0" dev="loop4" ino=277 res=1 [ 260.324692] audit: type=1400 audit(1566098722.183:756): avc: denied { associate } for pid=12520 comm="syz-executor.1" name="bus" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 260.418923] audit: type=1800 audit(1566098722.223:757): pid=12525 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16518 res=0 03:25:22 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f0000000000)='posix_acl_accesscgroupproc\x00', 0xffffffffffffffff}, 0x30) prlimit64(r0, 0x7, &(0x7f00000001c0)={0x400000006, 0xfffffffffffffffd}, 0x0) socket$tipc(0x1e, 0x2, 0x0) 03:25:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x29}}}, 0x100, 0x7e340191}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r3, 0x400000000000000}, &(0x7f00000001c0)) 03:25:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:22 executing program 5: r0 = getpgrp(0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) fcntl$getflags(r1, 0x401) rt_tgsigqueueinfo(r0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffffffffffa}) [ 260.447934] audit: type=1804 audit(1566098722.223:758): pid=12525 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/212/file0" dev="sda1" ino=16518 res=1 [ 260.658754] audit: type=1800 audit(1566098722.273:759): pid=12531 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=278 res=0 03:25:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:23 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x37, &(0x7f00000003c0)=""/228, &(0x7f0000000240)=0xe4) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000140)) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0xfff, 0x8, 0x80, 0x4, 0x0, 0x8000, 0x104, 0x8, 0x8001, 0x0, 0x7, 0xff, 0x7, 0x8, 0x4, 0xd8, 0x7, 0x200, 0x155, 0x2, 0x7fffffff, 0x4, 0x4, 0x709e, 0x2, 0x8c, 0x7d, 0x5, 0x0, 0x6, 0x8, 0x400, 0xff, 0x5, 0xf1, 0x40, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000280), 0x2}, 0x4, 0x7, 0x100000001, 0xb1465df401d94e97, 0x100, 0x1, 0x800}, 0xffffffffffffffff, 0xa, r0, 0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000001c0)) 03:25:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file1\x00', 0x0, 0x1) utime(&(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)={0x10001, 0x2}) fchdir(r0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="d4d35148ec1f383965df337a4c4844d83887930cb678973bc051ef0b6dcb14bb714d606dea8b10378e72e52956d09b3b5085e0b5576dd440d2f78622b56416485a18d2318535b44083650454ed9a77ef9b203fdad2ef0dfd779ef444a5a4f0dd97847f2febb3897b357dab1400"]) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000300)={0x3, 0x0, {0x57, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x5, {0x0, 0x5}, 0x0, 0x0}}}) perf_event_open(&(0x7f0000000000)={0x1, 0x3ca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:23 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket(0x0, 0xa, 0x0) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000080)=0x400, 0x4) bind$rds(r1, &(0x7f00000000c0)={0x2, 0x4e22, @broadcast}, 0x10) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000)=0x1, 0x4) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x200, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000300)=0x5) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x4, 0x8, 0x1000}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r3, 0x9, 0x3, [0x9, 0x4, 0x7]}, &(0x7f00000001c0)=0xe) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000200), &(0x7f0000000240)=0x4) sendmsg$rds(r0, &(0x7f0000001380)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="480000000000000014010000e1ffffffffffffff00000000000000000100000000", @ANYPTR=&(0x7f0000000880)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB="080000000000f66300000000"], @ANYBLOB='\f\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0100"/24], 0x48}, 0x0) 03:25:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x29}}}, 0x100, 0x7e340191}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r3, 0x400000000000000}, &(0x7f00000001c0)) 03:25:23 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000500)={0x0, 0x0, 0x0, {0x5, @raw_data="c7b088c991e6b1d7b3bdc4198b80024f5bf29d9822293d705c72919f91ae3394ef4233ef02172aa26fd034b93e5c381ce03431925f1dfaf94ff3bdc13e35381ad22fc05e1f8c60900f5e2d55742f38706705230e548af8bf77349fb6ea03bcdecc3ce7d3e2bd7dfb86591c4ebb6918667b0ff817b593556a67700e15fd8689930168efca4fc218918d3f7a8a86b4720fe8c11c58fbe5ac87e184e0282ddbd6a12201bd02b233dc9b8c8b0ee6b554ece7677aaaef3c723e0e37ba652149702c693ab8964ae9b966e2"}}) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000140081ae08060804000f000010ff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x40000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$vcsa(0x0, 0x5, 0x0) [ 260.966781] 9pnet_virtio: no channels available for device 127.0.0.1 03:25:23 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000001c0)={0x0, 0x6, 0x400b54, 0x800000000008}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000003c0)={r3, @in6={{0xa, 0x4e20, 0x8, @mcast1, 0x101}}}, 0x84) 03:25:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000002000209500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x2}, 0x10}, 0x70) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="b3255243c468d780360000a50000", 0x0, 0xb20c}, 0x28) 03:25:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x7c) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='ma\xf0s\x02') sendfile(r1, r3, 0x0, 0x80040006) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup2(r4, r1) timer_settime(0x0, 0x0, &(0x7f0000000180)={{}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x1004000000015) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r5, 0x800443d3, &(0x7f0000000080)={{0x3, 0x0, 0x374, 0x3f, 0x101, 0x4}, 0x16, 0x100000001, 0x100000001}) 03:25:23 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000500)={0x0, 0x0, 0x0, {0x5, @raw_data="c7b088c991e6b1d7b3bdc4198b80024f5bf29d9822293d705c72919f91ae3394ef4233ef02172aa26fd034b93e5c381ce03431925f1dfaf94ff3bdc13e35381ad22fc05e1f8c60900f5e2d55742f38706705230e548af8bf77349fb6ea03bcdecc3ce7d3e2bd7dfb86591c4ebb6918667b0ff817b593556a67700e15fd8689930168efca4fc218918d3f7a8a86b4720fe8c11c58fbe5ac87e184e0282ddbd6a12201bd02b233dc9b8c8b0ee6b554ece7677aaaef3c723e0e37ba652149702c693ab8964ae9b966e2"}}) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000140081ae08060804000f000010ff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x40000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$vcsa(0x0, 0x5, 0x0) 03:25:23 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x2400) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x3, 0x2, 0x9, 'queue1\x00', 0x1}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e21, @rand_addr=0x9e}, @in6={0xa, 0x4e21, 0x100, @local, 0xfffffffffffff000}, @in6={0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e23, @rand_addr=0x100000001}], 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) splice(r0, &(0x7f00000001c0), r1, &(0x7f0000000200), 0x5, 0xb) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000c07e98)=ANY=[@ANYBLOB="54010000100687c50400000000009f9f4a0000000000ac14ffaa008758bcca0000000000000000000000ff000000000600000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000001c0017007b0000000000000000000000000000000000ebff00000000480001006d643500"/268], 0x154}}, 0x0) pipe2$9p(&(0x7f0000000280), 0x4000) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) [ 261.408596] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1552 sclass=netlink_xfrm_socket pig=12653 comm=syz-executor.1 [ 261.493087] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1552 sclass=netlink_xfrm_socket pig=12653 comm=syz-executor.1 03:25:23 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f00000007c0)) r1 = open(&(0x7f0000000300)='./file0\x00', 0x40000, 0x100000104) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) r3 = semget$private(0x0, 0x4, 0x20) semctl$SEM_INFO(r3, 0x7, 0x13, &(0x7f0000000240)=""/93) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) ioctl$LOOP_CLR_FD(r1, 0x4c01) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:23 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000500)={0x0, 0x0, 0x0, {0x5, @raw_data="c7b088c991e6b1d7b3bdc4198b80024f5bf29d9822293d705c72919f91ae3394ef4233ef02172aa26fd034b93e5c381ce03431925f1dfaf94ff3bdc13e35381ad22fc05e1f8c60900f5e2d55742f38706705230e548af8bf77349fb6ea03bcdecc3ce7d3e2bd7dfb86591c4ebb6918667b0ff817b593556a67700e15fd8689930168efca4fc218918d3f7a8a86b4720fe8c11c58fbe5ac87e184e0282ddbd6a12201bd02b233dc9b8c8b0ee6b554ece7677aaaef3c723e0e37ba652149702c693ab8964ae9b966e2"}}) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000140081ae08060804000f000010ff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x40000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$vcsa(0x0, 0x5, 0x0) 03:25:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000080)=""/149) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @empty}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x2b}, 0x0, @in6=@ipv4={[], [], @local}}}, 0xe8) sendto$inet6(r0, 0x0, 0x0, 0x1020000004, &(0x7f0000000040)={0xa, 0x0, 0x5, @loopback}, 0x1c) 03:25:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x17f) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000204, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:25:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) [ 261.610715] attempt to access beyond end of device [ 261.615884] loop0: rw=2049, want=78, limit=64 [ 261.625521] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:25:23 executing program 1: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create(0xe) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x60000008}) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000100)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f0000000100)=ANY=[@ANYBLOB]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000280)=0x1) write(r4, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x4c080) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 03:25:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x10010) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0xffffffc4) 03:25:24 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x100010016) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:24 executing program 2: r0 = socket(0x11, 0x7, 0xffffffff00000000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000180)=0x40, 0x8) syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x2, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x2, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x5]}, @mcast2}}}}}}}, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000000c0)=""/125, &(0x7f0000000140)=0x7d) 03:25:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000180)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)}], 0x1, &(0x7f0000000280)=""/211, 0xd3}, 0x40) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_group_source_req(r2, 0x0, 0x2, &(0x7f00000007c0)={0x6, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @broadcast}}}, 0x36f) 03:25:24 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open$dir(&(0x7f0000000140)='./file0\x00', 0x10000, 0x10) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x8000, 0x4) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) sendfile(r1, r3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000001c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) pwritev(r1, &(0x7f0000000580)=[{&(0x7f0000000240)="74bbf06fba3849465904c53f503971c073e670ab1b0e0248", 0x18}, {&(0x7f0000000400)="5a0a6161677369f7a503f65945e79596e236c19ef9520e51a77f14ff748c874b80a77d85259cd77581b01bd100de0318bb59e591803a721d33dba996d148104ddd3ad312916f601ad7d202a1921b130ab66ce643ec063c05b0c208254622d79c337f1f50d5b2a4a01c24e5503e26a5ad8ad1e3d0c77b4b025d5c7ea6c0bb805426ba29c6e7e86d68b8b487da81669561df84aa5e0cf322aefdb6aae1a7aa9f316e52b145f7", 0xa5}, {&(0x7f0000000300)="909a569fa295123a6ec65ad0014250d4aaf3909e929c79163ab6a6d504c5819b154c169875e8a543dbafcfb4932ed8c059b552ca56769e51223a6c08300ffea0e35049ec7bbce0ecf16a921e015c69c881a3237699fb901e4b46c05ccb1151b971", 0x61}, {&(0x7f00000007c0)="5643a6cb7614fde8cb8bdd9cd50830a827722ca0ddaf717deab8c2526526e8b3c422cdea8b6acde1982f3d08681db76c80dab0efb63de78594fc36c71bf66a9da04f1efe6db4d42614effb7685c6e7f49bac0ace1d881619a90f9a7a5be012dccc080c4ca51e536d99997b01bd73480a1246846f60fc8fb71b2bd436c3c9a1f4a5362372b9c6274f5a92bdd8a7cd11f23d9fc2443e0a941465d952349e21cb73e61e9a93101308e16d60c0b995dafea208b05ada398e281ae62125ead756f44d52a0b84d21740491ab05afa090b9b6854763ffc1ee9ef1", 0xd7}, {&(0x7f00000004c0)="2e0babc21689774cbc300d40a860f69db98fb659f98bdfd75efd8911af9c39f6210268f75f0cc386bf06a5ca54d3e7c4ff90bc2ee9831aabdd64c9b175dceb15d9181c1176c7c6e646ccefbfb32e176801ed84b771799e668760911593e556531facc2", 0x63}, {&(0x7f00000008c0)="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", 0xfd}, {&(0x7f00000009c0)="357e5379cb24349542c01ca050e617fff956a2ea36ff4c7aba4a34deb3e4014ff649656b8d06b7e2c7761bbba8aa23479f08d1209c755c12c92e0ac668e223a4a9373edff7c2043ca84778771a6945c5229804157db0cb220c285664fe7c0a00c25bb3f1b582b4eda8ba31325b929e0950181fc701c73ef790b51c3ae30a83121ba20b60ec669cfd770f13bd5026853d834d1dbde13bd47a1b6a68e74de84ba1eb2c45aea53099947e37f11534670ad2d7ae2203e9d9ac61d72e80b04c8dc98adcceaa8d3e8ba0f400b922942428af014b7bcc4b5becfec8d20574a122e946e893618bbe6fc1de4b5e4809f0", 0xec}], 0x7, 0x0) 03:25:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x703141, 0x4) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x10010) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0xffffffc4) 03:25:24 executing program 2: semget$private(0x0, 0x3, 0x100000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000000c0)=""/148, 0x94}], 0x1, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000000f3, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f00000002c0)=ANY=[]) 03:25:24 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x8, 0x3cf61658eaf01557) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:24 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc040563d, &(0x7f0000000880)={0x0, 0x0, {0x0, 0x0, 0x0, 0x2, 0x4, 0x3, 0x0, 0x7}}) [ 262.479383] attempt to access beyond end of device 03:25:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) [ 262.505039] loop0: rw=2049, want=78, limit=64 [ 262.513472] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:25:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18\xf2\xb9\x06\xe2-\x10\xad\xdc\xf2?t\x99\xbf\x90\xed/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xae\xc7\xfbB\x86j\xa9\x12\x8c\x9e\x85uJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_j', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cgroup.clone_children\x00', 0x2, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200081, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f0000000080)={0x2, r3}) preadv(r1, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/10, 0xa}], 0x1, 0x0) 03:25:24 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x10000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x5e3a2b081310bae5}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, r3, 0x10, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcbc8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x90}, 0x850) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x0) ftruncate(r0, 0x6) ioctl$TIOCGPKT(r4, 0x80045438, &(0x7f0000000040)) sendfile(r1, r4, 0x0, 0x80001d00c0d0) 03:25:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e23, 0x19ad, @loopback, 0x4}}, [0x8, 0x100, 0x7f, 0x20, 0x0, 0xd89, 0x7e, 0x18, 0x0, 0x7fffffff, 0x7, 0x79b73189, 0xfff, 0x8, 0x4ba]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000008c0)={r1, @in6={{0xa, 0x4e20, 0x2b, @remote, 0x8}}, 0x7ff, 0x9}, 0x90) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000a00)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000a40)={'vcan0\x00', r3}) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000140)={0x7ff, 0x6, 0x84, &(0x7f00000003c0)="b3659c8db01ab9a224cbe5036691ad78fe8c1eb30b6f7710d81bc64cea89c4ae127429414f66a03e12eaf0dab58dfabd6b5d7f463bb6e44b68779b9029dcbd9210ef67222d3cdcb2d4f365c48e9e4549873d6d9ffad942ccc539e846906e28d6fa8a81c31b55f5ce2ce73bf7f7472d0b32c4aaf7c452679aacdb2be5694b66b31cc6dec2"}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r5 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mount$9p_xen(&(0x7f00000001c0)='vcan0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x1000, &(0x7f0000000480)={'trans=xen,', {[{@afid={'afid', 0x3d, 0x100000001}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@subj_user={'subj_user', 0x3d, 'vmnet0,trustedGPLwlan0+system'}}, {@subj_role={'subj_role', 0x3d, '\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'eth0#'}}, {@dont_measure='dont_measure'}]}}) write(r4, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r4, r5, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000300)=0x8) 03:25:24 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x8, 0x24c841) bind$unix(r0, &(0x7f0000000400)=@abs={0x9f50b5c2b9fbde84, 0x0, 0x4e20}, 0x6e) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x100, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) readv(r4, &(0x7f0000000340)=[{&(0x7f0000000280)=""/189, 0xbd}], 0x1) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r5, 0x8200) r6 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendfile(r3, r6, 0x0, 0x10001) write$FUSE_STATFS(r5, &(0x7f0000000100)={0x60}, 0x60) sendfile(r3, r4, 0x0, 0x800100000002) ioctl$PPPIOCGFLAGS1(r6, 0x8004745a, &(0x7f0000000480)) creat(&(0x7f0000000240)='./bus\x00', 0x0) r8 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1bd) sendfile(r2, r8, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:24 executing program 5: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r3, 0x208200) r4 = open(&(0x7f0000000280)='./bus\x00', 0x80800, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000380)={[], 0x1f, 0x186a, 0x49e6, 0x5, 0x1, r5}) read(r4, &(0x7f0000000180)=""/19, 0xfffffe47) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x1840}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000000)={0x0, r6}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f00000001c0)={r7}) close(r2) 03:25:24 executing program 1: r0 = socket$inet6(0xa, 0x400200000001, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}]}) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000000c0)) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f00000001c0), 0x4) r2 = open(&(0x7f00000034c0)='./bus\x00', 0x100000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r1, r2, 0x0, 0x5d4bac03) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 03:25:25 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x6, 0x0, 0x10001, 0x1000000}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000100)={0x7fff, r1, 0x2, 0xfffffffffffffffa}) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f0000000000)="1f0000000104ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0x166) r3 = socket(0x10, 0x2, 