0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000200)=0x8) fcntl$setstatus(r1, 0x4, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x5c, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:32:59 executing program 4: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x200000, 0x0) getresgid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)) 03:32:59 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1306.473998][ T27] audit: type=1800 audit(1586575979.444:509): pid=1815 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=699 res=0 03:32:59 executing program 5: r0 = socket(0x0, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x0) sendto$inet6(r0, &(0x7f0000000780)="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", 0x1000, 0x4000, &(0x7f00000000c0)={0xa, 0x4e23, 0x80000000, @dev={0xfe, 0x80, [], 0x29}, 0x1}, 0x1c) clone(0x2804a300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x5c, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:32:59 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x4000000000010, 0x1000000000080002, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x36000082}, 0xc, &(0x7f0000000140)={&(0x7f0000001780)=ANY=[@ANYBLOB="000000000000200000100d28bff033d542cb5ed9b262ff755d2b3add4e1732239c8f6869c36f4e3faa5899756e199a7bdfe7d5c1d34214691fc3085bd2c7808a19c4ec3087875525bb4f6c558fe14ebb30", @ANYRES16=r3, @ANYBLOB="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"/1655], 0x678}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000a00)={0x338, r3, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_IE={0x322, 0x2a, "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"}]}, 0x338}, 0x1, 0x0, 0x0, 0x1}, 0x80) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r3, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@NL80211_ATTR_STA_WME={0x14, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x7}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x6}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40090}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r4 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r4, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:32:59 executing program 4: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) accept4$rose(r3, &(0x7f0000000140)=@short={0xb, @dev, @netrom, 0x1, @default}, &(0x7f00000001c0)=0x1c, 0x80800) fchdir(r0) r5 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') fsetxattr$trusted_overlay_opaque(r5, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) 03:32:59 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8906, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1306.845808][ T2141] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1306.881095][ T2141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:33:00 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8907, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1307.007065][ T27] audit: type=1800 audit(1586575979.974:510): pid=2144 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=700 res=0 03:33:00 executing program 4: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x200000, 0x0) getresgid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)) 03:33:00 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x3) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000380)="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") unlink(&(0x7f0000000080)='./file0\x00') socket$inet6_dccp(0xa, 0x6, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x6, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000040)={r7, 0x80, 0x1f}) [ 1307.286783][ T27] audit: type=1800 audit(1586575980.254:511): pid=2258 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=701 res=0 [ 1307.434934][ T27] audit: type=1800 audit(1586575980.314:512): pid=2260 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=702 res=0 03:33:00 executing program 4: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000002, 0x7c561ef403dd643a, r1, 0x1d3c9000) [ 1307.517556][ T27] audit: type=1800 audit(1586575980.444:513): pid=2264 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=703 res=0 03:33:00 executing program 5: r0 = socket(0x0, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)={0x7, 0xf8, 0xe649, 0x400, 0x7, 0x200}) fcntl$setstatus(r1, 