0xc) write(r3, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1f) close(r2) 03:25:25 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x4000, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f00000001c0)=0x3a9, &(0x7f0000000240)=0x4) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) socket$unix(0x1, 0x2, 0x0) [ 262.863753] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 262.897677] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 262.919341] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 262.943914] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 03:25:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f00000007c0)="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", 0x1b3) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:25 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ptrace$peekuser(0x3, r0, 0x9cc9) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) read$FUSE(r2, &(0x7f0000000bc0), 0x1000) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000100)={0x400}, 0x4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000400)={{0x100000, 0x6000, 0x3, 0x3, 0x0, 0x10001, 0x8, 0x6, 0x0, 0x8eb, 0x3, 0x847d}, {0x100000, 0xf000, 0xe, 0x3, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x7, 0x7, 0x3, 0x10001, 0x0, 0x7fffffff}, {0xf000, 0x4, 0xb, 0x9, 0x53f, 0x50, 0x7, 0x80, 0x1000, 0x3, 0x4, 0x7}, {0x4000, 0x5000, 0x3, 0x5, 0x1, 0x23473e5f, 0xcc2, 0x10000, 0xffff, 0x1, 0x8000, 0x7fff}, {0x0, 0x3000, 0xab92b9166862cc9f, 0x3, 0x6, 0x87, 0x20, 0x2, 0x3, 0x7ff, 0x5, 0x1}, {0x100002, 0xd000, 0x10, 0x2, 0x9, 0x101, 0x7, 0x1, 0x7, 0x5, 0x200, 0x2}, {0x2000, 0x0, 0x4, 0x5, 0x200, 0x200, 0xbf, 0xa4, 0xff, 0x0, 0x5, 0x4}, {0x3000, 0x2000, 0xe, 0x7f, 0x1000, 0x10000, 0x100000000, 0xfff, 0xbef, 0x1, 0x9, 0x93}, {0x0, 0x6000}, {0x10002, 0x2}, 0x10006, 0x0, 0x3000, 0x20, 0x8, 0x1, 0x4, [0x8, 0xe1, 0x0, 0x7]}) ioctl$VIDIOC_SUBDEV_G_FMT(r4, 0xc0585604, &(0x7f00000001c0)={0x0, 0x0, {0x3178, 0x200, 0x201f, 0x0, 0xf, 0x7, 0x1}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:25:25 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x6, 0x0, 0x10001, 0x1000000}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000100)={0x7fff, r1, 0x2, 0xfffffffffffffffa}) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f0000000000)="1f0000000104ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0x166) r3 = socket(0x10, 0x2, 0xc) write(r3, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1f) close(r2) [ 263.124368] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 263.151149] FAT-fs (loop3): bogus number of reserved sectors [ 263.167660] FAT-fs (loop3): Can't find a valid FAT filesystem [ 263.188951] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 263.216675] attempt to access beyond end of device [ 263.232430] loop0: rw=2049, want=78, limit=64 03:25:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:25 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$TIOCCBRK(r0, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1bd) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:25 executing program 2: r0 = socket(0x3, 0x1, 0x6) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x9, 0x4) r1 = socket(0x11, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x01\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000014000b09000000000c0000000a400000", @ANYRES32=r3, @ANYRESDEC], 0x3}, 0x1, 0x0, 0x0, 0x10002}, 0x0) [ 263.239641] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:25:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$ppp(r0, &(0x7f0000000140)="517ad170148d25e166396ff810799318b209ab45c33d2a810a876df6a0a4af5336c160eabb15d041e9d01c064f40dcfd538fb57b67aae59e4b8277917b76", 0x3e) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:25 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rmdir(&(0x7f0000000080)='./file0\x00') 03:25:25 executing program 5: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r3, 0x208200) r4 = open(&(0x7f0000000280)='./bus\x00', 0x80800, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000380)={[], 0x1f, 0x186a, 0x49e6, 0x5, 0x1, r5}) read(r4, &(0x7f0000000180)=""/19, 0xfffffe47) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x1840}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000000)={0x0, r6}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f00000001c0)={r7}) close(r2) 03:25:25 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='\x00', 0x1, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xc, 0x4, 0x101, 0x8868, 0x0, 0xffffffffffffffff, 0x442, 0x8, 0x40, 0x8, 0xbc5, 0x4, 0x4800000, 0x2, 0x4, 0x6c34, 0xff, 0x37e, 0xfffffffffffffc41, 0x8, 0x0, 0x7fffffff, 0x1, 0x0, 0xae06, 0x5, 0x40f, 0x80, 0x7f, 0x5, 0x81, 0x0, 0xfffffffffffffffa, 0x7fff, 0x1, 0x1, 0x0, 0xc7a, 0x4, @perf_config_ext={0x200, 0x7}, 0x8004, 0xee, 0x80000000, 0x4, 0x10001, 0x986, 0x1}, 0xffffffffffffffff, 0x6, r1, 0x2) 03:25:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) close(r0) socket$inet6_sctp(0xa, 0x801, 0x84) openat$audio(0xffffffffffffff9c, &(0x7f0000000500)='/dev/audio\x00', 0x2001, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200500, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) r3 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x1000000000016) 03:25:25 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x80001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r1, r2}}, 0x18) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000001000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf07c") mlock(&(0x7f00008d8000/0x200000)=nil, 0x200000) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x101000, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 03:25:25 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000003c0)={0x0, 0xb2, 0x2, 0x6, 0x6, 0x401, 0x40, 0xaf, {0x0, @in6={{0xa, 0x4e20, 0x8, @ipv4={[], [], @multicast2}, 0x8ac7}}, 0x100000000, 0x3, 0x1ff, 0x9, 0x2}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000480)={r3, @in={{0x2, 0x4e20, @multicast1}}, 0x3, 0xfffffffffffffff8, 0xd8, 0x0, 0x4}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000001c0)={@initdev}, &(0x7f0000000240)=0x14) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000140)) write$input_event(r0, &(0x7f0000000300)={{0x77359400}, 0x15, 0xd45, 0x3f}, 0x18) write(r1, &(0x7f0000000600)="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", 0x1a2) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:25 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x80, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000400), 0x1) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000140)={0x6000, 0x2000}) r2 = open$dir(&(0x7f00000004c0)='./file0\x00', 0x4000, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000440)={'batadv0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}}) write(r1, &(0x7f0000000600)="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", 0x1bd) r3 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x401, 0x8000) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000280)='md5sumcgroup\\\x00', 0xe, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000007c0)=[@in6={0xa, 0x4e22, 0xff, @rand_addr="c847127827374ec940a0fd06ace3aafa", 0x3}, @in6={0xa, 0x4e24, 0x5, @rand_addr="ab4edd3001f5150b071abe3463491886", 0x9}, @in6={0xa, 0x4e22, 0x8, @remote, 0xffffffffffffff50}, @in6={0xa, 0x4e20, 0x5, @remote, 0x7}, @in={0x2, 0x4e23, @rand_addr=0x101}, @in={0x2, 0x4e21, @loopback}], 0x90) [ 263.968680] attempt to access beyond end of device [ 263.974809] loop0: rw=2049, want=78, limit=64 [ 263.980147] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:25:26 executing program 3: epoll_create(0x4) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x5, 0x10000) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000240)=0x8) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000280)) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1a2) bind$rds(r0, &(0x7f00000001c0)={0x2, 0x4e21, @empty}, 0x10) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$ppp(r0, &(0x7f0000000140)="517ad170148d25e166396ff810799318b209ab45c33d2a810a876df6a0a4af5336c160eabb15d041e9d01c064f40dcfd538fb57b67aae59e4b8277917b76", 0x3e) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:26 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x8000, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000340)) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440), 0x4) socket$inet_sctp(0x2, 0x5, 0x84) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000480)=ANY=[@ANYBLOB="2c00000003060d01ff0488fffdffff57ffccad000c000100060d0010091900010c00020000002208f6f000613e10319c6ce1dc42d86be002f9f93546707bdb7834db8b"], 0x43}}, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x80000, 0x0) getsockopt$inet6_buf(r4, 0x29, 0xd2, &(0x7f00000003c0)=""/112, &(0x7f0000000500)=0x70) exit_group(0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000000)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) ioctl$RNDGETENTCNT(r5, 0x80045200, &(0x7f0000000280)) close(r5) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000300), 0x4) recvmsg(r2, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r5) 03:25:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:26 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='overlay\x00', 0x400, &(0x7f00000003c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_on='xino=on'}], [{@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x0, 0x32, 0x62, 0x0, 0x35, 0x38, 0x31], 0x2d, [0x39, 0x37, 0x37, 0x31], 0x2d, [0x38, 0x38, 0x64, 0xbef23255f4389fcf], 0x2d, [0x32, 0x64, 0xda1d13411dd7291d, 0x76], 0x2d, [0x36, 0x34, 0x39, 0x9dd0e28adbc999a0, 0x3b, 0x39, 0x33, 0x64]}}}]}) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1bd) sendfile(r2, r1, 0x0, 0x10000) setsockopt$inet6_int(r4, 0x29, 0x46, &(0x7f0000000140)=0x3, 0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:26 executing program 2: capset(&(0x7f00002d0ff8)={0x20080522}, &(0x7f0000cc0000)) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001600)}, 0x0) r0 = socket$inet(0x10, 0x1, 0x18) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x8, &(0x7f0000001580)=[{&(0x7f0000000080)="db6ed77e8802db6eda4ca244909b89733970f2334a60337f0635f4e627c9de7912bad0732584a42a04e6dee8cd7bbb56573d806c1fcab19c65cd869380374f6d937d5393050c78b5efb988725b8adf1db14ecc17b3269946697d80666edc92536de99c1564645c6ae67403e8456eb3fa09718c273486567607f6ea84c8046b1264476ce8ebb1d91f19eda1aa82ccc5d0acdbe3c554e2d2433f737009f191f8926509409cb7448853d334bf917ea1e173086c836833ad5e66625bd8b8b128b93a77abd14f7bca27dc819450b70645d4495bf311c21a373b453e3327d794d39b816793e24764", 0xe5}, {&(0x7f00000001c0)="1b7c7b8848206e5a167f7cf456b13b0c4bd88c30dc2031dac6625ef62f109baa2fd136a1e94aa34b865a1d8d1b4639cb1b6b92ae7b2a63b8beddc67c9b386ac3f11cfd9a2019fc71f2e4ab6a039971f7d74f60e0560a454f52f004eed4f5baf8ea3751ea4dde7a5fe1c1165443e086d4ee07c7ee2b6d4d4b21bbeeb49491beb0ddf20958ecc83b25a35c202f6d49211a6ab8cfe81b6f", 0x96, 0x2}, {&(0x7f0000000280)="2959836166b6632ee241b26f227ea7877676584825775cddf485197c3953a33bcfe29f3356ab1e4a6fc507081f765ccf26e01a3edda9603055edfbce99549d138c84c479c340423409bdb6716ce79e48e4e9d2e202b38494c86bf43eb4f93166ea0a45e74fa50010d2b1a2f09b18660fce2dd04537f3b52704051287e67add87eab8d838b751603cd01e9c149c791f519ec9a9253b6bd4b65420e02fcb089e379489c224d766f1b1be2cbca2466f24809cfd1d80d3c84eb0ee9cd8bcedd27d6f9af546ec67707213b655eb74c28bb0b02e0a15f5f71c2d58245d0261bd2ff0a0e5241770787b015f1ea098ac543af4e98977e679bb6c1b13bd3c60aa478725154c32ef96250f27259cdc06685a2c53c4f7bddabbb0d349e0827547bfe7d76e600fe9d2e2274329aaaa0c383f157fbc21bb35507bc5aa1908e685296c65895dd0d30f2689f2d7b3d1bd7c228224105b93fe114cc8e4d5a489a1f1a9684a8c008cea8e6c9fa8d36060778ebfd711f738a5d7f3fbd6dfe10b0a506f68e779efeb9bce5fab7226aafc22aa6c38c0e64cdc395fa26a00f2f1c80c0e2099673b79fab4a155d0eefa85c6c7c7173b176a1047d15f6b1e95bf58ce8593059124e6678a8a7a321899fc5b116e1e48b25839e2292eaaa6401f79984c9345901c4dd2b8bbc04cd93ae62c980677fc70e35c7f4a4b37dab040820326f62bc3d75e7573d1d62d544d690277558d340f2f2e4455b28abe8744093ff60566316aeb2ff76d4801497ef0a8110c9b20285ae15708d53b1b4ee7e4d7daaa166f96f8f62df42dc9144ddf6b1343841e97e1430c28868d95f7a7f1ed79df58dbf323b95a24b2701b8185ed8172b37f470486cb5460cbe6f113770242d6921604b054e5910af82ab532088777265282fe2c7acf5878885ed5bf127be99e881b87db5110a63bd114836069bd231b2e413526d1cac491064edac2de9d7438d2a27f198f33bc56ef119c7732dba5536d3bc068a03636f62d3c4c7758b84a78508db282157431d099d2166914e783dff870dad41db1e1a5b8c6f20a5989f5ff7552014f5b98dd9fae651d82dfc09dd517e9f4d8b4588079a4e49751722a72ce3ccbc5067bd0e7ec1c17d22225b4cd3171af68191c875560f1821df92f5394e69f2e39f445855d431438c6dc0173fe554f55ab768d3791a2822f22b39ec5c6e5cfaf9f31541ea4b6700db3aa44d9e1849eee7f008fffbfc37fdfc4df7942c73c2387c82886fc131348a355522360d525fdd540af5a601dd01f78e7d6ee3dd8f2ecfc9c061300f8c5dd12bba59321a2729160cf5998cd322960e26f175e7a0aec0003e5bec8c3732ddc934e66ac6d0913e0a502df911df29367e74a424f26d77c324f47cab9109f1e6f1d28e745b863bc9efb89d52c82acf1b6e5af4fc9b75284d2ea38e6e23d4b49e032c1a6acae59e4f9fb18c81672d3f40abfadefe24bde33946fb7796bbae9a45f0c6e22cca5430bca97dc3424c4833f25fe4100ccccf5ecaa09fbfb5eada3a332aa3dde46098d7a123835b1f1b568b9c35f83fdb7b2b38158764bd7396595061653054f08eb2ec85c243cd341844ce90b2398723288e3207aa454b16a7a2eb731c7e00d5e69ead949bea8f18267531ce884bfa33a0738afd01444d7a8508e12fee98c35b659501b770a937e4a1f287f5372096297809a81cb6c53f213f3f2e5997c63f404dfedbd6b47076c891c243f14cda7c669ef439c2ae55656c42227ebbe1c1a52cac64d2aff317bc19a1289277c44dc3a632f57ebd826d6dae5d3be7e053a45180decd280c507110ab0a7ce5297bbf49f4420e72c867814a7fcd3c8c306a637dfcb879f4c6f55d758afa2b017e1ac83c7da161d93997d19f2a855941c123c6755e84fabed5c84dd18ad40525c6925b497683c0803cc13879049ce55171ee1e163bd5487ca6b4d4e002fb9de3aebada5787a7ab96a94222bb7a428716900de45bd26ffb954d0e3bd7139c0db20394fc11061f24f8a0883b3ed76dfab6854ae61c016395d87047b8ad20e39f31141219c2afa7c3f1fca173ce89ceed6998c061d4d3c7904386f4b6de2f2d3b771c55d5cdc37cc1c1045346f8d699c306ce36920ca273e1441716b94b1b7e2f34763a6f20890a2b939269b378ec293d7663938ea705c06a1e84ca8806fa818fc1f607551a39317d9d283abc5dacd24d4abe5e622a10c4e34c7d28958a6c5ee6730aa50e98606a203d19bb62091694fc01f340994c9803dd3bc8e2252467455464b02c18b300c3ad47ed8956ac056f889338e2bcb6046c12002fee5dc9e031cc35fd7ccd0c3af9c871c3a23c7babb185d3e465acf711ebd85830271574f7b2768966742df11891bec635eccdf1c1edd640dca772d0719ee6d62c33e34a4a3df996ec7d7ac1872c9bab5fe5053c337a3400a654670a41529459c4406ea7d6de9d7e1bc25794fd620997fddc4fcd85d218ae939a56bbb4522a665cfed25f2f5bcb818f1a20c5ad25feee455b6423d0246f4f130f0dba962e1bd3044ba1981aeea122bd9439b82f0f7876d559f9a93639afe969bc469568380d4451a8b174ff6f163e8788cac8b9050ea5fac28df1dc8ecda254cc5a3b34c53cc02031677baa3f2763d641144f8f8d729ace365fd381a32d44c8547da991ddfba9985ea9f1a68254a20ef83cb10812deea77b138dd972cce0c9060eab9b4b4ee9f671127b775c6b2f3eeaca22aa883b501e011c6300a410447ad2cf98c761350949e73be58c5c7139ce337e0e954322f23a764bcf7d72f9f6b850a93b696dfa9426034c51827d16de2cb70bbfea1ecf94dabe70be8fa6de52d8bf01e29f4f8f756a629a3635983841c438fbb6ccad95adaee882db9cd2a1250dc7526322942fe7f360df895076f5583613cc1bd526a101884780a3b67084849f31f791d7fbf530f7b8c2828c661b0cc3f4f7a1a1229f911a7a891980ec275e47519957d3caa5915cca41d997ffbb333ecb3fcd3355058df39d3aa53a4d7b59b0754e81a0fe9ac0755464d5a550165135c1d6eb6db0f7b23e444bc46d3e3cd030071124d85eb6f4c030d4b952c8d9fd8b1aef94b13e4e2084ac91a3e5c61d8a64487e93a2e75cf8df415362d756eb5c463c5effa50135b3e2de52fc3b84e6a5c8f9ffdf54576425f11f52ead39a3558cd84216cea06f416ce49ca060c9bdb542486877ddda7a453964b16bf3ab60e75ba1b9f126cbb3bf2d33642b75412fc460b3b6502cfbb1bf770ed1c267e7b6b10ece5736bd6ec4ee5e543b3a3c1f4b700bd7d837031ff6b3d468f32fe119f476640c4aa4767f894750dbbb59be0adf10445695fb2e6c3c8056107a07c0f3da54050e95ef32a33b88ae7120d7edbdef4ad632fa6e92f141236d2aeb7bc532460a632f410d0729885081515eff839404eadedf92b2c6fee853dcdc95b9bbb5fa22549bdb49db5284816a1e810f1813fa2fe4950bda2e1050a51239b244c46d73c5aef768d778c7a1109dc453e8b7d0a2a37e18d16f71d85bcce39cc7e6c6460cf07944bc40f6181450ba104ad2b5c9f7afe5fdc30bdb838f0eb87e1c4416377ca1a3feea9310519f8c354b2ae16644bfa894889b36674a1c585da0f1bce14c64cca7a8a4afb46f2ae556dbcbc9a99777224609520ddd8d08175e832953520d7d2e3b7c83c6e8f009345fcb64dc2a4eff2202641a74a96f76effd7a8f1ea3419efb53c401f2c607c7177ede3e23c4eb062b207a24d8187591aabebc79b5df5d1362bc0304a7c0fd1159a7e52516d2dd7a9ffd82985e8cc67c87dc0d8987c5f544c12a1e59bcc4f0e7f9fb756e3dc88e2bde977e21488675bbaa4e1e2c1a8f03d73e1ca891ef0f8e793feef5e415e9ac130edcf3df72e75273a875d401ae4dc935c60f9b87983a81438fa138591ebaba130ff0ea6709c6d1776053c75bdfff3359d05194f70e2fb065875971984aa0880022f62bd824b196211d804a815866c4fa741c6a7885968a955a7632c0b5652fa6c15c4796a9e52ab189f75c0a68f34ced040a882020ae4cde750beb338a1d0fc2cf76a3f451a163353299113758878b264ac3bc5541306d2e94135195f46fd3160fbf1a243efe77c73e1650a0a61b7bac14f977b0e246ed63f00ef9f6b5c52acd1f4a844a17b7c7a0f5b29b151620d743de9c48370ede061dcd5387573782a5059927b009881901813e1a657d3f21a2d220dd3d5d53ebb1fe5a1b7ee609d86e5ebd71071724e040a1d65aca71a9483fa6863e1df0e69c6fb2f509d4d3854252b41495a24e5e8722d5105c46f214c4a4ec679bcc24325c4b62d17ee4c663f3e9633e655d6f251e706587b10bc66ca8145daf1a5ef350ec52b6bee1d43349290978789cedc9fa6de24788f74e2996fb6220100608889cb2097b7b9a322ec022faecd301cd83fba43d5b86e3183f59b199b166be613714b330ef6a7dc3f29d9d3733cac35ee2bc9b5cb57c45150e8730d4afcda853b9d8ae195d1e09d21a4a3d92ade22e4b859e7f4ef4c273284d58c34248f89bce5b2307b0fc00c117773f552ff94632b6bce07e44e60b47d2a60a891190596d39a2df9fd019001c5899321a37ce02ab021575d98d6cbd169524c556ebc10ac075aee811f1aa59bb8fe14486b2cfa408d66c7dad18e78ef2835c997a8723de22ff5f035f7f2cc095ca74ba92e08373e5bd14baa817f5a0ff9aff4577db177fe7073c6ea387a0447d9511a008cb232a92f9d1daa36ffb2c92e38281026edf88042486047ba161e8c1406cd4411e72110a6d124f6e3969df32e6122e037ccb3e6808dba3ac19b4a5088b52dfd1b1ccb7928685f8aae45e7fb50f1c696297ab40253be4893730a73bbf05ca63b6d795fc053f0daf036fa3447a044b1d972aa6a87a4e7c23eb4db400adb6b26a688601cfac802ffc864cf39511f87ffeca8b6abd028807fd4d9ce9095cedd715ed9f114f7381789147571e3f50ccfeb4bdc65cc77a5bf45c534d7d6ba70d4af9e0240b1b8f0a8d66afc2f76cf4d096122bca916bec4fe54a73bae63b1659caef3e80104b8e3c777814d0bd373602f9a65d751160b14310f06ca662111fd5a4d7b3c6888886fe2c1cbf556e0b1eef4e69efaf41614893e06e3a6654f5016678c4d3b673752a42831d2740c1be2fb36521892d861ded3eaf7e9ac11ae8b4094a060766bb309bd72dea24019175a0cee80af42f60e70685e7724b61933053e8484572eb00483dff26426b7ec9ae89d89cc5d5d6f7ac048dcbbfa88edb3d86a8d46e08740db875fe3a105136d4a728ed00640429ecb020d394e32d75b7715914861d35fe463e1bf544935a03192e1e5b6507fa8d5cb9a32d6a16baa47518117b073c576ba87b02fffa63ab580ff093f4560e4c391c96e9da3d95279bd3b8847c0feb322510d412a920638f69b63e1dcc544400cee98d85310c07582de0c98fdf4513ee2b77bc62c6b8fa8dd95378a644aafbb384c1590e35e64e1e69bf298af033c52cbf435a37b5019d8721e557885dfff35bf79496648955d28c54115788a46df8120ca16bdaf1e9478680720a73b35eb1d12ee69237c845c171d4561f1ac27ee0d6175a03e0d8608ad2468e2623d6794aa44263046cc403a1e3dd678aeee6acedd457f7f21926dd39f9125e1e2398c6d7eac3b265b141a1d63a15dbdd328bbce225d0d17f46a6cc4fc77bf56c70657df8a4d14e7b79f07e7bc4013ec833e8cf2bef908951f8a0cc6d865df8ef2c5c889e66fe1412b98f23d5b15f58bda7465ebe844df8c92709d6c3d21b2", 