0x4, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x5c, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1307.804791][ T27] audit: type=1800 audit(1586575980.774:514): pid=2477 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=704 res=0 03:33:00 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="b4f0f1ad1ad6c204000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000200)=""/213) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f00000007c0)={0x0, 0xfb, 0x1015, 0x6, 0x20, "f237abbf28454db8e63a46423266ee54", "307eb4c0f0e29c9ce6f4681de3a4da80953b9709f98a13f0307806bca290a5399cb941d70a331a83fd32fd62dc43a11b83bed9202dff1af5e73c7571232949c0fc1eff896f85a14cce0bba0623f497ce2328803d6b0ea1aae24402415b77a9a67de9d78d05d34827366b742d51098040c33f2056f22670553c657cd88183cb9203150673fc8b967dd3050fa7a7e76af20158dbae91ea0ca2bed9056841151665fb53e8b30f611d20bbaa6d1168549583283615f14b9b95cb94525e070e7f3cbc3a66cc573586f8bff2ee92e9376ce2faa14203914eec4471f553d91878a8a4a5561d7c693a254e296c6681187891c1dcd53c61a111c7bf2371dcbf7966569a2eb38da789581cc8c209f3c316dbc2ea962f3c76decc2362eb9792937807f30c1c122291e6fa48367cb03b97c502f41512cadcd900209780375127194f6ad62078a88c91a82507ccfc9e01cebfd559dcc4b701ba0a69d034f47f53f17f9b2e5707ad39dbc586b592e20daa04424e818d1384804505026c3c9a7aa874a24cce8a28709b903f64c551a82ac14b34b13b3ff43765a6426cd6289b403a24acf02f1cdcea204caa3e247ae02ed77c5862d92c66ff0f62ee85c7d269be796838feaf92b6950cd08511bd951f3398a386f0b56a66ee50c3be8f9b383b52f893f6b1cfbb29427d1ad25a161d0c6c7ed4ed52caf5cec49e2b72fc523278d38066903f7699373c70b0f13d90946a8b001d1564f41d74eb47782c4c72d496e65c6c4aa1b7337bb8969d92d46767410b2d277666ee3bbf4f5df5f9815ade72533a9f843aafcc0f00e28bb63a12f62046283722465d0ecc38d1d2df600b41123fd068bd14796a0c426cc1abed056c1ae8e871d52375aeec424542d4509aa5c35a1466a6d2f3ba29ccc55850391cf03acd770a51e6eee90ee64abcbd3f7eba39e59f326e5dfbfb3b1237ee15c70e23f6a7fa4148a188fd3f056b5eb8b9dfcf5c253019d8cf0c80aa50d69d67c1ceee09d433a7ba427ef056f6b563c2ab8212d184af71250abc486d7bf5c4bf4a26190b41619f3ade1cc2bc821d2cacbd67b8dce672e71603682ff022ac513bd31972ee224192cee5d4fac26e5261fc8cd35c29bce9082b94a0b158dbb89eadb34432c7847946a3b784b2d4bdbc27ec7f18d85c94e4459f1e0a9491ddccc6301fd0834ad9d4531816fc8ca14b62849c7efa3567fc05a19e78e18bc15adf5b2bfb28ce4b0602e7437fff109a48b94a8ecf4ff103ad7c6078c82f92c00ed42b3d1d861756fff1da699be8068406a6c678e7b9534162e6c775270667929a78f2e1c50b7b593ab45f08c83abfb33dcd4258e6fb02a24a997adc76f890ab78e030e56e4cc2dc072a7267595d1f042b96dc9fd4fe6969b149d6f488cca660f186f5c788fd2b3d93cfe4236049b080d22137309673c25946650e9069faf8acdccec86ad03748e6b362ca49f02fcf2eff849ad702a68231678b7a907e788b8fce3ed873ba21f290c26070f9e1fe07a0a89e772e49eb8085bf1870f77372adf552d78e82029c2445db69d2986914d95830093ec282514857cb4065928faf33c811fc53c22d1364c068191b069296567709d20ca79dd0beb4a7724d89fbb37ac930e64b1ef63690fc31d4f2c66704efe21d04cdac97fbf96a909e76141967f70767915d018adeda9a6a99080ed236d39f636d5752ed061dba2aa37173823247011fff792f5d5216eb8abb6f9d5225e4d2f0bbb5807f14101df16ed0455b1386ebca83e616bcc43836e0bb9abce271da8daaae433445433610dcc63e421e5b84c2b7c137fe3fb96a6a5487adaf196739fd183a86814a9f946e16cc3b9a5670da1f059dec5ca6f1b057640f45bc0f6ece8145310183f5ccf3774033857ab5296c82956c5ec15562f7c1e75f524e13352e2f127f834ceabb780bb7c27fd5019805fb05824412dcf53f6a985e0e4b678971a11b73f9e096893d21aa7045b0a643ee3130a87fbfecd098432eed16040ead88388558d2cb37cf9325e1777311d1fb96ccafe335ec7c1b46d33fe4b68d10a5084369ec2ddcfbc045d79f0b3781ef5ef72d7fbf98537abb5123bc11e7f17393cd90ba698e487f4f56c367eb3338cde5e6f3a61bf8d307966a0f0fcbd86b2e61988d9291fbced00f069a1da830c2c3490475059c90083fc09c70c43cce067cdd0fc190f9191dfa425cb403ce6424a8a912b2de4820f5ce0c7c9b98893494f7757405b6e23cc05a105a61a03a03cd88b5cfc0073af88980200987462456e5c365a93fa4cd9df43518bb3d27f5f0bc480ce20bfedbe9548433a22c6d820c6f05d0c704809f5a46b95f27a7f512ee8dc3f21840e0f3e6b3028819ff811a6926aeade397cfa7d6c9aa6c55575b9ee58977bca2db1014dbd5685c146e8eb30fdd25ab54c6d5eea6b73ec4721213a577463c446e1a40bdae5aef6080aef1bb11c91845d600008b663624396ff996099be2a5ed5cfd760688847e0f4c88975ab29b3cbcc804f874c890cf0001fbae86e0f1d22668001eef9286acaaa9703426b602f896e867e35def7d0f5d7ac61436b05039c3de2ec109287770102de76f726bb74a8d7c026d93c89f09de2a6d0a69cf90a87e613f889df8f88493463b1d3bf6e53f6342796e4a6f3ecdb631e64d8566744148286100dbccdcae9f820fc5d5a50924820afa46855d33f318a2b9f9a91c62dfdff0cda26cfc013769b68bb63bcefdfb92735d72e177db80f6ff593206951f501b3079042d692c2ba22e3cb6aeedf8bfa5ebb55a9461c691e167cc310e8910762aa65949190082ad7d2f0b7021f1decfaee58a8d3a9d45e42d812a1e366bb80d077706a8804b5307bc7c9ee7ac0ea98f2e26e25649d1bf5312352dff0b6c8396d28877e82d6045ac16d341df6413f197db69d2ec4ccc8e46f281497c6ba8a661efc468277cb16a38618137d8fb2823e4065398984f51a7c7c7d395d2a3aa389d3081231e6666cf3673ed3939e2d4fdf2410bf3d0846cc9088b2e64e34dfdb92f43d84816fe53aeff6a27f6231c8be251500ab85a1af9c61e0a5386de2af94db33635e843667a2b406fb43b432e3d13d754e4a6afdf2d561191cb57c6b90957b3cb527a986b6bf8fc8a7d467e89ec5884fa5ad446a1229e45e6df5532a76b3605a2b1ea9043e8e5f9340dd54e3e7e8ee13d2f26f9a360bae1d425251e5fafb4d0e7efc57e73eea0cefe2c0245885d1a66f19e47ae7f49f6bf5c14d83dcc368565310936f7311f391c6780c4e10ee9912eeb995e658ee59f091e28e7e756aa4f3506f5aa909ba7bceec6a073048d35c0ec37f0c5f48eb2d5a3a85a174174ddcd104004ca9e20d3d0b7134f6bf0843fe7f565347997e6f735d0386f9bbf1ad4a7235b4129e3620a1873b2fb628a9950f55018abbba5067c620b7a313b2cd36cc5a62f7fcbc2839269d74cf1c3f949e243db2f39a27c0b0683096addbea412bfe69138936d43a8d7b1e957cde892bc9f48baf645c1c507a938af2d71cbcbe4fd2da1ad5b5ab0137ed03dc7f6a52ad7b08fb90f9df76fed77dcfd9ced077e6aa05e6ed10bd293f5a497249860db61ed5daa47444561a7f64f6f96cd585f09daa7ad35966aa27517ac7498ed99ca862ac5f62b51e663ca58f7b11b8334b1d26b1f5fbcd544e2786611921c392a9909d8357afe1b9082e52ee08ce96ff1bfa96f4642c7633d98453fe1b992204641c44f1d6cfc37235a1470e026e2ed414e765c07d6ba7edd1ca6f82ba34ba4794e00d20b6c828d2e2d76aff1500bf5fc77ce323fb1e41580d3375770b4c38db1093755f650ccfac8171a142a5931aae2c367a3827f745c525709e3db3cf7f7a417a17810b1279c2c64f1b071e03d18bbb0368f76ce8c933e5cc019b6a8a3d62394e757c74f7eab66b575a9d99ddb914dd4d0242563c5eef8e05eea18b84bb2d73035bc7e78b25378bab1c04bb529eff026956a44107699bfdecc12ee4bf91414d7e8f5332ca78f6ab14497b6f15b7842cb72f160ca98dc3c77a7b33df1e5285882f051fa009decfc3e86d821f367425f48f8b88d0562eee10ff5d3ceae8b157236470789ac3366aaeb188f35a016a6f8830dfad4839e056d1a8c34aafc8e63b1235d5fee36c153dc43ab8b9735c2748b61a5ab2241727738bec91d6bdf17ab68000503f22be9d4da7461ea2d145c1ea4f27d14230791d0c56737eee4e26c8016d247a68b78e4a9d5ea3e0119ab74669263317620330d68c60fc7fbc8e593387a464a8684c7e6384ee4623c7cc123d4125067541d6e7ffd7728380713b0eacc55461eb2670093ff9174ec646d222329717b43f5a310b146c0bc638972350df6d782e335b2ff06bb5a85e5764b9d796bdfe0bce622d4d902ea1bc4c268f4b9511d6da322811ad936d4ab651f8f3b8dd330d7ed90af68d2a8be90332b6f458bc81ec0365663d44aa75088054542657ce3747b10efb4be439e081f03c403cd8eb0717faed2f1ffd58569387383e5c57fc215848e7dbfab0c063655aabc1eb46fed0d9439da25215d03fa1deca9aa544f086b12704c46ba8f266d20b342a4bf34a35f69419b811f3eb52bdad71715c7cfaecf8d2f4f7c45f6c2c67be36aa46550eeb593353ce2a3c13b963cbfb84cd4db8fb04878893869dc670b863bd2f0404fd4de49a55ea4e9694714923c6361445bcc90bceaa131dc5ce6579a57c8a16419c74012f454a6caaddeaab16cd569af4dc9a60d125a043f9245171b9e9b1fef749cffc6378435a0803fb85fc49e6043850725ed91c8864708d21732967ed7dbed640466946b0961bb4a6370507fe199357befb32a7a67d96e09861d9bf3903c7991ba5c71431c5c4eae504db7b9b55e45d17ce3710f9d8adb11fc10ebb175cbeed84505d5897d5c980944bc2dcbaf86f6cf35064cc7e0880f3e12f0f1bb58356ac23fb219faf87a20391285afe9e2bb652c276d64161f2024acd0b70e8214a32a81d12ded1d863d98d30571077a9f67d9db4f5a3f577e541bf9f95f5a2b9763804490b64c6bb5223eb6db6c7168e64d5ef4c75c5ec86536ba2eae4b802146cdc5729fd8637619168532d1959c707316cbac2a71881487b43373ee71ad35bbfde8c80ff0949621eb78e12979571b5d42c387ed671a54f2b49df768f067d74f4a0fda4e439ff9c91a469946039703a0fb045ee0485b377cbba87c06c7f9c3b5ee8f0dfed2e9dd796d95c98e6b93e7910aa7597177429418f55f38c914101fad6fb0633e1f06f22977c0b0bd61307bec039e1eb0329685f14f05579978e89d113b4e148f6b5caf9b2b305fc718353420d418de3d50a2ceb93c1829591549b2b6716bd6acd5405515f5a58ee4433bf44794663f0660aaacc99344cf28b02e252f0f54e76f89356578db581517e6080480e76ceb56010292254548abd78fae16281bf0be5d09f8e0e8a4ebe508866395e8167c94ffcf27dfbb0fd84baeb4ff41d5c304804060ae6bb849efc9b0ad29f909968d9810887acd00fd528367654c475cac17a2d193c6bf3e5cfcb289a454c81cab17a09738e5d1d525009d349ecb3968b9c24571d49c02012999532d739c637203b8361b102ded1d0bb3ace42d07b3d606a7a720a8fb7834983518988db270623376d651d0e78c393149d7e353df0756da68a384449e9fe7ad9968c7eaf7c93647b73dc8bae6c3880a34b67c630cc6709a65d33baf94be2b07ea687610cfff11fc42e7ba1de5dddff106a29fd0f4b0bf366cab44dce92708619c888c557bdeac25de8aedbc5016ed88196b0509"}, 0x1015, 