0x1000, 0x1}, {&(0x7f0000001280)="cd2235c2aa66df07873132be4e241d3121e5d0efdd2535e665d31868e9402da3af2e21867130c47fb450a85f14e8b1fce9050539b9c861105d6a3fa21025f9fbe1b2f9a2cff85487d6cfbb1534d2e737c3312d2dbf16ab3398b576a724acb6d236d52befbf255fdf8918", 0x6a, 0x1}, {&(0x7f0000001300)="77d9063e50526dfdf64fe593c5e9017889297c146aae1374b9f9c9c9b4d0117b79d46efd12ae2b59b873e4418361b6a65e530b895680b03fb12177daede4e96044e4cdf3bc5e7db8b8c9c2a86b11196c7e8052e2917a16aac4954c8aaf0d3a5298c7aa032e9fa8dafc890d0aea4f2e73c9defc46074fc519b8f9800ba811264b68a10f3af850c8606819aa7aa62d870fe19accbfcf439899c7a0a3", 0x9b, 0x10001}, {&(0x7f00000013c0)="df06119a6816e90ecdcdf3", 0xb, 0x4}, {&(0x7f0000001400)="7d38e7eac9dbaeb7e82b5f5e202dabe6447fbd8fedbff8ac43c657a3a9120c421e4ce5b1ffa1c3474b0923dd8ba808eff0eab7ac805a74dfd5cf9b853dee3499894031b26af8628f6d4efd02967e6802f417147d68b144e8759b2c5a376a1f36ed5f96a55322e590dd371b047995eddccd69ed3ed8c8ff73495be1c16acc25d8f040d142bac4c2a32ccc640d71a002bf87d1e7ed5763f700d35383c0682a0ad9a3dea965f0b0b5cd86b9aa8c075b8fb6e3f80c01fce135f3346a996407e4226b752089eaf4dce830cfad955b4bd0e598", 0xd0, 0x400}, {&(0x7f0000001500)="4da67dbb2c9d99ad863490d5789d033b9f044c0791bb4602ef61cef883fb672073854ee871c81f1afd1ea6a3dbcdc7d5881d45246e69aeb00c2bacb353c11e982a56f8515d88c1dcd05931f4", 0x4c, 0x9}], 0x800000, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000180)={'ip_vti0\x00', @ifru_flags}) 03:25:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040), 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 264.129767] overlayfs: unrecognized mount option "xino=on" or missing value [ 264.176706] overlayfs: unrecognized mount option "xino=on" or missing value 03:25:28 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x3, 0x1}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r1, 0x4) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000180)) poll(&(0x7f00000001c0)=[{r0, 0x4000}, {r0, 0x80}], 0x2, 0x45a5) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000200)=0x100) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x4e23, @rand_addr=0x7}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, 0x0, 0xe72, &(0x7f0000000240)='batadv0\x00', 0xa, 0x1, 0x5}) poll(&(0x7f0000000300)=[{r0, 0x1}, {r0, 0x4000}, {r0, 0x40}, {r0, 0x400}, {r0, 0x1000}, {r0, 0x20}], 0x6, 0x6) keyctl$join(0x1, &(0x7f0000000340)={'syz', 0x2}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000380)={0xa, {0x79bf, 0x7fe5, 0x320b, 0x7ff}, {0x8, 0x1, 0xffffffffffff0001, 0x6}, {0x7a4d, 0x8}}) syz_mount_image$bfs(&(0x7f00000003c0)='bfs\x00', &(0x7f0000000400)='./file0\x00', 0x8001, 0x2, &(0x7f0000000580)=[{&(0x7f0000000440)="5693e21169a571f38c2d7678dc5cab96dea3b141ef6da517f12d91fe6c682dbe", 0x20, 0x200}, {&(0x7f0000000480)="23732398b996e05522144a7527e09116e326e5931da0f4c6197f34e5dcaee13080825444cb73716e8cc2d0d221d78bc01fcddf066a892d53c4e8d9257a898dfc338f8c8fca971513e5bdccd72daaf1e26c85dcca12ede7836cf5ef34a468eb09f994f12c27425b702b67af7195022528502ec38e361dcf27466bbbf92e0456e1ed22c46bec84166a0b55288889a6ffd426c4eb0212c7db9a6120c576b8a805ebce44e20860e985b2b458ef2f94d25f0c78cb1fc029f9556eadb8994d6ee08ad0a3d4cdc34aecdebf1005f0cf3bd175c15cd42f7fc54a364e1c5c941868da202aa2654dae5d4c845d837814b8031f2549fa", 0xf1, 0x8001}], 0x200000, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000005c0)={0x200}, 0x4) socketpair(0x0, 0x80000, 0x5, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000640)={0x9, {0xfffffffffffffffc, 0x8, 0x200, 0x8000}, {0x20, 0x99, 0x30000000000000, 0x2507857d}, {0x4, 0x7f}}) tee(r3, r0, 0x1f, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}}}, &(0x7f00000007c0)=0xe8) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000800)={@mcast2, r4}, 0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000840)={r1, 0xdb, "7f4564f5e687b721ea27061540a12efd5703d99399a6add1a3807784516f5131cdde7793642dbe1c295683192db0f6e4bd4ec79cae8b07e394dfdf521d44915a55b648261fafa93cddd384b1581cffc3ffa7060900d35371a373518d9304aca38e69a36b1e0f22032ac71a54f8ad66e766ee7656dd41a983a8c3f1f187e44636a695c4c820dfadaf7bec93d4a3d252ac057b7b01ed53aee311c5cba82c32d6300dfc22f748a7772b773d7c78cad5d6bd977d0641cf5160add5594ec8ea63c281c799eb39b6e1acb97b494deb0a7a9b247782a9ce761f181cd198ab"}, &(0x7f0000000940)=0xe3) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000980)={0x1, 0x8}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000009c0)={r5, 0x400}, &(0x7f0000000a00)=0x8) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000a40)=@netrom) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000a80)={0x7ff, 0x7ff, 0x0, 0x0, 0x5, 0x2, 0x200, 0xb0, r5}, 0x20) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b00)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x1c, r6, 0x400, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000c00)) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000c40)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000c80)={{0xffffffffffffffff, 0x1, 0x400, 0x3, 0x6}, 0x1, 0x8}) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) symlinkat(&(0x7f0000000d00)='./file0\x00', r0, &(0x7f0000000d40)='./file0\x00') ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000d80)) 03:25:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x2711, @host}, 0x10, 0x800) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x0, 0x100, 0x400}, 0x6) bind$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x10f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)=0x5, 0x4) sendto$inet6(r0, &(0x7f0000000000), 0xff19, 0x300, 0x0, 0x101aa) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000001040)=""/4096) 03:25:28 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000000)='vfat\x00') sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:28 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @loopback, 0x0, 0x1, [@multicast1]}, 0x14) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB="e00000027f0000010100000001000022a00000015f35f9c7e72724d0b81ba758989642471943c76d188774859f49f31a841ef59893d819a55f60a112052602f348f4328838385b7e6cd62171604baa2d5c8353c1305951c01c2450734abe463ab3aceefc0aea551287c0ac172219e9cb04a924"], 0x14) 03:25:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) [ 266.564921] kauditd_printk_skb: 73 callbacks suppressed [ 266.564929] audit: type=1800 audit(1566098728.773:833): pid=12919 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="loop4" ino=299 res=0 [ 266.610000] Unknown ioctl -2147199785 03:25:28 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140), &(0x7f00000001c0)=0x4) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 266.703514] Unknown ioctl 1074310738 03:25:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x0, 0x100, 0x400}, 0x6) bind$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x10f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)=0x5, 0x4) sendto$inet6(r0, &(0x7f0000000000), 0xff19, 0x300, 0x0, 0x101aa) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000001040)=""/4096) [ 266.745069] Unknown ioctl 35084 [ 266.764451] Unknown ioctl -1070836166 [ 266.794339] audit: type=1804 audit(1566098728.803:834): pid=12919 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/226/file0/file0" dev="loop4" ino=299 res=1 03:25:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x18, "2976c2a50496984fd6f7d6492f09087031343b1024fdfde2"}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000240)={r3, 0x8}, 0x8) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) [ 266.844305] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 266.897298] Unknown ioctl -1070836166 03:25:29 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r1 = gettid() r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x8000, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x20000, 0x0) r4 = accept4$unix(r3, &(0x7f0000000340), &(0x7f00000000c0)=0x1d1, 0x80800) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000440)={0x100000000, 0x100000000, 0x76, 0xe1, 0x100000000, 0x1b8000000}) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x181000, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r5, 0x0, 0x483, &(0x7f0000000140)={0x21, @remote, 0x4e23, 0x3, 'wlc\x00', 0x2, 0x6b, 0x41}, 0x2c) fcntl$lock(r5, 0x24, &(0x7f0000000240)={0x1, 0x1, 0x106, 0x8, r1}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) kcmp(r0, r1, 0x6, r4, r6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f0000cd8ff4)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000580)={0x0, 0x1}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000004c0)=@assoc_value={r9, 0xfb2}, 0x8) listen(r7, 0x0) r10 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r5, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9d5f62d159e84d1237574aef071d69000000", @ANYRES16=r10, @ANYBLOB="000229bd7000fedbdf25050000001400070008000100", @ANYRES32=r5, @ANYBLOB="085c2e690eb67d26df365bca817e8880c3804c41d078e17d4f000000000000000079e42efdabfb4d7613974cb9dd1047c3e1664141bc449580f231af4836e531ca9a5d6eba62422f71903d2394608d1815948f86f69392b15e73854e26e5ea5a381fff0988fb4b895b9e5cc050bbec98b64d02ca42dcb729f9ac5b66285ef81289f266557cdcb4c631c2ea25f02c1b452d50d35e94ec1d17df1fa4f3988281931eb47ab044b64388cb4e8eef623c8f6cf849ae6cb8524cd44e3cbf04495cbacca86a6d42d830e0695b7651b6b2745a0aa037d168ad76149ca74dae6ce812e44399c060d7c19f75550b", @ANYRES32=r5, @ANYBLOB="0c00050002000000000000000c00070008000100", @ANYRES32=r5], 0x40}, 0x1, 0x0, 0x0, 0x4800}, 0x4010) ppoll(&(0x7f0000000200)=[{r8}], 0x1, &(0x7f0000000280), 0x0, 0x0) [ 266.928473] Unknown ioctl 1074310931 [ 266.955403] Unknown ioctl 35301 [ 267.002186] Unknown ioctl 35076 [ 267.005916] Unknown ioctl 8829 [ 267.008962] audit: type=1800 audit(1566098728.833:835): pid=12923 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=300 res=0 [ 267.051133] Unknown ioctl 1078481924 [ 267.055219] Unknown ioctl 20993 [ 267.083344] Unknown ioctl 8707 [ 267.089513] audit: type=1804 audit(1566098728.853:836): pid=12923 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/214/file0/file0" dev="loop3" ino=300 res=1 03:25:29 executing program 2: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) io_setup(0x0, &(0x7f0000000000)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @local}, 0x2, 0x3, 0x0, 0x1}}, 0x26) clone(0x80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:25:29 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x1ee0971e7c21898, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x8e38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1df2f1b029cdaf34}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x44, r3, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x20000810) [ 267.307417] audit: type=1800 audit(1566098729.083:837): pid=12949 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=17130 res=0 [ 267.336222] audit: type=1804 audit(1566098729.103:838): pid=12954 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/227/file0" dev="sda1" ino=17130 res=1 [ 267.373401] Unknown ioctl -2147199785 [ 267.397455] audit: type=1800 audit(1566098729.343:839): pid=12961 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=301 res=0 [ 267.420652] audit: type=1804 audit(1566098729.363:840): pid=12961 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/215/file0/file0" dev="loop3" ino=301 res=1 [ 267.423566] Unknown ioctl 35084 [ 267.448603] Unknown ioctl 1074310738 [ 267.456446] Unknown ioctl -1070836166 03:25:29 executing program 1: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x1ee0971e7c21898, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x8e38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1df2f1b029cdaf34}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x44, r3, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x20000810) 03:25:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:29 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4000, 0x0) write$UHID_CREATE(r1, &(0x7f0000000200)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000180)=""/101, 0x65, 0x8, 0x6, 0x9, 0x5, 0x4}, 0x120) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x4, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 03:25:29 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='\x00\xf0roc/sys/net\x92\x9d\xfd\xa3W]\xccv-b$\v\x16\xd2]\x99\x1a\xd6\xc3\xb8\xef\xef=S\x95a\xb0\x844/vs/sec\x96re_tcp\xa0\xfa^\x98\xa6EU\xee\x9c\x14c\nY\xb2\xe6~\xaap\xaf\x1cu\x9c\xb5\x8f\x82V\xf8\xbf\xfex\x8bj\x12\x88\x126G\xafz(\xfc\xff\x85\f\xd09\xbf=\x86\xce-N\xf2Y\xbdW', 0x2, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000100)={0x80, 0x1, &(0x7f0000000180)="4f0bd218d6b3c4f988ab31cc4132dca163f6e70da665d1d8a0a30ae320b5e031f1d0199232aa089a79fc447edd3ae59c6c9f6bc3aeb60b0a31ab96f4e649f84c2fc299cde8e585860a55b282cb4dc044527ef1763dff8f6c42534a410c44873cba40812e5eb5692342fabfb20e2421797e8d36a7bc", {0x80, 0x0, 0x4f424752, 0x4, 0x2, 0x30, 0x9, 0x9}}) creat(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000000000)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xfffffffffffffed7) 03:25:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:29 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = getuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) mount$bpf(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x14, &(0x7f00000004c0)={[{@mode={'mode', 0x3d, 0x55}}, {@mode={'mode', 0x3d, 0x1ff}}], [{@uid_gt={'uid>', r1}}, {@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r2}}]}) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r3, r4, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) getpeername$tipc(r3, &(0x7f0000000140), &(0x7f00000001c0)=0x10) [ 267.488231] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 267.508054] Unknown ioctl -1070836166 [ 267.515506] Unknown ioctl 1074310931 [ 267.519684] Unknown ioctl 35301 [ 267.524342] Unknown ioctl 35076 [ 267.527715] Unknown ioctl 8829 [ 267.527733] Unknown ioctl 1078481924 03:25:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:29 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4000, 0x0) write$UHID_CREATE(r1, &(0x7f0000000200)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000180)=""/101, 0x65, 0x8, 0x6, 0x9, 0x5, 0x4}, 0x120) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x4, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) [ 267.682315] audit: type=1800 audit(1566098729.893:841): pid=13001 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="loop4" ino=303 res=0 03:25:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:30 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x1) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) acct(&(0x7f0000000080)='./file0\x00') sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000580)=@newsa={0x140, 0x10, 0x501, 0x0, 0x0, {{@in6=@mcast2, @in6=@mcast2}, {@in6=@dev, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @extra_flags={0x8, 0x18, 0x22}]}, 0x140}}, 0x0) 03:25:30 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) clone(0x2000, &(0x7f0000000300)="5bfd8b0a90104cfb1e077ea2da38b91c5b54311107c56598f8d6c3d08ec290153d93f145a978387e31b301df572086914a985791b3bf34c540684281dfe1cb0c81fbb7bca726c00b81e540dbd0177d1ea31a7a7a9ad1c29736ce712cf1387c4bf99e79f667ea78399da0ab617a3ac1280dd7181c8e055b94f02c76c4d91021aa6929f6a734188b37fc3bb2536a25646603bc211310659a4973cfed5fc16f0285cdfd4ac339ca668aa788990cb74f90cd9cd38ce071bf8829c346a93de919aa82aac7f5795d52a43cac2c7d7d011b6f365087464a7a1b10ba380d05f92821e742", &(0x7f0000000140), &(0x7f00000001c0), &(0x7f00000007c0)="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") fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 267.829010] Process accounting resumed [ 267.868111] audit: type=1800 audit(1566098729.893:842): pid=13009 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=17130 res=0 [ 267.899956] Process accounting resumed 03:25:30 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80001, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x5100, 0x0) 03:25:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x68cb14f981e7b2e1, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000080)=0x1e) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f00000000c0)=0x401, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000100)={0x7fff}, 0x1) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000140)={0x1, 0x3}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000001c0)=""/220, &(0x7f00000002c0)=0xdc) mkdirat(r1, &(0x7f0000000300)='./file0\x00', 0x88) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000340), &(0x7f0000000380)=0x4) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f00000003c0), &(0x7f0000000400)=0x10) r2 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/validatetrans\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000480)={0x0, 0x6, 0x7, 0x3}, &(0x7f00000004c0)=0x10) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000500)=@assoc_id=r3, &(0x7f0000000540)=0x4) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000580)={0x3, 0x3f}) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000005c0)=@assoc_value={r4}, &(0x7f0000000600)=0x8) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000640)=0x1) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000680)={0x8, 0x10, 0x1}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000006c0), &(0x7f0000000700)=0x4) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000780)={{{@in=@empty, @in=@broadcast}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000008c0)={0x4aa3, 0x6e7c10b5a18afa4e, 0x3, 0x9, r5}, &(0x7f0000000900)=0x10) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000000940)=0x80, 0x4) fadvise64(r2, 0x0, 0xffffffffffff33a5, 0x5) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f0000000980)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000a00)={0x6, {{0xa, 0x4e23, 0x87a, @local}}, 0x0, 0x6, [{{0xa, 0x4e21, 0x80, @loopback, 0x40}}, {{0xa, 0x4e22, 0x1f, @dev={0xfe, 0x80, [], 0x21}, 0x7}}, {{0xa, 0x4e23, 0x7, @ipv4={[], [], @local}, 0x8001}}, {{0xa, 0x4e23, 0x6, @empty, 0x4}}, {{0xa, 0x4e22, 0x1a, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}, {{0xa, 0x4e24, 0x914, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xae}}]}, 0x390) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x7, &(0x7f0000000ec0)={@nfc={0x27, 0x1, 0x2, 0x1}, {&(0x7f0000000dc0)=""/176, 0xb0}, &(0x7f0000000e80), 0x12}, 0xa0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000f80)={r4}, &(0x7f0000000fc0)=0x8) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000001000)=0x401) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000001040)={'netdevsim0\x00', 0x800}) 03:25:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) recvmmsg(r1, &(0x7f0000006ac0)=[{{&(0x7f0000000240)=@sco, 0x80, &(0x7f0000000480)=[{&(0x7f00000003c0)=""/180, 0xb4}, {&(0x7f0000000300)=""/82, 0x52}, {&(0x7f00000001c0)=""/48, 0x30}], 0x3}, 0x3f}, {{&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f00000017c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000580)=""/103, 