0x1) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41d9bfd5d3d1a9c79cb41027f063b6c3f84829c3fcc74e5eda26d675fcfb4fec948f340d4200"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r4 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r4, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:00 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) read$eventfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="01000000e71b78b4b8a77a1e82305b9ac2df6572e374d8cd7fe9a49099b2e552f3030020789b2a8ca01906dc8346890a", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f00000000c0)={r7}, 0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000380)={r7, 0x1000, "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"}, &(0x7f00000000c0)=0x1008) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x391c00, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:33:00 executing program 5: r0 = socket(0x0, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x5c, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:00 executing program 4: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000002, 0x7c561ef403dd643a, r1, 0x1d3c9000) [ 1308.045395][ T27] audit: type=1800 audit(1586575981.014:515): pid=2595 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=705 res=0 03:33:01 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x890b, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1308.192519][ T27] audit: type=1800 audit(1586575981.094:516): pid=2595 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=706 res=0 03:33:01 executing program 5 (fault-call:7 fault-nth:0): syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:01 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:01 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') [ 1308.405800][ T27] audit: type=1800 audit(1586575981.294:517): pid=2904 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=707 res=0 03:33:01 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1308.736183][ T3148] FAULT_INJECTION: forcing a failure. [ 1308.736183][ T3148] name failslab, interval 1, probability 0, space 0, times 0 [ 1308.769164][ T27] audit: type=1800 audit(1586575981.734:518): pid=3145 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=708 res=0 [ 1308.789876][ T3148] CPU: 1 PID: 3148 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1308.789917][ T3148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1308.808823][ T3148] Call Trace: [ 1308.812275][ T3148] dump_stack+0x11d/0x187 [ 1308.816638][ T3148] should_fail.cold+0x5/0xf [ 1308.821281][ T3148] __should_failslab+0x82/0xb0 [ 1308.826041][ T3148] should_failslab+0x5/0xf [ 1308.830603][ T3148] kmem_cache_alloc_node+0x35/0x680 [ 1308.835911][ T3148] __alloc_skb+0x8d/0x360 [ 1308.842135][ T3148] netlink_sendmsg+0x662/0x8a0 [ 1308.847189][ T3148] ? netlink_unicast+0x4c0/0x4c0 [ 1308.852311][ T3148] sock_sendmsg+0x98/0xc0 [ 1308.856744][ T3148] ____sys_sendmsg+0x493/0x4c0 [ 1308.861647][ T3148] ___sys_sendmsg+0xb5/0x100 [ 1308.866231][ T3148] ? __rcu_read_unlock+0x66/0x2f0 [ 1308.871453][ T3148] ? __fget_files+0xa2/0x1c0 [ 1308.876615][ T3148] ? __fget_light+0xc0/0x1a0 [ 1308.881408][ T3148] ? __fdget+0x29/0x30 [ 1308.885627][ T3148] ? sockfd_lookup_light+0xa5/0x100 [ 1308.890980][ T3148] __sys_sendmsg+0x9b/0x150 [ 1308.895723][ T3148] __x64_sys_sendmsg+0x4c/0x60 [ 1308.900627][ T3148] do_syscall_64+0xc7/0x390 [ 1308.905314][ T3148] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1308.911246][ T3148] RIP: 0033:0x45c889 [ 1308.915224][ T3148] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1308.934930][ T3148] RSP: 002b:00007f380d8cbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1308.943664][ T3148] RAX: ffffffffffffffda RBX: 00007f380d8cc6d4 RCX: 000000000045c889 [ 1308.952462][ T3148] RDX: 0000000000000000 RSI: 000000002000b000 RDI: 0000000000000003 [ 1308.960789][ T3148] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1308.968887][ T3148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1308.976849][ T3148] R13: 00000000000009fe R14: 00000000004ccba4 R15: 0000000000000000 03:33:02 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x309000, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:02 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1309.034818][ T27] audit: type=1800 audit(1586575982.004:519): pid=3145 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=709 res=0 03:33:02 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="eb1229884138c192533606122316c45757b4ebbfed6b614787476958a4d4097812040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28, &(0x7f0000000300)}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r3}, 0x10) unlink(&(0x7f0000000080)='./file0\x00') sigaltstack(&(0x7f0000feb000/0x14000)=nil, &(0x7f0000000140)) 03:33:02 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1309.353537][ T27] audit: type=1800 audit(1586575982.324:520): pid=3282 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=710 res=0 03:33:02 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x890c, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:02 executing program 4 (fault-call:1 fault-nth:1): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:02 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r0, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:02 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xf, 0x62, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41d9bfd5d3d1a9c79cb41027f063b6c3f84829c3fcc74e5eda26d675fcfb4fec948f340d4200"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) exit(0x4000005000004) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:02 executing program 2: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x810, r1, 0x48c7e000) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000000c0)) unlink(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000140)='./file0\x00', 0x200800, 0x48) [ 1309.807877][ T3550] FAULT_INJECTION: forcing a failure. [ 1309.807877][ T3550] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.857091][ T3550] CPU: 1 PID: 3550 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1309.866681][ T3550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1309.878673][ T3550] Call Trace: [ 1309.882425][ T3550] dump_stack+0x11d/0x187 [ 1309.887210][ T3550] should_fail.cold+0x5/0xf [ 1309.892085][ T3550] __should_failslab+0x82/0xb0 [ 1309.898404][ T3550] should_failslab+0x5/0xf [ 1309.903101][ T3550] kmem_cache_alloc_node_trace+0x37/0x610 [ 1309.909788][ T3550] ? memcg_kmem_put_cache+0x77/0xc0 [ 1309.915019][ T3550] ? debug_smp_processor_id+0x3f/0x129 [ 1309.921345][ T3550] ? kmem_cache_alloc_node+0x1bb/0x680 [ 1309.926828][ T3550] __kmalloc_reserve.isra.0+0x43/0xd0 [ 1309.932457][ T3550] __alloc_skb+0xbe/0x360 [ 1309.938331][ T3550] netlink_sendmsg+0x662/0x8a0 [ 1309.940812][ T3558] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1309.943292][ T3550] ? netlink_unicast+0x4c0/0x4c0 [ 1309.943315][ T3550] sock_sendmsg+0x98/0xc0 [ 1309.943364][ T3550] ____sys_sendmsg+0x493/0x4c0 [ 1309.943396][ T3550] ___sys_sendmsg+0xb5/0x100 [ 1309.959061][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1309.960090][ T3550] ? __rcu_read_unlock+0x66/0x2f0 [ 1309.960122][ T3550] ? __fget_files+0xa2/0x1c0 [ 1309.991319][ T3550] ? __fget_light+0xc0/0x1a0 [ 1309.995904][ T3550] ? __fdget+0x29/0x30 [ 1310.000010][ T3550] ? sockfd_lookup_light+0xa5/0x100 [ 1310.005912][ T3550] __sys_sendmsg+0x9b/0x150 [ 1310.011040][ T3550] __x64_sys_sendmsg+0x4c/0x60 [ 1310.016010][ T3550] do_syscall_64+0xc7/0x390 [ 1310.020520][ T3550] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1310.026664][ T3550] RIP: 0033:0x45c889 [ 1310.030692][ T3550] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1310.050992][ T3550] RSP: 002b:00007f380d8cbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1310.061755][ T3550] RAX: ffffffffffffffda RBX: 00007f380d8cc6d4 RCX: 000000000045c889 [ 1310.071240][ T3550] RDX: 0000000000000000 RSI: 000000002000b000 RDI: 0000000000000003 [ 1310.079687][ T3550] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1310.088544][ T3550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1310.096573][ T3550] R13: 00000000000009fe R14: 00000000004ccba4 R15: 0000000000000001 03:33:03 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x5, 0x4) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:03 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000040)) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r4) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:33:03 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x890d, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:03 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$KVM_SET_GSI_ROUTING(r4, 