0x67}], 0x2, &(0x7f0000001800)=""/98, 0x62}, 0x12}, {{&(0x7f0000001880)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001900)=""/92, 0x5c}], 0x1}, 0x3}, {{&(0x7f00000019c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001a40)=""/106, 0x6a}, {&(0x7f0000001ac0)=""/238, 0xee}], 0x2, &(0x7f0000001c00)=""/88, 0x58}, 0xaa9}, {{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000001c80)=""/126, 0x7e}, {&(0x7f0000001d00)=""/245, 0xf5}, {&(0x7f0000001e00)=""/78, 0x4e}, {&(0x7f0000001e80)=""/1, 0x1}, {&(0x7f0000001ec0)=""/121, 0x79}, {&(0x7f0000001f40)=""/172, 0xac}, {&(0x7f0000002000)=""/37, 0x25}, {&(0x7f0000002040)=""/39, 0x27}, {&(0x7f0000002080)=""/67, 0x43}, {&(0x7f0000002100)=""/160, 0xa0}], 0xa}, 0x1462}, {{0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f0000002280)=""/33, 0x21}], 0x1, &(0x7f0000002300)=""/23, 0x17}}, {{0x0, 0x0, &(0x7f0000005680)=[{&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000003340)=""/230, 0xe6}, {&(0x7f0000003440)=""/4096, 0x1000}, {&(0x7f0000004440)=""/4096, 0x1000}, {&(0x7f0000005440)=""/182, 0xb6}, {&(0x7f0000005500)=""/221, 0xdd}, {&(0x7f0000005600)=""/34, 0x22}, {&(0x7f0000005640)=""/40, 0x28}], 0x8, &(0x7f0000005700)=""/3, 0x3}, 0xe3a}, {{&(0x7f0000005740)=@alg, 0x80, &(0x7f0000006980)=[{&(0x7f00000057c0)=""/39, 0x27}, {&(0x7f0000005800)=""/84, 0x54}, {&(0x7f0000005880)=""/4096, 0x1000}, {&(0x7f0000006880)=""/227, 0xe3}], 0x4, &(0x7f00000069c0)=""/254, 0xfe}, 0xb6}], 0x8, 0x10100, &(0x7f0000006cc0)) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000140)) 03:25:30 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0xa, 0x2}) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:30 executing program 5: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/4096) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) syz_emit_ethernet(0x69, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x72010000, 0x700000000000000}, @random="d6de8e219d55", [], {@ipv6={0x86dd, {0x0, 0x6, "08de06", 0x33, 0x2c, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0xffffff8d}, @loopback, [], "fca967"}}}}}}}, 0x0) r1 = socket$caif_stream(0x25, 0x1, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x0, 0x4035a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x6, @mcast1, 0xbf0}, 0x1c) r2 = socket$inet(0x2, 0x956a35ad0045d480, 0x0) ioctl(r2, 0x0, 0x0) 03:25:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x3) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="5500000018007f0212fe01b2a4a280930a06000000a84306910000000b000f0035020000060003d91900154004000001d40240dc1338d54400009b84136ef75afb83de44110016000d0006000000060cec4faba7d4", 0x55}], 0x1}, 0x0) [ 268.434386] IPv6: NLM_F_CREATE should be specified when creating new route [ 268.444271] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 268.451110] IPv6: NLM_F_CREATE should be set when creating new route [ 268.457625] IPv6: NLM_F_CREATE should be set when creating new route [ 268.472197] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 03:25:30 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x2000, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in=@remote}}, {{@in=@initdev}, 0x0, @in=@initdev}}, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000005c0)={0x0, @speck128}) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(0x0, &(0x7f0000000480)={'syz'}, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000600)='encrypted\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000017c0)='ceph\x00', &(0x7f0000001800)={'syz', 0x3}, &(0x7f0000001840)="096d0d704b6257b0e804467a8401acc424e714754f03b9929425792afbb9dcbdeae88676e8c85a5908134d4def5d9c5ee92690bd360f98998fe77e323789e65576215c144aad0162ba4a9c2c72a9ea1697c6ea65e34c1033ef1d4ee7ac946072021d3c1e078975a56b87eb2665478343aeac10ea2dd532a9fe63bb80b6e271a2b43bec9c194f7e678b00845099c6945df5a3de4f7c2aa04c5e1282ebd431de", 0x9f, 0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000000)) accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c) add_key$keyring(&(0x7f0000001980)='keyring\x00', &(0x7f00000019c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000001b40)='keyring\x00', &(0x7f0000001b80)={'syz', 0x1}, 0x0, 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x2, r0}) add_key(&(0x7f0000001bc0)='pkcs7_test\x00', &(0x7f0000001c00)={'syz', 0x2}, &(0x7f0000001c40)="2abd496ec8b8f5264af59949fd38573c179791a3be685fdaeaa8eb0729e60fa03c2f38d6a61669f91724e4362dff53a702cf365f93eff52efff99b4a9aa9cd3eec4e08c6eb34e16aa88bb8e4e507e09ae9b34fb6a12f1ee272a1cda60a552df40a017a9a7c", 0x65, 0xfffffffffffffffa) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r2, 0x0) 03:25:30 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x1bd) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f00000003c0)={0x9, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}) 03:25:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:30 executing program 2: mkdir(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@remote, @rand_addr, @multicast2}, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x8000, 0x50) sendfile(r0, r0, 0x0, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)={0x0, @aes128, 0x2, "0896b0434518625a"}) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x80000000041, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0xffff) r3 = socket(0xa, 0x3, 0x8) write$P9_RLINK(r2, &(0x7f0000000200)={0x7, 0x47, 0x1}, 0x7) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ffe000/0x1000)=nil) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000500)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) r4 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000040)='threaded\x00', 0xfd87) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@random={'system.', 'loprocnodev\x00'}) fallocate(r4, 0x3, 0x5e00, 0x2cbd) sync_file_range(r4, 0x2002, 0x0, 0x2) 03:25:30 executing program 5: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/4096) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) syz_emit_ethernet(0x69, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x72010000, 0x700000000000000}, @random="d6de8e219d55", [], {@ipv6={0x86dd, {0x0, 0x6, "08de06", 0x33, 0x2c, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0xffffff8d}, @loopback, [], "fca967"}}}}}}}, 0x0) r1 = socket$caif_stream(0x25, 0x1, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x0, 0x4035a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x6, @mcast1, 0xbf0}, 0x1c) r2 = socket$inet(0x2, 0x956a35ad0045d480, 0x0) ioctl(r2, 0x0, 0x0) 03:25:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x7, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x4000000000000015, &(0x7f00000004c0), 0xfffffffffffffdcc) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$VT_GETMODE(r1, 0x5601, 0x0) r2 = openat$dir(0xffffffffffffff9c, 0x0, 0x101000, 0x800001a0) r3 = dup(r2) mlock(&(0x7f0000bde000/0x4000)=nil, 0x4000) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x2, 0x0) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x0, 0x5, 0x5, 0x8, 0x5, 0x466d0ccd, 0x5, 0x11c, 0xffffffffffffffff}}) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) request_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f0000000680)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) accept(r6, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000df6000)={&(0x7f0000b04cf4)={0x18, 0x15, 0xa, 0xfffffffffffffffd, 0x0, 0x0, {}, [@typed={0x4, 0x1}]}, 0x18}}, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000480)={r3, 0x3f}) getresuid(0x0, &(0x7f0000000100), &(0x7f0000000400)) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/audio\x00', 0x402, 0x0) openat$cgroup_ro(r1, &(0x7f0000000440)='pids.current\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000500)=0x4, 0x1) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r7, 0x110, 0x3) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000580)) 03:25:31 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000240)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x4000, 0x100) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:31 executing program 2: mkdir(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@remote, @rand_addr, @multicast2}, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x8000, 0x50) sendfile(r0, r0, 0x0, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)={0x0, @aes128, 0x2, "0896b0434518625a"}) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x80000000041, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0xffff) r3 = socket(0xa, 0x3, 0x8) write$P9_RLINK(r2, &(0x7f0000000200)={0x7, 0x47, 0x1}, 0x7) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ffe000/0x1000)=nil) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000500)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) r4 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000040)='threaded\x00', 0xfd87) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@random={'system.', 'loprocnodev\x00'}) fallocate(r4, 0x3, 0x5e00, 0x2cbd) sync_file_range(r4, 0x2002, 0x0, 0x2) 03:25:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0xc0010141}]}) 03:25:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) timer_create(0x7, &(0x7f0000000100)={0x0, 0x4, 0x4, @tid=r1}, &(0x7f0000000140)) poll(&(0x7f0000000080)=[{r0}], 0x28, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0xc53, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x101000, 0x20) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000300)={@empty, 0x68, r4}) [ 268.998480] rtc_cmos 00:00: Alarms can be up to one day in the future [ 269.102271] rtc_cmos 00:00: Alarms can be up to one day in the future 03:25:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b", @ANYRESOCT=0x0], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000300)=0x10) r1 = open(&(0x7f0000000200)='./file0\x00', 0x101000, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1a2) sendfile(r2, r3, 0x0, 0x10000) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000340), &(0x7f00000003c0)=0x30) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r4, 0x7}, &(0x7f00000001c0)=0x8) 03:25:31 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x80000000, 0x4) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 03:25:31 executing program 4: r0 = dup(0xffffffffffffffff) syz_open_pts(0xffffffffffffffff, 0x602) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x2000, 0x200000) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCCBRK(r2, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000280)='./file0/file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0xffffffffffffffff}], 0x10000, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000480)=0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x2, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1c, 0x0, 0x0, 0x5}, r4, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000007c0)={0x0, 0xffff, 0x9, 0xfff, 0x4, 0x4, 0x112, 0x1, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x8, 0x7f, 0x2c0eac53, 0xfffffffffffffff8}}, &(0x7f0000000500)=0xb0) getsockopt$packet_buf(r1, 0x107, 0xc920cb23274e2d51, &(0x7f0000000580)=""/59, &(0x7f00000005c0)=0x3b) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000300)={r5, 0x8}, &(0x7f00000004c0)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000880)={{{@in=@loopback, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000340)=0xe8) ioctl$VIDIOC_SUBDEV_S_EDID(r3, 0xc0285629, &(0x7f0000000680)={0x0, 0xca26, 0x9724, [], &(0x7f0000000640)=0xffffffff80000000}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000003c0)={r6, @in={{0x2, 0x4e23, @broadcast}}, 0x8, 0x6, 0x69a0aa7d, 0x401, 0x21}, 0x98) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r8 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/cuse\x00', 0x2, 0x0) write(r7, &(0x7f0000000b80)="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", 0x1ed) sendfile(r7, r8, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:31 executing program 1: prlimit64(0x0, 0xb, &(0x7f0000000080)={0x5, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x3, 0x2, 0x0, 0x3, 0x0, 0x1000000, 0x6}, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1, 0x8000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000180)=0xffffffffffffffff) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x4, 0x2, 0xdf91}) write$UHID_INPUT2(r1, &(0x7f0000000040), 0xb0) 03:25:31 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000000)=0x2, 0x4) syz_emit_ethernet(0x66, &(0x7f0000101000)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x7, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @empty, @dev}}}}}}}, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x410000) 03:25:31 executing program 2: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x82) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x10010, r0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400000, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000080)=""/112, 0x70) 03:25:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x9, 0x0, 0x4, 0x4000002, 0x8}, 0x14) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) socket$inet6(0xa, 0x0, 0x8) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cr4={0x1, 0x400000}], 0x1) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000240)) 03:25:31 executing program 5: ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) r1 = dup(r0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000080), &(0x7f0000000140)=0x24c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000280)={0x0, {{0x2, 0x0, @empty}}}, 0x88) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, 0x0) ioctl$CAPI_NCCI_GETUNIT(r2, 0x80044327, &(0x7f0000000000)=0xfffffffffffffffd) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) write(r3, &(0x7f0000000340)="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", 0x64f46d4788e4bb3b) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000240)=0xffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000180)=ANY=[@ANYBLOB="3200000056413454cc88894c5c649e6c76ddfaf03260b2378955c1480cc4f6cb0313864bc94df8f877d595d31d4db77624c8621ac7660b19f1"]) 03:25:31 executing program 2: stat(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) pread64(r0, 0x0, 0x0, 0x0) write$evdev(r1, &(0x7f0000000180)=[{{0x0, 0x2710}}], 0x18) 03:25:31 executing program 2: r0 = socket(0x10, 0x4000000000000002, 0xc) write(r0, &(0x7f00000001c0)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000400)="1f0000000104fffffd3b54c0071100e4f20501000b000200000000000000cf", 0x17) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40, 0x2) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000140)={0xffffffffffff8000, 0x80000001}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x1080090, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',rootmode=01465575623623744532732,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',default_permissions,default_permissions,default_permissions,obj_type=securityvmnet1!cpuset+vmnet0$bdev,obj_user=mime_type,,subj_role=vboxnet1[security,\x00']) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000340)={{0x1000, 0x80}, 0x1, 0x80000001, 0x9, {0x0, 0x58d}, 0x1f, 0x7f}) 03:25:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000140)={0x4, r0, 0x1}) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) [ 269.609942] EXT4-fs warning (device sda1): ext4_group_extend:1764: will only finish group (524288 blocks, 256 new) [ 269.690472] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 269.733731] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 269.876177] EXT4-fs warning (device sda1): ext4_group_extend:1770: can't read last block, resize aborted 03:25:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x9, 0x0, 0x4, 0x4000002, 0x8}, 0x14) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) socket$inet6(0xa, 0x0, 0x8) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cr4={0x1, 0x400000}], 0x1) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000240)) 03:25:32 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:32 executing program 2: ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000006b00)=[{{&(0x7f0000000800)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/151, 0x97}, {&(0x7f0000001940)=""/87, 0x57}, {&(0x7f00000019c0)=""/39, 0x27}, {&(0x7f0000001a00)=""/231, 0xe7}, {&(0x7f0000001b00)=""/137, 0x89}], 0x6, &(0x7f0000001c40)=""/222, 0xde}}, {{&(0x7f0000001d40)=@tipc=@name, 0x80, &(0x7f0000002480)=[{&(0x7f0000001dc0)=""/204, 0xcc}, {&(0x7f0000001ec0)=""/131, 0x83}, {&(0x7f0000001f80)=""/125, 0x7d}, {&(0x7f0000002000)=""/67, 0x43}, {&(0x7f0000002080)=""/253, 0xfd}, {&(0x7f0000002180)=""/243, 0xf3}, {&(0x7f0000002280)=""/206, 0xce}, {&(0x7f0000002380)=""/169, 0xa9}, {&(0x7f0000002440)=""/42, 0x2a}], 0x9, &(0x7f0000002540)=""/80, 0x50}, 0x5}, {{&(0x7f00000025c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000027c0)=[{&(0x7f0000002640)=""/89, 0x59}, {&(0x7f00000026c0)=""/252, 0xfc}], 0x2, &(0x7f0000002800)=""/228, 0xe4}}, {{&(0x7f0000002900)=@can, 0x80, &(0x7f0000002980)}, 0x6}, {{0x0, 0x0, &(0x7f0000002cc0)=[{&(0x7f00000029c0)=""/186, 0xba}, {&(0x7f0000002a80)}, {&(0x7f0000002ac0)=""/227, 0xe3}, {&(0x7f0000002bc0)=""/23, 0x17}, {&(0x7f0000002c00)=""/70, 0x46}, {&(0x7f0000002c80)=""/14, 0xe}], 0x6, &(0x7f0000002d40)=""/58, 0x3a}, 0x6}, {{&(0x7f0000002d80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000003000)=[{&(0x7f0000002e00)=""/75, 0x4b}, {&(0x7f0000002e80)=""/122, 0x7a}, {&(0x7f0000002f00)=""/146, 0x92}, {&(0x7f0000002fc0)=""/53, 0x35}], 0x4}}, {{&(0x7f0000003040)=@caif, 0x80, &(0x7f0000005200)=[{&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)=""/4096, 0x1000}, {&(0x7f00000050c0)=""/24, 0x18}, {&(0x7f0000005400)=""/4096, 0x1000}, {&(0x7f0000005100)=""/230, 0xe6}], 0x5, &(0x7f0000005280)=""/200, 0xc8}, 0x1915}, {{0x0, 0x0, &(0x7f0000006a40)=[{&(0x7f0000006400)=""/93, 0x5d}, {&(0x7f0000006480)=""/145, 0x91}, {&(0x7f0000006540)=""/209, 0xd1}, {&(0x7f0000006640)=""/105, 0x69}, {&(0x7f00000066c0)=""/154, 0x9a}, {&(0x7f0000006780)=""/225, 0xe1}, {&(0x7f0000006880)=""/118, 0x76}, {&(0x7f0000006900)=""/155, 0x9b}, {&(0x7f00000069c0)=""/77, 0x4d}], 0x9, &(0x7f0000005380)=""/63, 0x3f}, 0x4}], 0x8, 0x40, 0x0) sendmsg$inet_sctp(r1, &(0x7f00000006c0)={&(0x7f0000000140)=@in={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000180)="67ec90cdd5", 0x5}, {&(0x7f00000001c0)="8b8d24ccddf865067825e27934626bd57c5c3709ba397aee1328ffe856691e1c3ad4a75a3fe46197bc2d2fc636c833fc49beb462b010de8ef3d32b9908e77842975e517ff0b461bc77b59a9e3a804c13e0b878dfde8000e745c6781aaa24682386bf1755bb705e410b43378f5ae5ad2bdd53c77727edff9a66e128941873fac95fb7d8fc6aa3d36509d28cfac0a9ca2550682279483e01d1855a93cc1c5193c6261121b3f8f198ef37176f716ba195a97966a82591dd", 0xb6}, {&(0x7f0000000500)="6f77a41336719aeff3b05517779af2b0908ebebe88181478e26eed2cb6af3fc01062bb89d3dced68de45f29cab10610b3a11e16343b6b0b25623c276da25be084a1d889cf07a4d0c6614d64f46a475fc03ce9e93d518bc42723462906a00f25b5aa06dfacedb6239d6fe384b553b4cc976da5223132f33a47754549675733cd6e1dc8bf35dacf01ba8fbc4c667ade4c3e51b373c0850b9b33af1f209d85a8b9b0220676e83f8da0825224dcbc0803104a8a3727f164948e67429e7b45d88f04cde0da3", 0xc3}, {&(0x7f0000000280)="b5abbd9ecb9975b08bb1136e02af97e85974cbf74e2e8117b480c4fe75423705bf91ca4268d38980dbaf9a5fdf8c950e5611674d215603528db0ebeb8fee131b7cb21a156023553d198f662a475a8f1d24f185deb07de7189e0eb8f0f9e5b01778a041e766d69be0323e3274450dc8305704739a954ed24e729acda53c8f784d8aef4f73a2d319253a54212d4dab0a8e91d6ee5a6e6391", 0x97}], 0x4, &(0x7f0000000640)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}], 0x58, 0x8000}, 0x40000) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bind(0xffffffffffffffff, &(0x7f00000000c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x3, 0xfffffffffffffc01, 0xbbb, "f88f35c3b536a8cfd892d652c7807afda841a836f138703fd086937b87db3f2587e78025f60330942f7910ad40e0dd20ac84a8740b46303f13f9155f49a6c7", 0x20}, 0x80) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)={0x3ff, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x4, r5, 0x10001, 0x8c4}) r6 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x1) getrandom(&(0x7f0000000280)=""/113, 0x71, 0x3) ioctl$IMDELTIMER(r6, 0x80044941, &(0x7f0000000700)=0x2) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000540)={0x29, 0x0, &(0x7f0000006d00)=ANY=[@ANYBLOB="0f630c218000a990ee77416d6d68a36a02c917652fdf0a0e4a80c392c48313da7e131ba6fbf8cdf32e2b8eb925b31d00ebb28c26a5f7a0beb6477e95da74727075992d25f9a1d4e106f8985abe53874fd51320d1a04197036336c059fe9c92bbe329427e2f9149976991335997823da1f468df120e2b8c2e02f604eca7bd8fca2d68055c07efc1e708321f1bbbd0436eae14cb60714290a8d15b92dc08464d07272ef2dba31fcb71e0"], 0x83, 0x0, &(0x7f0000000480)="5cc570b5b79f2be0522f44fd71ff824833a2d7f951e61901c66dccce364b06561e238493dd8e07415ccc757f7c7c55e4fbea19167eca1cb8e4801e4faad14b0af5aa4c646f24d274d13a7a474e905e76156291b4e56dc7a392921d8716771949e4b5d297b5abd02e8964ac99f47be8bad780e7f7323241d3c04fa34a3e121a2ea23e75"}) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f00005befdc)) r8 = syz_open_pts(r7, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x11) set_mempolicy(0x2, &(0x7f0000000040)=0x5c9, 0x4) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f0000000300)) ftruncate(r9, 0x200004) sendfile(r3, r9, 0x0, 0x80001d00c0d0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000340)="b225eb75a3c7746f2411fca574b9e12bad2b2478c44ffc3f857ee0299b044b4fdcdff964ca1dc9b58caca0c6947f00d3c2c19372bdc3594a8fdd21d8fe6389ba53fa767bbf85c1739b302b3ab17289ab735637e66b8435d4c3820b40a15a2bac8342eef9d6c5b24215473f74a3949692fc2209b9ff49a54eb63f2429207514e733270ab7de628e8f9823edb1a1028631bf804983cf7848f74045cb39b6b81e382c7477a8dbeba6a82b66c0ecdf71b612f8fcd73d00ce90c0bc107390a1dd4cedd60d00004fdd5958ce62ad8b14bb9ef7a02a6d859b5421aad037956fbc27cae62f2cf4f63f0577ffa0e8e74e49684b49c6a3b0b4e5d8a6f24bf5a7bdbdd9974b") 03:25:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1a2) socket$packet(0x11, 0x3, 0x300) sendfile(r0, r1, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:32 executing program 5: ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) r1 = dup(r0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000080), &(0x7f0000000140)=0x24c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000280)={0x0, {{0x2, 0x0, @empty}}}, 0x88) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, 0x0) ioctl$CAPI_NCCI_GETUNIT(r2, 0x80044327, &(0x7f0000000000)=0xfffffffffffffffd) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) write(r3, &(0x7f0000000340)="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", 0x64f46d4788e4bb3b) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000240)=0xffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000180)=ANY=[@ANYBLOB="3200000056413454cc88894c5c649e6c76ddfaf03260b2378955c1480cc4f6cb0313864bc94df8f877d595d31d4db77624c8621ac7660b19f1"]) [ 270.109880] attempt to access beyond end of device [ 270.115234] loop0: rw=2049, want=78, limit=64 [ 270.119982] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:25:32 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0x1}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x8000, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000001c0)={0x0, @speck128, 0x3, "995e389dffba872b"}) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x20000}, &(0x7f0000000100)=0xffffffffffffff32) 03:25:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca5055e0bcfec7be070") r1 = socket$inet(0x10, 0x3, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400000, 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0x9) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="240000002400075e1dffed726fa2830020200a0009000000000001a0f1f8ffff0d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b18399c337e26fcc7e639700000100000000006c", 0x4c}], 0x1}, 0x0) [ 270.462331] EXT4-fs warning (device sda1): ext4_group_extend:1764: will only finish group (524288 blocks, 256 new) 03:25:32 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x10000) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 270.532289] FAT-fs (loop3): bogus number of FAT structure [ 270.571783] FAT-fs (loop3): Can't find a valid FAT filesystem [ 270.578139] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 270.585383] EXT4-fs warning (device sda1): ext4_group_extend:1770: can't read last block, resize aborted 03:25:32 executing program 1: mount(&(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000003f2e9e395e1aa83221edd905a5138434f3fd2a188c67eb1bbe796a166aa830c6729b8aab6852063e425300d352bec6806bd045833da98009b7a9027249ef5637c4c8790186998c04f8d81b0d724de9ee9abf4e33cf72af2d69f6fcf174"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 03:25:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000140)={0x4, 0x1}, 0x2) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000001c0)={0x1, 'ip6gre0\x00', 0x2}, 0x18) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) [ 270.786790] UBIFS error (pid: 13267): cannot open "", error -22 [ 270.787309] UBIFS error (pid: 13267): cannot open "", error -22 03:25:33 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:33 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x3}}, 0x8, 0x504, 0xffffffffffffffc1, 0x8c3b, 0x4d}, &(0x7f0000000100)=0x98) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) r4 = getegid() mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x120004, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="030000006573733d7c80413408beb70cda5ce8943c4957080ecb64b89736c5e232b680b615098689114db3f6a3faff83ceb649169b525ee8fa8c6cdc6d8e56edfbf3bf91dbebaf94d7f8a460997bdf1b23b75b39e2f4bae3a5a3197f14cd5bcb0fe09979020048", @ANYRESDEC=r3, @ANYBLOB=',dfltgid=', @ANYRESHEX=r4, @ANYBLOB=',afid=0x0000000000000009,loose,msize=0x0000000000000003,dont_measure,fsmagic=0xfffffffffffffffb,rootcontext=unconfined_u,func=POLICY_CHECK,seclabel,seclabel,seclabel,\x00']) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x5, 0x20}, 0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000480)={r2, 0x7fffffff}, 0x8) llistxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=""/40, 0x28) write$P9_RREADLINK(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="100000001701f045339b8b1140940007002e2f66696c6530"], 0x10) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x17e) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000003c0)=0x3ff, 0x4) 03:25:33 executing program 2: ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000006b00)=[{{&(0x7f0000000800)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/151, 0x97}, {&(0x7f0000001940)=""/87, 0x57}, {&(0x7f00000019c0)=""/39, 0x27}, {&(0x7f0000001a00)=""/231, 0xe7}, {&(0x7f0000001b00)=""/137, 0x89}], 0x6, &(0x7f0000001c40)=""/222, 0xde}}, {{&(0x7f0000001d40)=@tipc=@name, 0x80, &(0x7f0000002480)=[{&(0x7f0000001dc0)=""/204, 0xcc}, {&(0x7f0000001ec0)=""/131, 0x83}, {&(0x7f0000001f80)=""/125, 0x7d}, {&(0x7f0000002000)=""/67, 0x43}, {&(0x7f0000002080)=""/253, 0xfd}, {&(0x7f0000002180)=""/243, 0xf3}, {&(0x7f0000002280)=""/206, 0xce}, {&(0x7f0000002380)=""/169, 0xa9}, {&(0x7f0000002440)=""/42, 0x2a}], 0x9, &(0x7f0000002540)=""/80, 0x50}, 0x5}, {{&(0x7f00000025c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000027c0)=[{&(0x7f0000002640)=""/89, 0x59}, {&(0x7f00000026c0)=""/252, 0xfc}], 0x2, &(0x7f0000002800)=""/228, 0xe4}}, {{&(0x7f0000002900)=@can, 0x80, &(0x7f0000002980)}, 0x6}, {{0x0, 0x0, &(0x7f0000002cc0)=[{&(0x7f00000029c0)=""/186, 0xba}, {&(0x7f0000002a80)}, {&(0x7f0000002ac0)=""/227, 0xe3}, {&(0x7f0000002bc0)=""/23, 0x17}, {&(0x7f0000002c00)=""/70, 0x46}, {&(0x7f0000002c80)=""/14, 0xe}], 0x6, &(0x7f0000002d40)=""/58, 0x3a}, 0x6}, {{&(0x7f0000002d80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000003000)=[{&(0x7f0000002e00)=""/75, 0x4b}, {&(0x7f0000002e80)=""/122, 0x7a}, {&(0x7f0000002f00)=""/146, 0x92}, {&(0x7f0000002fc0)=""/53, 0x35}], 0x4}}, {{&(0x7f0000003040)=@caif, 0x80, &(0x7f0000005200)=[{&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)=""/4096, 0x1000}, {&(0x7f00000050c0)=""/24, 0x18}, {&(0x7f0000005400)=""/4096, 0x1000}, {&(0x7f0000005100)=""/230, 0xe6}], 0x5, &(0x7f0000005280)=""/200, 0xc8}, 0x1915}, {{0x0, 0x0, &(0x7f0000006a40)=[{&(0x7f0000006400)=""/93, 0x5d}, {&(0x7f0000006480)=""/145, 0x91}, {&(0x7f0000006540)=""/209, 0xd1}, {&(0x7f0000006640)=""/105, 0x69}, {&(0x7f00000066c0)=""/154, 0x9a}, {&(0x7f0000006780)=""/225, 0xe1}, {&(0x7f0000006880)=""/118, 0x76}, {&(0x7f0000006900)=""/155, 0x9b}, {&(0x7f00000069c0)=""/77, 0x4d}], 0x9, &(0x7f0000005380)=""/63, 0x3f}, 0x4}], 0x8, 0x40, 0x0) sendmsg$inet_sctp(r1, &(0x7f00000006c0)={&(0x7f0000000140)=@in={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000180)="67ec90cdd5", 0x5}, {&(0x7f00000001c0)="8b8d24ccddf865067825e27934626bd57c5c3709ba397aee1328ffe856691e1c3ad4a75a3fe46197bc2d2fc636c833fc49beb462b010de8ef3d32b9908e77842975e517ff0b461bc77b59a9e3a804c13e0b878dfde8000e745c6781aaa24682386bf1755bb705e410b43378f5ae5ad2bdd53c77727edff9a66e128941873fac95fb7d8fc6aa3d36509d28cfac0a9ca2550682279483e01d1855a93cc1c5193c6261121b3f8f198ef37176f716ba195a97966a82591dd", 0xb6}, {&(0x7f0000000500)="6f77a41336719aeff3b05517779af2b0908ebebe88181478e26eed2cb6af3fc01062bb89d3dced68de45f29cab10610b3a11e16343b6b0b25623c276da25be084a1d889cf07a4d0c6614d64f46a475fc03ce9e93d518bc42723462906a00f25b5aa06dfacedb6239d6fe384b553b4cc976da5223132f33a47754549675733cd6e1dc8bf35dacf01ba8fbc4c667ade4c3e51b373c0850b9b33af1f209d85a8b9b0220676e83f8da0825224dcbc0803104a8a3727f164948e67429e7b45d88f04cde0da3", 0xc3}, {&(0x7f0000000280)="b5abbd9ecb9975b08bb1136e02af97e85974cbf74e2e8117b480c4fe75423705bf91ca4268d38980dbaf9a5fdf8c950e5611674d215603528db0ebeb8fee131b7cb21a156023553d198f662a475a8f1d24f185deb07de7189e0eb8f0f9e5b01778a041e766d69be0323e3274450dc8305704739a954ed24e729acda53c8f784d8aef4f73a2d319253a54212d4dab0a8e91d6ee5a6e6391", 0x97}], 0x4, &(0x7f0000000640)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}], 0x58, 0x8000}, 0x40000) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bind(0xffffffffffffffff, &(0x7f00000000c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x3, 0xfffffffffffffc01, 0xbbb, "f88f35c3b536a8cfd892d652c7807afda841a836f138703fd086937b87db3f2587e78025f60330942f7910ad40e0dd20ac84a8740b46303f13f9155f49a6c7", 0x20}, 0x80) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)={0x3ff, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x4, r5, 0x10001, 0x8c4}) r6 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x1) getrandom(&(0x7f0000000280)=""/113, 0x71, 0x3) ioctl$IMDELTIMER(r6, 0x80044941, &(0x7f0000000700)=0x2) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000540)={0x29, 0x0, &(0x7f0000006d00)=ANY=[@ANYBLOB="0f630c218000a990ee77416d6d68a36a02c917652fdf0a0e4a80c392c48313da7e131ba6fbf8cdf32e2b8eb925b31d00ebb28c26a5f7a0beb6477e95da74727075992d25f9a1d4e106f8985abe53874fd51320d1a04197036336c059fe9c92bbe329427e2f9149976991335997823da1f468df120e2b8c2e02f604eca7bd8fca2d68055c07efc1e708321f1bbbd0436eae14cb60714290a8d15b92dc08464d07272ef2dba31fcb71e0"], 0x83, 0x0, &(0x7f0000000480)="5cc570b5b79f2be0522f44fd71ff824833a2d7f951e61901c66dccce364b06561e238493dd8e07415ccc757f7c7c55e4fbea19167eca1cb8e4801e4faad14b0af5aa4c646f24d274d13a7a474e905e76156291b4e56dc7a392921d8716771949e4b5d297b5abd02e8964ac99f47be8bad780e7f7323241d3c04fa34a3e121a2ea23e75"}) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f00005befdc)) r8 = syz_open_pts(r7, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x11) set_mempolicy(0x2, &(0x7f0000000040)=0x5c9, 0x4) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f0000000300)) ftruncate(r9, 0x200004) sendfile(r3, r9, 0x0, 0x80001d00c0d0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000340)="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") 03:25:33 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x3, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) io_destroy(r1) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000080)) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) 03:25:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) prlimit64(r1, 0xd, &(0x7f0000000240)={0xfff, 0x1}, &(0x7f0000000280)) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:33 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x2, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r1, 0x0, 0x1000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) pread64(r1, &(0x7f00000003c0)=""/155, 0x9b, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 03:25:33 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x8400, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e22, @empty}}}, 0x84) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) r1 = dup3(0xffffffffffffffff, r0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000100)=""/18, 0x12}, &(0x7f0000000140), 0x22}, 0x20) ioctl$sock_netdev_private(r0, 0x89f1, &(0x7f0000001300)="9f65f42732e9022e1608802f5ad62b51170459a91575d603b6ec0bab3edc074b781e1fb42701cb7da79892cd574bfc924ce883bb1f3654e3fe68aaedc5f73afbaa8964f76f37776b40efdc4166a2cd8bc117d6a18e98abb9a65e79f85cde9bf2539d43ce4e5bdf7f39999fdf28d36d90b046233df15d9d6d28d138a0309caf01dfdb0bfb5b0f841a0715187fd792824f6ace5dfc54fd5d6ab47c58c79a60a56db020a7582364a93be28ced3002a3aeb312d052e734fa5e7eadcc9c59696897214f7190b91ee7219c8a3fe6a4826a298e8c9de256bb5c79f8d3517b02bda103b77d6fa8") bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6) recvmmsg(r4, &(0x7f0000002080)=[{{&(0x7f0000001840)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000001940)}}, {{0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001980)=""/191, 0xbf}], 0x1, &(0x7f0000001a80)=""/31, 0x1f}, 0x2}, {{&(0x7f0000001ac0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, 0x0}, 0x31}, {{0x0, 0x0, &(0x7f0000001f40)=[{0x0}], 0x1}, 0xfffffffffffffffc}], 0x4, 0x44000102, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000001480)='/dev/cuse\x00', 0x2, 0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000001400)=r3) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000004, 0x11, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000001900)) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, &(0x7f0000000080)=0x2fe) 03:25:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000240)={0x0, 0xfffffffffffffffb, 0x1, 0x61, 0x38f, 0x6b}) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:33 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 271.703490] kauditd_printk_skb: 38 callbacks suppressed [ 271.703500] audit: type=1804 audit(1566098733.913:881): pid=13331 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/227/file0/file0" dev="sda1" ino=17106 res=1 03:25:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x24, 0x2e, 0x100, 0x70bd2c, 0x25dfdbfb, {0x19}, [@nested={0x10, 0x56, [@typed={0xc, 0x10, @str='vfat\x00'}]}, @generic]}, 0x24}, 0x1, 0x0, 0x0, 0x8810}, 0x4040000) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x200, 0x9ed871c020b39040) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) [ 271.855243] audit: type=1800 audit(1566098733.913:882): pid=13329 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=17106 res=0 03:25:34 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) open(&(0x7f0000000140)='./file0\x00', 0x1c080, 0x10) 03:25:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:34 executing program 2: ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000006b00)=[{{&(0x7f0000000800)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/151, 0x97}, {&(0x7f0000001940)=""/87, 0x57}, {&(0x7f00000019c0)=""/39, 0x27}, {&(0x7f0000001a00)=""/231, 0xe7}, {&(0x7f0000001b00)=""/137, 0x89}], 0x6, &(0x7f0000001c40)=""/222, 0xde}}, {{&(0x7f0000001d40)=@tipc=@name, 0x80, &(0x7f0000002480)=[{&(0x7f0000001dc0)=""/204, 0xcc}, {&(0x7f0000001ec0)=""/131, 0x83}, {&(0x7f0000001f80)=""/125, 0x7d}, {&(0x7f0000002000)=""/67, 0x43}, {&(0x7f0000002080)=""/253, 0xfd}, {&(0x7f0000002180)=""/243, 0xf3}, {&(0x7f0000002280)=""/206, 0xce}, {&(0x7f0000002380)=""/169, 0xa9}, {&(0x7f0000002440)=""/42, 0x2a}], 0x9, &(0x7f0000002540)=""/80, 0x50}, 0x5}, {{&(0x7f00000025c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000027c0)=[{&(0x7f0000002640)=""/89, 0x59}, {&(0x7f00000026c0)=""/252, 0xfc}], 0x2, &(0x7f0000002800)=""/228, 0xe4}}, {{&(0x7f0000002900)=@can, 0x80, &(0x7f0000002980)}, 0x6}, {{0x0, 0x0, &(0x7f0000002cc0)=[{&(0x7f00000029c0)=""/186, 0xba}, {&(0x7f0000002a80)}, {&(0x7f0000002ac0)=""/227, 0xe3}, {&(0x7f0000002bc0)=""/23, 0x17}, {&(0x7f0000002c00)=""/70, 0x46}, {&(0x7f0000002c80)=""/14, 0xe}], 0x6, &(0x7f0000002d40)=""/58, 0x3a}, 0x6}, {{&(0x7f0000002d80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000003000)=[{&(0x7f0000002e00)=""/75, 0x4b}, {&(0x7f0000002e80)=""/122, 0x7a}, {&(0x7f0000002f00)=""/146, 0x92}, {&(0x7f0000002fc0)=""/53, 0x35}], 0x4}}, {{&(0x7f0000003040)=@caif, 0x80, &(0x7f0000005200)=[{&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)=""/4096, 0x1000}, {&(0x7f00000050c0)=""/24, 0x18}, {&(0x7f0000005400)=""/4096, 0x1000}, {&(0x7f0000005100)=""/230, 0xe6}], 0x5, &(0x7f0000005280)=""/200, 0xc8}, 0x1915}, {{0x0, 0x0, &(0x7f0000006a40)=[{&(0x7f0000006400)=""/93, 0x5d}, {&(0x7f0000006480)=""/145, 0x91}, {&(0x7f0000006540)=""/209, 0xd1}, {&(0x7f0000006640)=""/105, 0x69}, {&(0x7f00000066c0)=""/154, 0x9a}, {&(0x7f0000006780)=""/225, 0xe1}, {&(0x7f0000006880)=""/118, 0x76}, {&(0x7f0000006900)=""/155, 0x9b}, {&(0x7f00000069c0)=""/77, 0x4d}], 0x9, &(0x7f0000005380)=""/63, 0x3f}, 0x4}], 0x8, 0x40, 0x0) sendmsg$inet_sctp(r1, &(0x7f00000006c0)={&(0x7f0000000140)=@in={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000180)="67ec90cdd5", 0x5}, {&(0x7f00000001c0)="8b8d24ccddf865067825e27934626bd57c5c3709ba397aee1328ffe856691e1c3ad4a75a3fe46197bc2d2fc636c833fc49beb462b010de8ef3d32b9908e77842975e517ff0b461bc77b59a9e3a804c13e0b878dfde8000e745c6781aaa24682386bf1755bb705e410b43378f5ae5ad2bdd53c77727edff9a66e128941873fac95fb7d8fc6aa3d36509d28cfac0a9ca2550682279483e01d1855a93cc1c5193c6261121b3f8f198ef37176f716ba195a97966a82591dd", 