0x4008ae6a, &(0x7f00000001c0)={0x2, 0x0, [{0x101, 0x3, 0x0, 0x0, @msi={0x8, 0xd215, 0x80, 0x7}}, {0x0, 0x2, 0x0, 0x0, @sint={0x5, 0x9}}]}) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:03 executing program 4 (fault-call:1 fault-nth:2): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1310.814672][ T3901] FAULT_INJECTION: forcing a failure. [ 1310.814672][ T3901] name failslab, interval 1, probability 0, space 0, times 0 [ 1310.827642][ T3901] CPU: 0 PID: 3901 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1310.836320][ T3901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1310.846463][ T3901] Call Trace: [ 1310.850873][ T3901] dump_stack+0x11d/0x187 [ 1310.855624][ T3901] should_fail.cold+0x5/0xf [ 1310.861042][ T3901] __should_failslab+0x82/0xb0 [ 1310.866005][ T3901] should_failslab+0x5/0xf [ 1310.870715][ T3901] kmem_cache_alloc+0x23/0x5e0 [ 1310.875497][ T3901] ? should_fail+0x7c/0x2fd [ 1310.880284][ T3901] skb_clone+0xf4/0x280 [ 1310.884466][ T3901] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1310.890377][ T3901] netlink_deliver_tap+0x45a/0x4d0 [ 1310.895539][ T3901] netlink_unicast+0x41f/0x4c0 [ 1310.900314][ T3901] netlink_sendmsg+0x4cf/0x8a0 [ 1310.905190][ T3901] ? netlink_unicast+0x4c0/0x4c0 [ 1310.910226][ T3901] sock_sendmsg+0x98/0xc0 [ 1310.914690][ T3901] ____sys_sendmsg+0x493/0x4c0 [ 1310.919529][ T3901] ___sys_sendmsg+0xb5/0x100 [ 1310.924221][ T3901] ? __rcu_read_unlock+0x66/0x2f0 [ 1310.929258][ T3901] ? __fget_files+0xa2/0x1c0 [ 1310.933900][ T3901] ? __fget_light+0xc0/0x1a0 [ 1310.938501][ T3901] ? __fdget+0x29/0x30 [ 1310.942590][ T3901] ? sockfd_lookup_light+0xa5/0x100 [ 1310.948164][ T3901] __sys_sendmsg+0x9b/0x150 [ 1310.952697][ T3901] __x64_sys_sendmsg+0x4c/0x60 [ 1310.957559][ T3901] do_syscall_64+0xc7/0x390 [ 1310.962079][ T3901] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1310.968156][ T3901] RIP: 0033:0x45c889 [ 1310.972115][ T3901] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1310.992074][ T3901] RSP: 002b:00007f380d8cbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1311.000499][ T3901] RAX: ffffffffffffffda RBX: 00007f380d8cc6d4 RCX: 000000000045c889 03:33:04 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000200)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/72, 0x48}, {&(0x7f0000001380)=""/204, 0xcc}, {&(0x7f00000000c0)=""/34, 0x22}, {&(0x7f0000001480)=""/224, 0xe0}], 0x4}, 0x18000) sendto$packet(0xffffffffffffffff, &(0x7f0000000380)="c6bde9e71ea41bd6f5ac6a82675926966a990f8d5bfb52ae53b58cda15af26f0867b5a842f87394b6a5b74adf045232e50e81863e910258fca8e4885292b8406d6ac6c293d22b369d57db51b87a2ae88f3304e8934984695120a8aff3d2f476e8a93e875247e749ce7703d418677b1c0cad2b7011d321ee567e79ea2fd3e2eba79c7d005313fa5da854de48fe68409df238e78b63b2982b0f976f8ca9d1ed8eb91d13db02ff7e54d4ebeaee9504d16c7e8aaa63711132487c95ddb069b9f28cced40b9026a424adfe71df9784371aeaaf36ae3d279c9a8f7c452c7a98aa18bffc7eb994d5003745be6adb5eff2dfb4f576f97aba3b725a402d9ae4a3625bf9da4667a095c5b1f407cf9ab545f2d5e31ada6174189ed07bff3f7a4244bb199cf3849a223df7c24aef23b31edaa6bcabc583bec2773d28315e152dec447610c6d6585d4ea413fc05d594a36e703acdc794dca83b2526bfb46811d95bd25b523a2096348540354a3486d77a8c0a5b26bc30047aaa616876582fb120909a4337f48bfda7531f87cc0cf7f4cde40612a9b21366974170c84f7ea4e53d0da9aa7eb296275b1732db13888c81c06bb39ff829dc7eae50b9386f8971195449e70cc81a971248761d1edf3b9994f7a4bc46105c69f712f2a48a9028203e8d3bed630fd106963adea9db265cd96d6d87d212070ec443422a27575d0e570e06e9c52d4098d27b8f99f81d41cb6b27ab92f570db4f3f973a0ddee8fe96927e65286c2306750435b1b3eced37bbde686cb0fc8a3e9f2415283d530ce87a8d3a194cfc4500cf04ae5fbc379d9196d8998713198ac580a83b96cd3cb5d65f6182a4e4448c2d328e52c5905aca4295aa157c5cc22b82e8a4b9a6c2e03b88f8873c6455a1b9811642ab5ffed9e9a1c1c38a25cd81e066664574160a3c2fad5bd6853c530e3196b088bfd2c17f927cb954219b58944b5806a6c675e54bcb21a99a960bc0a9e2e667b46f67237538ac0c70e25695cf5fbd88e46aca4a944f3dc5a281339aa1fa75cbd531c71823e4306bae6e221d21716ceff5940ef11ad35ed65550663725f0ebf3a09581f25a1e3daa5c15bdef3a134408817c22c6ab0b41c895c803b12d9599a83c7f503d772133dd7eb077dd6bded1b0686e18832db6962e80312f163a9e153e660fae758d568144613aef093edbf9f645fe2819f7a9f8d1c3727e2a757483a0c70fdc2b93eea9dd2efb37ead61970480cf0c7de2e2a4541d52457c117dcc7756d3fdce3baa286771c3b5a3efb5d65479a016ed63c021