0xb6}, {&(0x7f0000000500)="6f77a41336719aeff3b05517779af2b0908ebebe88181478e26eed2cb6af3fc01062bb89d3dced68de45f29cab10610b3a11e16343b6b0b25623c276da25be084a1d889cf07a4d0c6614d64f46a475fc03ce9e93d518bc42723462906a00f25b5aa06dfacedb6239d6fe384b553b4cc976da5223132f33a47754549675733cd6e1dc8bf35dacf01ba8fbc4c667ade4c3e51b373c0850b9b33af1f209d85a8b9b0220676e83f8da0825224dcbc0803104a8a3727f164948e67429e7b45d88f04cde0da3", 0xc3}, {&(0x7f0000000280)="b5abbd9ecb9975b08bb1136e02af97e85974cbf74e2e8117b480c4fe75423705bf91ca4268d38980dbaf9a5fdf8c950e5611674d215603528db0ebeb8fee131b7cb21a156023553d198f662a475a8f1d24f185deb07de7189e0eb8f0f9e5b01778a041e766d69be0323e3274450dc8305704739a954ed24e729acda53c8f784d8aef4f73a2d319253a54212d4dab0a8e91d6ee5a6e6391", 0x97}], 0x4, &(0x7f0000000640)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}], 0x58, 0x8000}, 0x40000) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bind(0xffffffffffffffff, &(0x7f00000000c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x3, 0xfffffffffffffc01, 0xbbb, "f88f35c3b536a8cfd892d652c7807afda841a836f138703fd086937b87db3f2587e78025f60330942f7910ad40e0dd20ac84a8740b46303f13f9155f49a6c7", 0x20}, 0x80) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)={0x3ff, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x4, r5, 0x10001, 0x8c4}) r6 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x1) getrandom(&(0x7f0000000280)=""/113, 0x71, 0x3) ioctl$IMDELTIMER(r6, 0x80044941, &(0x7f0000000700)=0x2) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000540)={0x29, 0x0, &(0x7f0000006d00)=ANY=[@ANYBLOB="0f630c218000a990ee77416d6d68a36a02c917652fdf0a0e4a80c392c48313da7e131ba6fbf8cdf32e2b8eb925b31d00ebb28c26a5f7a0beb6477e95da74727075992d25f9a1d4e106f8985abe53874fd51320d1a04197036336c059fe9c92bbe329427e2f9149976991335997823da1f468df120e2b8c2e02f604eca7bd8fca2d68055c07efc1e708321f1bbbd0436eae14cb60714290a8d15b92dc08464d07272ef2dba31fcb71e0"], 0x83, 0x0, &(0x7f0000000480)="5cc570b5b79f2be0522f44fd71ff824833a2d7f951e61901c66dccce364b06561e238493dd8e07415ccc757f7c7c55e4fbea19167eca1cb8e4801e4faad14b0af5aa4c646f24d274d13a7a474e905e76156291b4e56dc7a392921d8716771949e4b5d297b5abd02e8964ac99f47be8bad780e7f7323241d3c04fa34a3e121a2ea23e75"}) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f00005befdc)) r8 = syz_open_pts(r7, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x11) set_mempolicy(0x2, &(0x7f0000000040)=0x5c9, 0x4) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f0000000300)) ftruncate(r9, 0x200004) sendfile(r3, r9, 0x0, 0x80001d00c0d0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000340)="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") 03:25:34 executing program 1: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f0000000240)='./file1\x00', 0x7fff, 0x5, &(0x7f0000000480)=[{&(0x7f0000000280)="f9cc8fbba3", 0x5, 0x4}, {&(0x7f0000000300)="faa2c35c593ac05467b30befb6a0915369e8d50f9cb1ba22aeb8a9d27ba9752c75b6e3266b0fb7fb870d135cfa46cc14dae5de8b69ba04235f56a48d36c9f6e76307f9bf615ec02f50854a0fac583983db5d215bef046bdd3af3935338ea502c81fb1889bb3fa25d47976f6c195da3f9ee36335609f4ec1d", 0x78, 0x51e8}, {&(0x7f00000007c0)="a09290f65415633ce8bce72164b9d6b3acd5414d38c59cc7d09c94a62901d97306e62525852ee2de3ef2884eb94c9f02e850fcf906cfb189daf582a9d60e7ace3628ebf7694efc4053de41d964644cfe2e26236af6ae10d9b52e55319d8111982c549464144ef3a6564b0821e4df4b786a856acbf6616561440254de34bf98c542e4f7ebb278d5c3c57f587efe8aef1baa6d8e41bb598350a05ffb975f23307da76a1f2a40e223c231a0f477cf5f5fc37ceb37d76a546b664134fd460425a7768d7f0ea5864cf00746308897489d096e26815118fe840c3323a9c472fb329efb79b2b2274216587b7324d76c7dab9375708bdb673c656950ef718ac474deafb4e0c706e54fc8df9880e3c8509002b5de68133c172df8414aac6fc5270c4013ee4327a6939aab49fc2d90c01b7dac8d0633feb171d2d56f86b9a7bfe9e0bc9f40e3977ab139443a7e16eb2f9c393b5e73dd9d7a21a1ce8c31acb57c98668c55289bc3e73780f95a3efcb1b52d9074a7055ea52d01a7ed4ffe91090ac18e83cfe32385d30d8acd947c313c1c82f6e4b22187ee98e94562e22c51fb3bd98bec60851456cbdf19f70ff61ea694bf7251d7ecaac3bf3b2ba56d8bb3c3d174b366291c0858610b522f11b17e497564b8c9a7ac70590ec949b9a2a1c376ed0091ea6165c76142a680b18ffbeac33b18dbe308ae982b6cd5d5fbc02af71d9a04e1338fbae08042d6ee4978c54b363e9e9e59bc3a1d9acc2a44a66d6dcf49daafb398fc743fc6d36c68b24251f604a849026a616fdd479283cd8d3e9c3418e0ec9c78c416c173a00fb96a44dc9f174ab8d717f0f64ad884987df8e01612d209a291558cff066e93cf36050b75ed94d7e0523c3f02fddc111ffc1dc02ada9057df2e69e8aeeb84cbb2308acc8df11a58c40d2d85b7341f7edadc3b566f71b3e6f29070b3e94a72e6023741a3360a92d49f3dd8eb8fac38c0c28d2ad1c42574d8314083e904413f28d48a1f4cc4d7bbe5b653ffdf93a27224586db89055b4d227a924508ee9916745c1421f7d67211bf5ec8b81050cd356a2feff0301305be55b9a3c0c61af18b856adb7f9bdf1cbec946a6441f70ca51757ad2b59b0b9fa487c42c446d049ba2b40537634aeb39d57e0224dbd0623f690dfd1f075e665faba77a47ca166db21906ed59a2509b2c10c845e9830ed34a19cdadc7422bb334e2adbbe9687cbd0be51bed3605c9160fadb2299a54733f4124286c0c7784fb7e4b3bbe320662a8329a36faccb4519edbb9aacd58bbb701bac9df59e87a0108534b0043981ad6d694eafd0b71e16ba6d5aa14f202eefe49187c59387d0c47350eb862b3a2b92018652937041bbe868ce75dba169a6e88947a96e40d0c2d91eddcde27d733922e302197680ae250134c192d0541e8ed77215d82a508b24244bce625cf481d8ec061a639e35bcf60efa20d7efa5cdec13f90c73d7f48153258471b59d6048d08d5dff640723aadc3c0b2e0370ac340b6bf340a3c9f5890c19d671298b58720cae23ce8439375f838071d02936d25287844ffe068e6544d05a5001cf5c11669227eaceb4e373c926ece806698cc87a1853c2e86b8a7b027aceca60aad48ad632a1bc72bbe6aeee730aca45bc8cfcbd4d81d508cbbc273d3a0ae24e069b87494d50d2328f4cadaf08cb7cb09c7f68dc5071a3b841d2474eb0ff2dcc3f6343e175baefeaff1a94ca8cdb3961e4c3677e766b95fe6264b26c5e7b12435fcdbad0d28e9775cb7521705a8e670ff826a68aa0beda172298505ce97c70a67578c3e58e41c0bc88be2c88cdc85b566137fb3259c37bb2532460c3e7c7d21f94b021e650d5183b4b9cab7ea19fe95c2c9a53b448b0210072885f90626d92c0002a1ad0859a5585a7e98b37a88a81f78c1f77e3f412bbf6252737366384b1ccb684d10e5fe93467b75d3b1d3d8e4b1cee63c676a8893390e50c919e22d6a6e34ee5cf8cc1e99d7c14abddf237288168b88bf6d89439c5b2039ab89f645a6fc5003331785fb35df7983a91c16344bca45b8bfa20793b8573ce692921d2c3ffcbda783dff631b426109ffa6a8ab416028a862fde829a8af022c85db5c43dc931e159fa687e4a1efbfa2d2117db27869cdde0ba2468c43aa4313c113a9106b149cbffc5f27380e2729c7f3506f73a3eacb47c598f1d573d347811c46fd4c401846dd8d7127c55a4acd46c3651bab4f9648fa3519c8cfda1dc2aa8b6c6e57c07cb73ea90d8cd72bb23b76f2368491972f25905549a8a8f7b02eaff874af5bf458e45481a050cffa2d1e955ae42d445ea488bc5c51bd2258f5a83fabdf8f43c2ff00b94fac96040589989708b76ddb2d05a953fb1adbf8b42941460935ea0b0d99abf410fe0387b80749ec3bfa3b1fd52a99fbd386b9fdaeb26485fe7e611cb3468c006df18c4863093a5742324f0dbbc96958a3f356522504adec8502207675a10afc3239308ae51b6ae8db744f670d2250ab115df409baa9ba7bca0f4b8895c76f696554f0975e753990c0711b758d1cb11b28d8b099dbc669fb0e41006ea0702a2f8ba60eacc45dd26216e7d2d985a2fc0a440be8935a59ac32f930c496be92f516b506ec566650e937cbfcc7fcbfcf75dee534ad4ab143d5d3c64f2001023ea49e543bd7ea68b438ecdc804177b74bb91b50b4f9144bad8043f51ecbf5177d3838dd43a2923a934144eb29802e2d1f2c9b0c03f4472605fb20f6991adb6eed05d46dcc9f754e39d12ad140de748c0526ca6cf4f21642ae2d7123715ec0d0a1e11dcce2e6a232156ac1c11bbcf067cf34f0c6e49a157bf3ef46e8e05526b49e184e2730b43fefa21859ca773948f7de5a96f30acd694f981f05a17ad8a9d6d32284dc8abca866b142f40d8b7390443922fa6486ce2b1cd144a2b9e143df7458f72a59273cccdb3dd068a2b7ec42cec9188c2d73cfb75bc689583d732aaf6ca4b79cb0cbef898219fc7f4377e33c008c7001b8fc922f00aa63ab4a740d32115b8f713e0c6cbc72da0ac92336c2c3ebce866a3745104abdaf365432d9cc828ffe28478d7779545e19f344a811c91a8b5f776e51a6127caffc3dccb1598140abe45dd6a898db1ffa617cee577b2ab10a947e5b1d167497257ce9ca9f809cd2cd7059a86abcc4ed436144875550b6bc64595d3e6e89053e98da5515a0515e7fef6889839c5de89f9f148bf8fd56bc832b5df213690228686930e8218eb58347e2a3d26a95f792867199845affdc99add470cef60a95886b5aca3740736fa827d6d03990ecf0ce3135562986d509effea8ddb19a1daf7961d08929556bc32d62e4d9c54bc65dfeb5d2c5af65cc8dda38d1bd4fc8faa4d4a9333c95c68f8fff79046ff5d655a993f0a5393a241c66e99a4ec276b74aeea64883dbd6190a24a4633315fd111045f2d4a890114c3c05b352248c086d52760bd4ae0b4bed756da888ad80752d743efc79cc993409c97856411020c3430a56e38c63cf34423e777c2df0af32d396f501dc4b5e68c64ae1f8531e878ca95c64d10f9ac4a439a52045cd399d923b81101c3fd2d91f403f217f8c9f1c03958790a40ea59b35819117312a71313260df087776a23a5bba626c2a104d086d3e5f870dd4359e0aa7cc5e9c6a4fb68d9bd9f138ba81c48cf95c305f10f70ac1007486064925249c11672a30a39dc12cd8cad1ee6904e8e2f4cda40b25403e70b95694c64e4df2ca50dfa537b10cf4412b53b74c3b5b7531a252021f43b3266a595c23d5afc2e9dcf40660465ef345eccfdf86ba8286534478d0f766732c4ca22a85e0fd4d9b32e84fc066b420f6dc29b83842008deeaa8b8f6459aaa8141e812e29066dfd2330447f7ed6aa679ca0920150771255676e985878003b67fb76196a19a740be8b81b39aa01764885147ce1921d6b930288e084d4b6f3bd02db10ce4e1948dcb3c10a6d099c0622a71fcf2ac2d62b09e6f21898cfdbcc93bbff08c5077549f9df28c04fa3bfe3ff780a6b0d8fb2375503679255ff8821a01c4acf4fb24de30d094d6da2c4abbb04f78808e5d5d5c26a55eb01d9a6723ae5b018fd495daf33a579aed0a71a950eceec813a805b0e81a37e7d24dca2c79520b21daeb4cc1db22a70692b6a411fa29f514ecb6564a2a550a05eb6fb1fef55eef3ba4e0097f59e88b0bafa9af3bfe5a4a4df29768888396d0124a97b5dc9a9f86dd46a5235d0dec33ca83701a1e63d2ae1809f5d7d8bcf712365d5460e56770f92a1357dcf0f6c095313d87a37c1d646f7cf9872aaf0b7ce84f9dceefa05369881559b420902caa673b747b7ebaf3f7e951a3df8122de0d5965701a6f48f002724b3440fd0210ef136ea464c80479e9baeaf1c323457830ebfb5b524fdc33515d7f0d500d3dcc331014dab3cb803d50539f56e8760c411e02aab316194ec9474f6b7c1515ee016bcc409332aeb2994e1f8c33f0b49e526add92f6a76cddd36039f63651088dbdbc4fd6f1791928c9e4a2c2ae76c43df996a36c928b12d4700a2000d5ec2add50747b2fa1fcd7dc2e99fbb0687cabdb6ec2ec74eea4765447239a88beacedfc4ed1e3c2dd9a775a144bab7a1e72f8daaa4947a9fb26c21d3da785d4826352fbad6bb9fb13525ac02cc6643f16e33762aa7846e975b6589be39191bb1e230c0bac58171a37ec8e55547360643e12ed6390ba9812c703e0d7659b0b08d3d208888fdb3189a9ef9845f2579e12dd3590741566568106fcddc940e1e530045bdccb8637bc6caef6f26640bba3a44d2772e3f7fc5b9e1d28fe3bbc0e7e05ac3bca0a990c5b135084b0dab0f4b84c5d2843789e9fdbeeca202f6b7cd40d0f198367093eef5c6997f1e26a1dcbe1e0a70f4c2b030ef3c8fc51729b42cba84fb6aa9ba26dc92a7a46bfd6cd84c083a08f334a8704f6d22c4c3c64fb8a899a8b84fd579f15c65dd97f5f4dc74035ecae31c45dd51686b9b60fa8c7f0ad1f6d86656b33d4fd524fda5f9f37bc4733bc728bd9ad7d51b770a46bc550501f1b0109202062904a3684f69325f256f52ddf845287ac90a17c6b61b2ecc929f5da50a7096270fb4fc3841c82e12143a913b315fdabaac47fa2128ede0ad500b6ec81b16ab9258635ab979409aa79fb2daf5edeb82e0be7476e86593b9d9645d0c9d1fd596eb79f8d5f38cf1a9ce3f133a56021e42d5da818f372cc2dc0cca0dc223fec8c5a2b5467b20e7f539224a95436bfffd23dc9df3929eab8bce6cd16bc7a4aee31b44d185e1323ce7bc8d2afec966bff372cb7dcc17074de91600d9f15d42bffb6a5214bf3d037665efbeefe4aaa16ce7c399caa09f3595381eb3c2128792c23ff39521a92665dab2f28d091d54fe11cfc2aa82c6aa1bee2667174a8c66733925fb6b6fef1cce712a143a17ee91bcb6986cbfcd15337aa729a0a793a7990b69e304083fb62853f48fc2946dd74a0556f19023d1a44966c7f4245ff5fea2fe835794fa75830389e25e038cb01c61b2b9894a11cd0ff7b940d4a61455c8dbf6a7d02c53ab83f5f89bd46c9f3ebb9312e0f1046d147592671ffd2fa73488c3fad33f4edb5ed84497c1bbbc606bff87a351c221ccf40babe34147c315b648a3a67c45baf084f17f69599aeae4d0dd2601f9815a3974415bab141f679038ebe6a9c173a023750e91c83c562413abd94cd208928f91dbfebcebe01868e666ad357b92f52e342da99665cf04464565aed0959d4324b655529852e59fca1c4135d7d9e98c697cc16f6951b05a13c3ff9684a08c3c5a93ebbf5c4f8334e06", 0x1000}, {&(0x7f00000003c0)="1297b01129d1e8d1b970663ee8628d159a821b3b4ef1c31af3fde226bbda4cd63a6d9471cc1f7a024692a7a1740f27ccf810a1dd0aea3188ea1dc8244bb9f7316607837228323db83b8a6c43bd04ae55db35abc13caa0ff2e8c609d837718041210bdd42f4e1f43e1d5c", 0x6a}, {&(0x7f0000000440)="9096d85b2591c6bcab7a2ca0d648a305eb52523dbff62c8914e9181ff3669650be9d50d03744f41ed6a35e7806cd4225a44d89cc", 0x34, 0x1}], 0x1, &(0x7f0000000580)={[{@errors_ro_remount='errors=ro-remount'}, {@usrjquota='usrjquota'}, {@nouser_xattr='nouser_xattr'}], [{@subj_user={'subj_user', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000140)={0x3}) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x400000000000058, 0x1f00) write(r0, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) [ 272.258606] audit: type=1800 audit(1566098734.113:883): pid=13340 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=17139 res=0 [ 272.331652] audit: type=1804 audit(1566098734.173:884): pid=13343 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/240/file0/file0" dev="sda1" ino=17139 res=1 03:25:34 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0xabe, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0xd, 0x3}], 0x1, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000180)={0x8, 0x4, 0x1}) [ 272.545614] audit: type=1804 audit(1566098734.623:885): pid=13371 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/241/file0" dev="sda1" ino=16641 res=1 03:25:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0x400004}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x30, r3, 0x2, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x4, 0x5, 0x3, 0x200}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x810) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000140)) write(r1, &(0x7f0000000600)="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", 0x1a2) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000400)={0x5, 0xb, 0x4, 0x200000, {0x77359400}, {0x1, 0x8, 0x2fdb, 0x100000001, 0x0, 0x2, "5d853ae0"}, 0x80000000, 0x4, @planes=&(0x7f00000003c0)={0x1000, 0x2a, @userptr=0xd7, 0x5}, 0x4}) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) [ 272.726839] audit: type=1800 audit(1566098734.623:886): pid=13366 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16641 res=0 [ 272.753443] audit: type=1800 audit(1566098734.733:887): pid=13373 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="loop1" ino=316 res=0 03:25:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f0000000240)='./file1\x00', 0x7fff, 0x5, &(0x7f0000000480)=[{&(0x7f0000000280)="f9cc8fbba3", 0x5, 0x4}, {&(0x7f0000000300)="faa2c35c593ac05467b30befb6a0915369e8d50f9cb1ba22aeb8a9d27ba9752c75b6e3266b0fb7fb870d135cfa46cc14dae5de8b69ba04235f56a48d36c9f6e76307f9bf615ec02f50854a0fac583983db5d215bef046bdd3af3935338ea502c81fb1889bb3fa25d47976f6c195da3f9ee36335609f4ec1d", 0x78, 0x51e8}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000003c0)="1297b01129d1e8d1b970663ee8628d159a821b3b4ef1c31af3fde226bbda4cd63a6d9471cc1f7a024692a7a1740f27ccf810a1dd0aea3188ea1dc8244bb9f7316607837228323db83b8a6c43bd04ae55db35abc13caa0ff2e8c609d837718041210bdd42f4e1f43e1d5c", 0x6a}, {&(0x7f0000000440)="9096d85b2591c6bcab7a2ca0d648a305eb52523dbff62c8914e9181ff3669650be9d50d03744f41ed6a35e7806cd4225a44d89cc", 0x34, 0x1}], 0x1, &(0x7f0000000580)={[{@errors_ro_remount='errors=ro-remount'}, {@usrjquota='usrjquota'}, {@nouser_xattr='nouser_xattr'}], [{@subj_user={'subj_user', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000140)={0x3}) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x400000000000058, 0x1f00) write(r0, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f0000000240)='./file1\x00', 0x7fff, 0x5, &(0x7f0000000480)=[{&(0x7f0000000280)="f9cc8fbba3", 0x5, 0x4}, {&(0x7f0000000300)="faa2c35c593ac05467b30befb6a0915369e8d50f9cb1ba22aeb8a9d27ba9752c75b6e3266b0fb7fb870d135cfa46cc14dae5de8b69ba04235f56a48d36c9f6e76307f9bf615ec02f50854a0fac583983db5d215bef046bdd3af3935338ea502c81fb1889bb3fa25d47976f6c195da3f9ee36335609f4ec1d", 0x78, 0x51e8}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000003c0)="1297b01129d1e8d1b970663ee8628d159a821b3b4ef1c31af3fde226bbda4cd63a6d9471cc1f7a024692a7a1740f27ccf810a1dd0aea3188ea1dc8244bb9f7316607837228323db83b8a6c43bd04ae55db35abc13caa0ff2e8c609d837718041210bdd42f4e1f43e1d5c", 0x6a}, {&(0x7f0000000440)="9096d85b2591c6bcab7a2ca0d648a305eb52523dbff62c8914e9181ff3669650be9d50d03744f41ed6a35e7806cd4225a44d89cc", 0x34, 0x1}], 0x1, &(0x7f0000000580)={[{@errors_ro_remount='errors=ro-remount'}, {@usrjquota='usrjquota'}, {@nouser_xattr='nouser_xattr'}], [{@subj_user={'subj_user', 0x3d, 'vfat\x00'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000140)={0x3}) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x400000000000058, 0x1f00) write(r0, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:35 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0xa300f083f8a8c8d6, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 272.928506] FAT-fs (loop3): bogus number of reserved sectors [ 272.966636] FAT-fs (loop3): Can't find a valid FAT filesystem 03:25:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64, @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) [ 273.024249] audit: type=1804 audit(1566098734.833:888): pid=13373 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir487107732/syzkaller.e0SpMP/258/file0/file0" dev="loop1" ino=316 res=1 [ 273.076038] audit: type=1800 audit(1566098734.863:889): pid=13378 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=317 res=0 [ 273.110898] audit: type=1804 audit(1566098734.863:890): pid=13382 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/229/file0/file0" dev="loop3" ino=317 res=1 [ 273.168798] FAT-fs (loop3): bogus number of reserved sectors [ 273.199933] FAT-fs (loop3): Can't find a valid FAT filesystem 03:25:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x10002, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) fcntl$getownex(r2, 0x10, &(0x7f0000000280)={0x0, 0x0}) sched_rr_get_interval(r3, &(0x7f00000001c0)) sendfile(r1, r2, 0x0, 0x10000) perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x8, 0x1000, 0xdf47, 0x100, 0x0, 0x0, 0x80000, 0x1, 0x4000000000000, 0x7, 0x2, 0x4, 0x7, 0x400, 0x0, 0x3, 0x7ad, 0x8, 0x7, 0xb2d, 0x3d57, 0x0, 0x9c, 0xc4, 0xff, 0x20, 0x8, 0x8000, 0xffffffff, 0x2, 0xffffffffffffff56, 0xffffffffffffff13, 0x35a8, 0x4, 0x10001, 0x7, 0x0, 0xfffffffffffffff8, 0x1, @perf_bp={&(0x7f0000000240), 0x2}, 0x20, 0x7, 0x4, 0x9, 0xfffffffffffffffd, 0x3, 0xbcd5}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$inet6_int(r0, 0x29, 0xde, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x24, 0x2e, 0x100, 0x70bd2c, 0x25dfdbfb, {0x19}, [@nested={0x10, 0x56, [@typed={0xc, 0x10, @str='vfat\x00'}]}, @generic]}, 0x24}, 0x1, 0x0, 0x0, 0x8810}, 0x4040000) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x200, 0x9ed871c020b39040) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:35 executing program 2: ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000006b00)=[{{&(0x7f0000000800)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/151, 0x97}, {&(0x7f0000001940)=""/87, 0x57}, {&(0x7f00000019c0)=""/39, 0x27}, {&(0x7f0000001a00)=""/231, 0xe7}, {&(0x7f0000001b00)=""/137, 0x89}], 0x6, &(0x7f0000001c40)=""/222, 0xde}}, {{&(0x7f0000001d40)=@tipc=@name, 0x80, &(0x7f0000002480)=[{&(0x7f0000001dc0)=""/204, 0xcc}, {&(0x7f0000001ec0)=""/131, 0x83}, {&(0x7f0000001f80)=""/125, 0x7d}, {&(0x7f0000002000)=""/67, 0x43}, {&(0x7f0000002080)=""/253, 0xfd}, {&(0x7f0000002180)=""/243, 0xf3}, {&(0x7f0000002280)=""/206, 0xce}, {&(0x7f0000002380)=""/169, 0xa9}, {&(0x7f0000002440)=""/42, 0x2a}], 0x9, &(0x7f0000002540)=""/80, 0x50}, 0x5}, {{&(0x7f00000025c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000027c0)=[{&(0x7f0000002640)=""/89, 0x59}, {&(0x7f00000026c0)=""/252, 0xfc}], 0x2, &(0x7f0000002800)=""/228, 0xe4}}, {{&(0x7f0000002900)=@can, 0x80, &(0x7f0000002980)}, 0x6}, {{0x0, 0x0, &(0x7f0000002cc0)=[{&(0x7f00000029c0)=""/186, 0xba}, {&(0x7f0000002a80)}, {&(0x7f0000002ac0)=""/227, 0xe3}, {&(0x7f0000002bc0)=""/23, 0x17}, {&(0x7f0000002c00)=""/70, 0x46}, {&(0x7f0000002c80)=""/14, 0xe}], 0x6, &(0x7f0000002d40)=""/58, 0x3a}, 0x6}, {{&(0x7f0000002d80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000003000)=[{&(0x7f0000002e00)=""/75, 0x4b}, {&(0x7f0000002e80)=""/122, 0x7a}, {&(0x7f0000002f00)=""/146, 0x92}, {&(0x7f0000002fc0)=""/53, 0x35}], 0x4}}, {{&(0x7f0000003040)=@caif, 0x80, &(0x7f0000005200)=[{&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)=""/4096, 0x1000}, {&(0x7f00000050c0)=""/24, 0x18}, {&(0x7f0000005400)=""/4096, 0x1000}, {&(0x7f0000005100)=""/230, 0xe6}], 0x5, &(0x7f0000005280)=""/200, 0xc8}, 0x1915}, {{0x0, 0x0, &(0x7f0000006a40)=[{&(0x7f0000006400)=""/93, 0x5d}, {&(0x7f0000006480)=""/145, 0x91}, {&(0x7f0000006540)=""/209, 0xd1}, {&(0x7f0000006640)=""/105, 0x69}, {&(0x7f00000066c0)=""/154, 0x9a}, {&(0x7f0000006780)=""/225, 0xe1}, {&(0x7f0000006880)=""/118, 0x76}, {&(0x7f0000006900)=""/155, 0x9b}, {&(0x7f00000069c0)=""/77, 0x4d}], 0x9, &(0x7f0000005380)=""/63, 0x3f}, 0x4}], 0x8, 0x40, 0x0) sendmsg$inet_sctp(r1, &(0x7f00000006c0)={&(0x7f0000000140)=@in={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000180)="67ec90cdd5", 0x5}, {&(0x7f00000001c0)="8b8d24ccddf865067825e27934626bd57c5c3709ba397aee1328ffe856691e1c3ad4a75a3fe46197bc2d2fc636c833fc49beb462b010de8ef3d32b9908e77842975e517ff0b461bc77b59a9e3a804c13e0b878dfde8000e745c6781aaa24682386bf1755bb705e410b43378f5ae5ad2bdd53c77727edff9a66e128941873fac95fb7d8fc6aa3d36509d28cfac0a9ca2550682279483e01d1855a93cc1c5193c6261121b3f8f198ef37176f716ba195a97966a82591dd", 0xb6}, {&(0x7f0000000500)="6f77a41336719aeff3b05517779af2b0908ebebe88181478e26eed2cb6af3fc01062bb89d3dced68de45f29cab10610b3a11e16343b6b0b25623c276da25be084a1d889cf07a4d0c6614d64f46a475fc03ce9e93d518bc42723462906a00f25b5aa06dfacedb6239d6fe384b553b4cc976da5223132f33a47754549675733cd6e1dc8bf35dacf01ba8fbc4c667ade4c3e51b373c0850b9b33af1f209d85a8b9b0220676e83f8da0825224dcbc0803104a8a3727f164948e67429e7b45d88f04cde0da3", 0xc3}, {&(0x7f0000000280)="b5abbd9ecb9975b08bb1136e02af97e85974cbf74e2e8117b480c4fe75423705bf91ca4268d38980dbaf9a5fdf8c950e5611674d215603528db0ebeb8fee131b7cb21a156023553d198f662a475a8f1d24f185deb07de7189e0eb8f0f9e5b01778a041e766d69be0323e3274450dc8305704739a954ed24e729acda53c8f784d8aef4f73a2d319253a54212d4dab0a8e91d6ee5a6e6391", 0x97}], 0x4, &(0x7f0000000640)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}], 0x58, 0x8000}, 0x40000) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bind(0xffffffffffffffff, &(0x7f00000000c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x3, 0xfffffffffffffc01, 0xbbb, "f88f35c3b536a8cfd892d652c7807afda841a836f138703fd086937b87db3f2587e78025f60330942f7910ad40e0dd20ac84a8740b46303f13f9155f49a6c7", 0x20}, 0x80) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)={0x3ff, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x4, r5, 0x10001, 0x8c4}) r6 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x1) getrandom(&(0x7f0000000280)=""/113, 0x71, 0x3) ioctl$IMDELTIMER(r6, 0x80044941, &(0x7f0000000700)=0x2) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000540)={0x29, 0x0, &(0x7f0000006d00)=ANY=[@ANYBLOB="0f630c218000a990ee77416d6d68a36a02c917652fdf0a0e4a80c392c48313da7e131ba6fbf8cdf32e2b8eb925b31d00ebb28c26a5f7a0beb6477e95da74727075992d25f9a1d4e106f8985abe53874fd51320d1a04197036336c059fe9c92bbe329427e2f9149976991335997823da1f468df120e2b8c2e02f604eca7bd8fca2d68055c07efc1e708321f1bbbd0436eae14cb60714290a8d15b92dc08464d07272ef2dba31fcb71e0"], 0x83, 0x0, &(0x7f0000000480)="5cc570b5b79f2be0522f44fd71ff824833a2d7f951e61901c66dccce364b06561e238493dd8e07415ccc757f7c7c55e4fbea19167eca1cb8e4801e4faad14b0af5aa4c646f24d274d13a7a474e905e76156291b4e56dc7a392921d8716771949e4b5d297b5abd02e8964ac99f47be8bad780e7f7323241d3c04fa34a3e121a2ea23e75"}) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f00005befdc)) r8 = syz_open_pts(r7, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x11) set_mempolicy(0x2, &(0x7f0000000040)=0x5c9, 0x4) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f0000000300)) ftruncate(r9, 0x200004) sendfile(r3, r9, 0x0, 0x80001d00c0d0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000340)="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") 03:25:35 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x8100, 0x0, 0x0, 0x7fffffff, 0x0, 0xe96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) sendfile(r2, r2, 0x0, 0x10000010000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:35 executing program 5: clone(0x12045bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f00000001c0)=0xd000) ptrace(0x4206, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000140)="19495ff17d") ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000000)={0x0}) 03:25:35 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000004ec0)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 03:25:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000001c0)=ANY=[@ANYBLOB="731e81d959925eec807aeab73c422d0500000800000000000000004997e0efd25a1f5d76f1e59f6a379eba"]) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:35 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000240)={0x4, 0x2, @raw_data=[0x4800, 0x8, 0x3, 0x2, 0x5, 0x1, 0x8, 0x7fffffff, 0x1ff, 0x3f, 0x3f, 0xa4, 0x1f, 0x6, 0x3, 0xfffffffffffffff7]}) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000140)=0x100000) 03:25:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) 03:25:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='.\x00', 0x0, 0x80) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x1}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={r3, 0x2}, &(0x7f0000000240)=0x8) 03:25:36 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 273.944308] attempt to access beyond end of device [ 273.960907] loop0: rw=2049, want=78, limit=64 [ 273.974937] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:25:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64, @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:36 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 03:25:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000300)=""/82, 0x52) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000240)={0x88, @remote, 0x4e20, 0x3, 'fo\x00', 0xb8a05d2e39418538, 0x2, 0x5e}, 0x2c) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000001c0)=0x3) r2 = getuid() ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000140)={0x3, @default, r2}) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f00000003c0)={0x9, 0x1, 0x1, 'queue1\x00', 0x1f}) write(r1, &(0x7f0000000600)="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", 0x1a2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/63, 0x3f}, {0x0}], 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f0000000780)=[{&(0x7f0000000b00)=""/4096, 0x1000}, {0x0}], 0x2) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0x282}, {0x0, 0x87}], 0x1000000000000009}, 0x0) shutdown(r5, 0x0) shutdown(r3, 0x0) 03:25:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200400cf, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) 03:25:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) 03:25:36 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f00000001c0)={0xffffffffffffffcd, 0x2, 0x0, {0x4, 0x100}}, 0x28) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000003c0)) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x0, 0x5, 0x9, 0x0, 0x6, 0x1, 0x400000000040, 0x9, 0x40000000000, 0x7}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) getpeername$unix(r1, &(0x7f0000000240)=@abs, &(0x7f0000000140)=0x6e) 03:25:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000280)=""/244, 0xf4}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, 0x0, 0x40080) readv(r2, &(0x7f0000000880)=[{&(0x7f0000000380)=""/218, 0xda}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r3, 0x0) poll(0x0, 0x0, 0xff) shutdown(r4, 0x0) getpid() shutdown(r1, 0x0) 03:25:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x7) 03:25:36 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) write$binfmt_script(r0, 0x0, 0x0) 03:25:36 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f00000001c0)={&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000003c0)=""/244, 0xf4}) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000240)=""/29, &(0x7f0000000280)=0x1d) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) 03:25:36 executing program 2: r0 = socket$inet(0x2, 0x3, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) [ 274.736946] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) 03:25:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64, @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x45, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f00000001c0)=0x5) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1a2) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fd7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000140)=0x7006) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:25:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000180)=""/12, 0xc}, {0x0}], 0x2}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005b9) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)=""/73, 0x49}], 0x1}, 0x2) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005ae) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000d00)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r4, 0x0) shutdown(r1, 0x0) 03:25:37 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x2000, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0xba, 0x1c1400) syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x800) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x400000, 0x0) ioctl$TIOCCBRK(r0, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000080)=0x7fffffff) setxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:dmesg_exec_t:s0\x00', 0x22, 0x3) accept(r0, &(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x80) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) 03:25:37 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0x9}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:37 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000002740)="11dca5055e0bcfe47bf070") socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) 03:25:37 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = dup2(r0, r0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89f2, &(0x7f0000000180)={'bpq0\x00'}) 03:25:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) inotify_init() r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000000)=0xa0e, 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x20000000, 0x300, 0x0, 0x1000000000054}, 0x98) [ 275.335322] FAT-fs (loop4): invalid media value (0x02) [ 275.355251] FAT-fs (loop4): Can't find a valid FAT filesystem 03:25:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:37 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0/file0\x00', 0x101100, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b"], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:37 executing program 2: r0 = socket$inet(0x2, 0x4800000000000002, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000008c0)={0x0, {}, {0x2, 0x0, @empty=0x2}, {0x2, 0x0, @dev}, 0x1c}) [ 275.679066] attempt to access beyond end of device [ 275.696992] loop0: rw=2049, want=78, limit=64 [ 275.706685] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:25:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fd7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000140)=0x7006) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:25:38 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000000240)="eb3c906d6b66732e666174000204010002000270fff8f15d2a8f4e90bfdfef4fa9f176900e531711f96276d0d602206dca9f19df3cde5a2afa023f069f332bd1892f46bb3875dfb55304e235f5d1d724a8710d8972984bb8d5906b13c6a3", 0x5e}], 0x2, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000980)="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", 0xfffffe1d) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x44, 0x3}]}}, @icmp=@timestamp_reply}}}}, 0x0) 03:25:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280", 0xf}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="380000001e00f500"], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x299, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 275.950685] FAT-fs (loop4): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. 03:25:38 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) 03:25:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x40, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt(r0, 0x0, 0x1, 0x0, &(0x7f0000000000)) 03:25:38 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r3, 0x0, 0x10000) setitimer(0x0, &(0x7f0000000140)={{}, {0x77359400}}, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:38 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007f", 0x7}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="380000001e"], 0x1}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x299, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:25:38 executing program 2: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ubi_ctrl\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r0 = getpid() syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xffffffffffffffff) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000804000)) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000040)={0x3, 0x7ff, 0x279, 0x80, 0x7, "9dce95ad37f04e46ee392e1674152178fe62e4", 0xae0f, 0x3}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{&(0x7f0000000d80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001a80)=""/34, 0x22}], 0x1}}], 0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4), 0x1c) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x9) 03:25:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b"], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='fd/4\x00') preadv(r0, &(0x7f00000017c0), 0x256, 0x0) 03:25:38 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 276.332872] attempt to access beyond end of device [ 276.348257] loop0: rw=2049, want=78, limit=64 [ 276.358516] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:25:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fd7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000140)=0x7006) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 276.426338] capability: warning: `syz-executor.2' uses 32-bit capabilities (legacy support in use) 03:25:39 executing program 2: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ubi_ctrl\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r0 = getpid() syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xffffffffffffffff) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000804000)) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000040)={0x3, 0x7ff, 0x279, 0x80, 0x7, "9dce95ad37f04e46ee392e1674152178fe62e4", 0xae0f, 0x3}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{&(0x7f0000000d80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001a80)=""/34, 0x22}], 0x1}}], 0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4), 0x1c) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x9) 03:25:39 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x8001, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000='version=9p2000'}], [{@audit='audit'}, {@smackfsroot={'smackfsroot'}}, {@audit='audit'}]}}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='fd/4\x00') preadv(r0, &(0x7f00000017c0), 0x256, 0x0) 03:25:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x635aad9c5acf950e) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000340)) getsockname$llc(r0, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x10) sendfile(r1, r2, 0x0, 0x10000) openat$ion(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ion\x00', 0x200101, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) getgroups(0x4, &(0x7f0000000300)=[0xee00, 0xffffffffffffffff, 0xee01, 0x0]) chown(&(0x7f0000000240)='./file0\x00', r3, r4) 03:25:39 executing program 5: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ubi_ctrl\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r0 = getpid() syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xffffffffffffffff) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000804000)) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000040)={0x3, 0x7ff, 0x279, 0x80, 0x7, "9dce95ad37f04e46ee392e1674152178fe62e4", 0xae0f, 0x3}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{&(0x7f0000000d80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001a80)=""/34, 0x22}], 0x1}}], 0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4), 0x1c) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x9) 03:25:39 executing program 5: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ubi_ctrl\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r0 = getpid() syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xffffffffffffffff) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000804000)) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000040)={0x3, 0x7ff, 0x279, 0x80, 0x7, "9dce95ad37f04e46ee392e1674152178fe62e4", 0xae0f, 0x3}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{&(0x7f0000000d80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001a80)=""/34, 0x22}], 0x1}}], 0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4), 0x1c) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x9) 03:25:39 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x5, &(0x7f00000001c0)=@raw=[@jmp={0x5, 0x1000, 0x0, 0xb, 0xa, 0x6, 0x1}, @call={0x85, 0x0, 0x0, 0x50}, @exit, @exit, @jmp={0x5, 0x7, 0x1, 0x8, 0x2, 0x4, 0x4}], &(0x7f0000000200)='syzkaller\x00', 0xbfac, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x8, 0x0, 0x2}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={r1, r2, 0xf}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r3, 0x95, 0x8}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000100)) [ 276.848010] kauditd_printk_skb: 45 callbacks suppressed [ 276.848018] audit: type=1800 audit(1566098739.053:936): pid=13731 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="loop4" ino=331 res=0 03:25:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007f", 0x7}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="380000001e"], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x299, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 276.985331] audit: type=1804 audit(1566098739.093:937): pid=13731 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir624538342/syzkaller.zlDuLR/255/file0/file0" dev="loop4" ino=331 