a00d7f1766a4491a63dbea2c2bb1d393582f079f3ad8ddcf92b8c31fbf8e73f47e5cb2d7d6db4e785789dda4cb61a95ffa8811523161bcf9e166c2e1ac98ceb90dcbd9073f1d9075449868bbdead1605b34b96f6639ac4bac88326d7238e17363d451eb7bcbc7a024031650ac40cd2e5bea5816bb19d61e1ac7724ee63b2bcaa8afc3b15fa5fb032ddc1ac9f33fe58b46db5d8d6dbff83ef1029f4f72f5c7084a531c0ceb65407bafd847a34dc15f5312709ceeb9012842acd981a83ad6cdea65d8536724b5377f74cc71d4982037387463f96f04749a51c3c237011cba1492853c5c9323a40edd8e747dbea3b4cb66e624aa42d4544b557bec8b957c2ff0a21d13b235885784fc2d69f5f9bda574cd98f29a5f0490f409114f795470ff70f3989604955e3839bb0e877d52c156c229d4f1fa47893f9836cf2a32439d2df2a28e87e5e56ac4cf9de5e1c2cb2df4b22ead5467e35ef4d13f6d99bd9d96fa197ebc31baf6c2756a42fb3548042ef2cb5d2cb7f6ec44101720a6caca8b35f70cefd7f68164d665fcbd85ce37d9725b73d7d618911a462e05b88c1146e513878e2350e85d90270fba6d0ac633676895daf774f8c13f290dd7ad6aa56c55946894bd2a68c10325dff213364c6f029b94f50b95c2ee11575ec87b88f548939b432c7801092cfd20320933f90042883e94dc486f03ecd4718f83df8ef7e39641d06a62956655d9580ff26094e2fc3a0b0a8671e77f4da13fc7327ef272681d13b44e6c9f5c6519897a0478a9d95e558004ed1ad1c6913c7f3452a9031b774530f080076baa165208a11b60ac3c690f2757cf781aaac23f24662234e47fe231a169f6cd2e8545de4da285787d2b3c8059b4334f00adabaea34f51636e886643fd16311343f7e57359f8f79d9943a51642508d0b97590ba47af2349bd4f1fc51a2fe4704b494a9050b1f355901139d04cfe4e8e9580958c4c9d35a67f53c34a6a049083dccc5e43d0bf1adfbb080f618966196f0a8827e7c1dfcfd0cdba89b553dc65e9dba58734eb65261f558a2be3bd280ce73545f9699bc1971fa369950b47e069d269b8c0fd839b20b33b8d59a3157a1247cd232540edb80529f3a158b3610d9f5eb4a3be671577647a64a6447013e4bedc2d098cb6a8d24ccc83ae1da7b10959672562e5ab5e18d11e01d81d91bf9fc57672b15eceba654f7974c37d2e63f17faed8bcce04a96a8634f9ed9799fd616378fc0c9e44a6e41ac97c7f77fad80caa7cbe5054209e6dc0b60ebebda2899bf4006043d3f6fb3f22fc6c7cb87434334f21b937c3e76694a901a7c97bc2945552cf4581b7708f9dd5fa2f3bfb034fee963a51b12001a393416569c3d4162996ba635f5c2b1284d221154c67a0c2c10a2516ee629e655e219b983da12810db1b19e35b64c73b97cbb0bed079e88d1c361a31f5cb1efbda977867bc16a00b84958fe111e5dcb39e5105f75d8252a2f99ec5e4ee493357aeece9488eca91826ca06e48aad394c3ecf1ff2cf9b93f7e2446ac3efccfd95ec9c9757c5c97c6a1910ecdd06764302cc45646da0d801171bec635eecce81ef44fa99b58b794871def0c589e26cd86e1f12c92655c207f78d542582d6ec25e26dc472b95670254d00b16de579927741c23e38860f7c63300a191ac6abb01a8f4810ce52db0331dbae9a13ac0dc656bc62dd8b7f749a5ec85e933c235b799ef9c5aa7f55ddce2f400ae832386452c7c0a36a8b9884df03813e78cb7ee92dda360b2044bfaa986b914e7c9daee9c7f2ce614817b48e74d764240bf8b552c960517ed9b2140d00a5a257b6ab4bfb28b475b99103de7cb8f511a0015296cad6039ad62a930c0ff6ce3ec09130dd06d063105277ebdb703087ff56ec29a49fe32187039131144a715acfca6213de184e629752050e918e5e1931e820ad137892861b3c7e5097257572326fbc10e0311f2290cbc54c38efa0047e82b7e5b1d41d534ac596596f71b9090835d841e8536fb78f6f91903bf4374ba15d9548e03ca7ec2d23505019a490557e2a067081f2c09c06369c07659f13d6181ac6950138d9a6a1530b40db1e4e14fd9e74cacce3245de8670757161cd44eddc0d490fd1d6994d1a78075ec8370b92c1bfdb8d183276d49e9fd4f0b87761faed4826fb94166066837abd83130253101aa7a38ec0d6e41684a5c395508cdb1d9a1401a51670e28cfafeea85a7bbaf957aa0ca8888b8d882be8f93ce7d28903fb4e63e29fc330b7b8f26c306eb683b295b1078a5e5aeb56da04be9c1f1ce9fa2b922c06323bca3e2040ca8c8a53f85fd17b401ebf31d65ebf014cddc66f4b9fa2cb5c1b5ec5c4549d7e995ad42599b82a49899c705f0e699119e488280b04b1eb4da09c30b45005a32c06e9560471a165b14a724e567faab87287bdf0f2a5a8706a8d655d4f73b0e100cf5293dfe785b408e050776d1048c6b31c32959d2545a152c3f7a1b80906cbaddac1ad8742214e8e2db9098f95ab570fe0068468e6a1c44536c463829eb7b55ab84f2b0fb851ce49e82f7c8098226845c32b4dcb8fed8f94e69d9366ac670713c9b11723380dbbc1d3787ea32ecfcc393a862d397f3b37d0768a92b566c3934b2db8e77f3e1b5177ec11cb66b5fe19000920bfe38de7d7a0a9bcdd28bb3cd5b4b6d3aa20c18c51e23e77025bf03ff7b144a80842490affd3cdd7e896357134ea9559ecbc3e896033fc39212f28d5a7146975ca05ad990e16732d3b5380956c224bf9d29a65d37c4e607eb47f16e758a93b9878b51ea28a855f5debe1dc9be736c31ee36565d7172d7b6e967c72047ba74d084133e366086cee922494c05a0d5c0c8ca34fa72e7a7a93ac4a106f98765c3e16b5e5d2e37fe4d70df6b17cc2cea760faab15be65cbcbb6b8b7241fa4ed52621eef3ee5d06c94dee9675626397673859e499be08d8c045eb380b7c395cf0e6be0cdec7215cd9051d196e838ff764cae270a9ef3ab573589470dba22b0ac919b383f5d9fedf0d4e7a653316d1e35c5d93b51e4148e9151d896ca4b6a248731ee0bdb77d29a2d91