res=1 [ 277.085924] audit: type=1800 audit(1566098739.143:938): pid=13742 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=332 res=0 [ 277.109359] audit: type=1804 audit(1566098739.143:939): pid=13742 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/240/file0/file0" dev="loop3" ino=332 res=1 03:25:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="7400000024000b07e4f18e29b05600000000024c", @ANYRES32=r1, @ANYBLOB="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"], 0x74}}, 0x0) 03:25:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) getresgid(&(0x7f0000000280), &(0x7f0000000300), &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x3}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={r3, @in6={{0xa, 0x4e24, 0x7, @local, 0x5}}, [0x5, 0x7, 0x0, 0x1, 0x4, 0x2, 0x5, 0x6, 0xfffffffffffffff9, 0x1f, 0x0, 0x20, 0x8001, 0x639, 0x2]}, &(0x7f0000000240)=0x100) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:39 executing program 1: r0 = socket(0x100200000011, 0x2, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0), 0x4) 03:25:39 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) utimensat(r0, 0x0, 0x0, 0x0) 03:25:39 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="e63c27f0ce437a8f3a3b5aa8fc70760acd298bce488f09a408e4cb8f286d5fa2317cda10a47b"], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) [ 277.323218] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. [ 277.338485] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. [ 277.384492] audit: type=1800 audit(1566098739.593:940): pid=13768 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=333 res=0 [ 277.436373] audit: type=1804 audit(1566098739.613:941): pid=13768 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/241/file0/file0" dev="loop3" ino=333 res=1 03:25:39 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1bd) sendfile(r2, r3, 0x0, 0x10000) bind$unix(r1, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) 03:25:39 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in6, @in6=@dev}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, &(0x7f00000000c0)=0xc8) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ftruncate(r1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f0000001840)=ANY=[@ANYBLOB="00fbbe024b0a30ff03235629a1ab013f62254092e7132fbaed03a3b2a5b11516961210cfaadc415852a49c59570e0de44a5ed9434abfc69ca7acc7dc062e2136289dcae0afdbf247d1c0babc9128e4f42dc092227e21b8c76b6aa7547983f8311396aa999797f64cd23ff079200b570aa5db03291cecc324774eb04851d7610856f156fb12bcbc52e1305479d7fd901e8b61ed188660b2667986078c8135d6f0b43ae819f629"], 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, 0x0, 0x0) getgid() fchown(r1, 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) execveat(r1, 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000001600)=[0x0], 0x100) sendto$inet(r1, &(0x7f0000000040)="a8b2ccefa06dfb17afbc2be2fb63bc60dc6f81d7d59bf3b0da15705d8c5bb6e0ee800c87a0985920468ba98a0411a6c6969ebeef755b8f7262e40736649b8b1f66f4a0612df1b350e8728e2ed6422471ddd763f75f734bbb0537cae00e1b7f078b4f4785d8d942885abfab71b51e234bce12e378be", 0x75, 0x40051, 0x0, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) inotify_init1(0x80000) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x87ff7) 03:25:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="7400000024000b07e4f18e29b05600000000024c", @ANYRES32=r1, @ANYBLOB="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"], 0x74}}, 0x0) 03:25:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) getgroups(0x2, &(0x7f0000000080)=[0xee01, 0xee00]) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00a\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 277.667638] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 03:25:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) dup(0xffffffffffffffff) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1}, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) timer_settime(0x0, 0x2, 0x0, 0x0) [ 277.726329] audit: type=1800 audit(1566098739.933:942): pid=13802 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=17174 res=0 03:25:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x2, 0x26) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x401, 0x4000) ioctl$sock_bt_cmtp_CMTPCONNDEL(r3, 0x400443c9, &(0x7f00000001c0)={{0x3, 0x3, 0x7, 0x9, 0x1000, 0xfffffffffffffc00}, 0x800}) r4 = semget$private(0x0, 0x3, 0x2) semctl$IPC_RMID(r4, 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) write$P9_RREAD(r1, &(0x7f0000000900)={0xb5, 0x75, 0x2, {0xaa, "17b4947c979963a688524f9c3ab9ad10172b783d428b84a9339746d4fbe65744743fcf561ed8712f6365ba9398eefa2a914e4289eecb347db90fc6ec8d235e8f62fd393a4e94327e36898ecef86512993ba2df489e59e6115d82af8d575b1af96eae2ab1d868e4c6fc1fcaba8af771638dd5c9b2b25caf8dbf72b7f6731a0b93c511fcbd9f87ba372bbe024ffa866b561d264faa2b7cec791e0c7e3eb0a36fc3853b19dc0dcb8162dead"}}, 0xb5) sendfile(r2, r0, 0x0, 0x10000) write$sndseq(r0, &(0x7f00000007c0)=[{0x6, 0x58, 0x99a, 0x9, @time, {0x32, 0x1ff}, {0xfffffffffffffff7, 0xffffffff}, @raw32={[0x7, 0xb27, 0x5]}}, {0x401, 0x9, 0x3, 0x9, @tick=0x3, {0x100000001, 0x1}, {0x5, 0x1}, @addr={0x6, 0x2d}}, {0x9, 0x59, 0xf1e, 0x9, @time, {0x2, 0x540b}, {0x80, 0x8c2}, @quote={{0x3a3a, 0x6}, 0x5, &(0x7f0000000280)={0x8c6, 0x0, 0xffffffff, 0x8df8, @tick=0x2, {0x7, 0xdf}, {0x2, 0x3}, @raw8={"05ee21a369a99a69075b96db"}}}}, {0x1f, 0x9, 0x9, 0x7f, @tick=0x3, {0x4, 0x2}, {0x0, 0x3}, @ext={0x9e, &(0x7f0000000480)="0ced2754851c589d730655eeac4d7e589834709e1c8ac4fc606c9cf7c7305cc5a3569ef4197a1d2ea07cf6d2bbcdd7676413e0266937cdb1f180566f381eff253818925c763c511f9373e2dfe5141e3bac253de21fb0541870bf0794dea28d7a0e3e71e922b546ad6218440a9464f756f63eb75dcf2d771f135259b7a344d10d535f766e6fa0c09fc26734e8be7ce5051fd109efc252d7236846971c22e8"}}, {0x9, 0x1c8866f2, 0x7, 0x6, @time={0x0, 0x989680}, {0x7fff, 0xff000000000}, {0x1, 0x101}, @note={0xefc2, 0x5, 0x20, 0x7, 0x9}}, {0x2, 0x4, 0xf99, 0x341c, @tick=0xffffffff80000000, {0x800, 0x7ff}, {0x4, 0x1}, @queue={0x8000000000000000, {0x7}}}], 0x120) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) readlinkat(r3, &(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)=""/133, 0x85) 03:25:40 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x0, 0x7f, 0x722, 0x2, 0xf9f1}) fchdir(r0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x100, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x6) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) [ 277.887851] audit: type=1804 audit(1566098739.943:943): pid=13802 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir381350857/syzkaller.rkVJdP/242/file0/file0" dev="sda1" ino=17174 res=1 03:25:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x340) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) semget(0x3, 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x0) getpgrp(0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) inotify_init1(0x0) syz_genetlink_get_family_id$nbd(0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=@dstopts={0x0, 0x1, [], [@calipso={0x7, 0x8, {0x9d0}}]}, 0x18) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000080), 0xfffffffffffffd57, 0x57, 0x0, 0x0) 03:25:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$vfat(&(0x7f0000001a80)='vfat\x00', &(0x7f0000001ac0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001d40)={[{@utf8no='utf8=0'}, {@rodir='rodir'}]}) [ 278.100784] audit: type=1800 audit(1566098740.063:944): pid=13804 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="loop4" ino=334 res=0 [ 278.125199] audit: type=1800 audit(1566098740.223:945): pid=13820 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=335 res=0 03:25:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x2010, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x1a}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x10000}}, {@mode={'mode', 0x3d, 0x3ff}}, {@mode={'mode', 0x3d, 0x4e40}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x3ff}}], [{@pcr={'pcr', 0x3d, 0x33}}, {@subj_type={'subj_type', 0x3d, 'vfat\x00'}}]}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:40 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xc51, 0xaaaaaaaaaaaab8a, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3cadfa906d6b66732e66617400e903010002009665", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) write$P9_RXATTRWALK(r2, &(0x7f0000000140)={0xf, 0x1f, 0x2}, 0xf) 03:25:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000580)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4, 0xa}]}]}, 0x28}}, 0x0) [ 278.274727] FAT-fs (loop1): bogus number of reserved sectors [ 278.281638] FAT-fs (loop1): Can't find a valid FAT filesystem 03:25:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) [ 278.373293] FAT-fs (loop1): bogus number of reserved sectors [ 278.397467] FAT-fs (loop1): Can't find a valid FAT filesystem 03:25:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x39, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:25:40 executing program 4: ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1bd) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0xfffffffffffffe79) 03:25:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1a2) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) sendfile(r3, r1, &(0x7f0000000140)=0x2c, 0x4) 03:25:40 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 03:25:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000580)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4, 0x2}]}]}, 0x28}}, 0x0) [ 278.943387] attempt to access beyond end of device [ 278.954253] loop0: rw=2049, want=78, limit=64 [ 278.960416] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:25:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000180), 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) r3 = fcntl$getown(r2, 0x9) connect$unix(r1, &(0x7f0000000400)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000300)={0x0, 0xf1, "0590d62efba646f006a8828993d5fc6dbcc9de6b5cef48e3606e01a701ad2b70b4be5c06ce14515646b6545bfd7e63a5c22f8ba201d82c0c64db186533916e140dc88e2b6a7d70885eeafdd86593a81927ee69f47a7d5efa5f0a5e921098f555b9a7883f9bf2252f0ecac36eed2b920836e02c2c27ebac5c48bb3721cd9c4ef24a47cda04fe59ddb3d0be147a14295d06eef21bcecdbff60361892b41f49f697abe47d583b788b51146f5a452fc4c7328e3978db94922d035d4064d2acf9bac02bcf8d081032119c7d9dfc396fe72185a4d56469300042a2106ae0c05dc9e228ddf96659e33b0f3849bb20104c694270ce"}, &(0x7f0000000100)=0xf9) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x8, 0x207, 0x5, 0x3, r4}, &(0x7f0000000240)=0x10) fcntl$setown(r1, 0x8, r3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000140)=0xfffffe9b) 03:25:43 executing program 4: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x6400, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x1, 0xc0200) ioctl$TIOCCBRK(r0, 0x5428) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x1bd) sendfile(r2, r3, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000340)={r4, 0x88}, &(0x7f00000003c0)=0x8) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000240)={0x5, 0x10, 0xfa00, {&(0x7f00000007c0), r5, 0x1}}, 0x18) 03:25:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/63, 0x3f}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f0000000780)=[{&(0x7f0000000b00)=""/4096, 0x1000}, {0x0}], 0x2) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0x282}, {0x0, 0x87}], 0x1000000000000009}, 0x0) shutdown(r5, 0x0) shutdown(r3, 0x0) 03:25:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) 03:25:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000180)=""/12, 0xc}, {0x0}], 0x2}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005b9) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)=""/73, 0x49}], 0x1}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005ae) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000d00)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) shutdown(r4, 0x0) shutdown(r1, 0x0) 03:25:43 executing program 5: dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/112, 0x70}, {0x0}], 0x2}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x8}, &(0x7f0000000100), 0x8) shutdown(r1, 0x0) [ 281.086041] FAT-fs (loop3): bogus number of reserved sectors [ 281.098821] FAT-fs (loop3): Can't find a valid FAT filesystem 03:25:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x200980, 0x0) write(r1, &(0x7f0000000600)="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", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) sendto$netrom(r0, &(0x7f0000000240)="c5536e445825f8565a388798d6aaedbfcdf680de91f76e2121cb5461604e5c60ef4dd24d24429e8a124d978545884cf3f85eea7292783b5b1b118c1f48b1e4c85daad6ce89e086a070d9e8bc467939beadd4b5913c33f6cfde259c806ed67b90ac48273e27d24abba062b5d28c64d4d38296219e", 0x74, 0x20008000, &(0x7f0000000300)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) r3 = creat(&(0x7f0000000140)='./file0/file0\x00', 0x6) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000001c0)={0x0}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x2, 0x0) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f00000004c0)={r4, 0x5, &(0x7f00000003c0)=[0x53af, 0x1, 0x9, 0x9, 0x7], &(0x7f0000000400)=[0x4], 0x24, 0x6, 0x401, &(0x7f0000000440)=[0x5, 0x5, 0x1000, 0x1, 0x8, 0x81], &(0x7f0000000480)=[0x6, 0x8, 0x8, 0x80000000]}) 03:25:43 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x204000, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000003c0)) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000002c0)='./file1\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0xfffffffb, 0x3f}], 0x0, 0x0) getpeername$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000440)=0x1c) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000300)={'bridge_slave_0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="26ca98aab04c05060001003e0000000002000000400000008bc100000000000000000000bfe8df87895eee1d96b4568ab2d24eefed792fbca1b5fa009fd900000000af3d69a87d001756a0018392c0f1eb9a2fe634426be525abf703b9c9630c4203a55a1cda35a2adf0e36bcd7edccc045000c38a94590b15fe0afc445751c2c7081896747063cf48d03a4ef61e9b232ec58c32c40c9ff0d1d67aea49abe38944b295dbde8fea00000000"]}) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8ae", 0x1bd) sendfile(r2, r3, 0x0, 0x10000) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000240)={{0x5c, @multicast1, 0x4e20, 0x4, 'rr\x00', 0x20, 0x0, 0x53}, {@multicast1, 0x4e24, 0x7, 0xf189, 0x10000, 0x5}}, 0x44) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000100)=0xfffffffffffffef0) 03:25:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x63, &(0x7f0000000040)="10b6b82b820ac7beda2567a61f27", &(0x7f0000000080)=""/99}, 0x28) 03:25:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000180)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f5", 0x1a2) sendfile(r1, r2, 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080), &(0x7f0000000100)=0x8) 03:25:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) stat(0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000080)="660f3803fc66b9800000c00f326635004000000f300f082e65260f01cb36d9fa0f1183d62dbaf80c66b8aebbd48e66efbafc0cb868f3ef0f0666b81ad900000f23c00f21f86635000008000f23f8660f62ed", 0x52}], 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 281.495242] ------------[ cut here ]------------ [ 281.500053] kernel BUG at mm/slab.c:4427! [ 281.514946] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 281.520355] Modules linked in: [ 281.523555] CPU: 0 PID: 13957 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 281.530650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.540013] task: ffff8880341d65c0 task.stack: ffff888088688000 [ 281.546189] RIP: 0010:__check_heap_object+0x58/0x5a [ 281.551199] RSP: 0018:ffff88808868fbc0 EFLAGS: 00010293 [ 281.556555] RAX: 00000000000f0f0f RBX: 0000000000000711 RCX: 000000000000000c [ 281.563822] RDX: 00000000e1e1e1df RSI: 0000000000000711 RDI: ffff88808c08653d [ 281.564057] attempt to access beyond end of device [ 281.571081] RBP: ffff88808868fc00 R08: ffff8880aa800dc0 R09: ffff88808c086540 [ 281.571085] R10: ffff88821fff8010 R11: 0000000000000001 R12: ffff88808c08653d [ 281.571089] R13: ffffea0002302180 R14: 0000000000000001 R15: ffffea0002302180 [ 281.571095] FS: 00007fa7462dc700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 281.571099] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 281.571103] CR2: 0000000000c8d978 CR3: 000000008dd2c000 CR4: 00000000001406f0 [ 281.571111] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 281.571116] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 281.571119] Call Trace: [ 281.571136] ? __check_object_size+0x14c/0x2ab [ 281.571150] bpf_test_finish.isra.0+0x9a/0x150 [ 281.588523] loop0: rw=2049, want=78, limit=64 [ 281.590592] ? bpf_test_run+0x330/0x330 [ 281.590604] bpf_prog_test_run_skb+0x5af/0x9a0 [ 281.590614] ? bpf_test_init.isra.0+0xe0/0xe0 [ 281.590622] ? fput+0xd4/0x150 [ 281.590631] ? __bpf_prog_get+0x153/0x1a0 [ 281.590645] SyS_bpf+0x749/0x38f3 [ 281.598475] Buffer I/O error on dev loop0, logical block 77, lost async page write [ 281.606122] ? bpf_test_init.isra.0+0xe0/0xe0 [ 281.606129] ? bpf_prog_get+0x20/0x20 [ 281.606138] ? kasan_check_read+0x11/0x20 [ 281.606146] ? _copy_to_user+0x87/0xd0 [ 281.606156] ? put_timespec64+0xb4/0x100 [ 281.606163] ? nsecs_to_jiffies+0x30/0x30 [ 281.606175] ? bpf_prog_get+0x20/0x20 [ 281.606186] do_syscall_64+0x1e8/0x640 [ 281.606193] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.606207] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 281.606214] RIP: 0033:0x459829 [ 281.606218] RSP: 002b:00007fa7462dbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 281.606227] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 281.606231] RDX: 0000000000000028 RSI: 0000000020000100 RDI: 000000000000000a [ 281.606236] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 281.606240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7462dc6d4 [ 281.606245] R13: 00000000004bfb92 R14: 00000000004d1818 R15: 00000000ffffffff [ 281.606254] Code: e8 41 39 40 24 76 24 41 0f af 40 14 4c 01 c8 48 29 c7 49 63 40 74 48 39 f8 72 08 48 29 f8 48 39 f0 73 05 49 8b 40 58 c3 31 c0 c3 <0f> 0b 44 89 e9 48 c7 c7 30 d6 41 87 89 75 d4 4c 8d 45 cc 81 e1 [ 281.789831] RIP: __check_heap_object+0x58/0x5a RSP: ffff88808868fbc0 03:25:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYRESDEC=r1, @ANYPTR, @ANYRESOCT=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0xc0082) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x10001, 0x1, 0x4, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) fcntl$setsig(r3, 0xa, 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180), 0x4) [ 281.797817] kobject: 'loop3' (ffff8880a4a409a0): kobject_uevent_env [ 281.804460] ---[ end trace 4ab961b795bf28b0 ]--- [ 281.807412] kobject: 'loop3' (ffff8880a4a409a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 281.812106] Kernel panic - not syncing: Fatal exception [ 281.825259] Kernel Offset: disabled [ 281.828883] Rebooting in 86400 seconds..