fd8fdf1184bfefe55a9e24c23ba1b40b7c5662751e605a2e277c2b76bf3ad7c4169bfd52e7e1c81345d82b4eb7424a16a1d28826a95b9a2bbf6b15bb949166a85593ba7ebd37272235c5ec7114f01dcba31e8fc23f9c9d3314898e2e0507a37448d9335ad110821501222edbec0db091085ef132fe5274f2e43597a700927b1b16c4609a1613c57d46951a27873895c9562564755c3535566550ec50bd2fd0593013082ad501a5bda4f5fdd6c49ad94de45657789fedec92a51b3c6fe081df50fb006b89be8e42aacf1868100dc1a4fa4a5b612c948f0f5653338ff13fb8f18df9eccaac71d80a65e1c648f8af6d36d8036426ec54d563f8f02607e0d1a42278ee6cfc76b3713751e2062f13848e5c010a7b320de050f82a6c87d8a3fe72712a960f0cc839b2ab87e60efc699111b2c4d6e102b35000e1d23404bcb8358ee2f3d27efa43637f1050ff698bd747e573a42057eeaabeb4e86bcb3d07357b14c3eba28cb4c4337487328d0046cdb7663b9fae6a095b307824ec8acc27db74fb2424bf43b272c86b74c0ecb7cffd7b7ce0dc9acb4377826ebc0016be4a39ca11bdf42642074011436cf87448b65128d55c4bc7c6907b2e50a8f2c6e629e03dcc06c8df09eb17d2ac49f91f496ae49e5bfc72fc4510db2234eb81c185fe3af48da57b08400cdeee62366f50ff484d560b83a746b011e9505f2a6d83d0052dc91c0215c26bbb4d25ca49e9973ac2e76e5ea8812c6f24bf0b837fa332b0f2a228521fadd3a1646b0d569da7517625cc4f55a7fa72a4c92f78e54347bf266c9c5681e5996a2a136fd186c5bb0d86e9d147c7dfbb899cc96567ebb0fe5cdae15d7175777133ff687369ae9a420aef0042d62f1f40410401d2248da2aeafb87705078f2a513aabbcf03cf88c6ac4b51ade1dbf12c6f6476a5ccd6297342b0173638ee1253570544a00aea991f1c6022f5e29e8dd6113b60446dcae7780810377bb58cb49a525fb21618bb165aa14f4c116eeed5d0e27d13bea6a479f2e2eb7f16a76197613375ce027eee8b23116dcac86728956fca16cb6691323b89bc03c50067c2765b3ba4edbe6ebf51ccf6280a6c9c7a269e76c19e35a3a125def04d4aaa3694daea38197f9e24e4e2d4ebb9ac1ff63cd4d690834cdf8fa1dadf1dae168658440e3a1e73d503a07834b240d071e1b098d5ae9fd91166745357fb6e11567bb756a40ce2886137cd69f3c93048cee65eccd7782ec660d49c461d806cae292feb5485ab64f4ecd3a85d01489bcab220917b95400323c5e0df01ecbc16f816e506d00b3e444f18bcddbddb3969db6d8bb490286458d5ffe09b597155c2fcd38aa72ecd47fedc77a37bb63e10481c7d02f21936bf80f2e5652dab09df0763cd0361213111c52d9430455df078be6feb46ce757f6", 0x1000, 0x4000000, &(0x7f00000015c0)={0x11, 0x1a, r5, 0x1, 0x40, 0x6, @dev={[], 0x25}}, 0x14) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$KVM_PPC_ALLOCATE_HTAB(r3, 0xc004aea7, &(0x7f0000000040)) unlink(&(0x7f0000000080)='./file0\x00') [ 1311.008594][ T3901] RDX: 0000000000000000 RSI: 000000002000b000 RDI: 0000000000000003 [ 1311.016566][ T3901] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1311.024545][ T3901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1311.032774][ T3901] R13: 00000000000009fe R14: 00000000004ccba4 R15: 0000000000000002 03:33:04 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x8}, 0x10) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$IMGETVERSION(r4, 0x80044942, &(0x7f00000001c0)) 03:33:04 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000000c0)={r5}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f00000000c0)={r5, 0xe1}, 0x8) 03:33:04 executing program 4 (fault-call:1 fault-nth:3): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1311.432312][ T4229] FAULT_INJECTION: forcing a failure. [ 1311.432312][ T4229] name failslab, interval 1, probability 0, space 0, times 0 03:33:04 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000b00)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7aceff7f0000e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b563e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed3215752288c6ebe204088dfadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec349ee75b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b900000000cd41d9bfd5d3d1a9c79cb41005000000c3f84829c3fcc74e5eda26d675fcfb4fec948f340d4200"/800], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) fadvise64(r2, 0x10001, 0x4, 0x1) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1311.508421][ T4229] CPU: 0 PID: 4229 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1311.517053][ T4229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1311.527110][ T4229] Call Trace: [ 1311.530477][ T4229] dump_stack+0x11d/0x187 [ 1311.534832][ T4229] should_fail.cold+0x5/0xf [ 1311.539451][ T4229] __should_failslab+0x82/0xb0 [ 1311.544341][ T4229] should_failslab+0x5/0xf [ 1311.548892][ T4229] kmem_cache_alloc+0x23/0x5e0 [ 1311.553684][ T4229] ? tomoyo_supervisor+0x170/0xc90 [ 1311.558815][ T4229] ? debug_smp_processor_id+0x3f/0x129 [ 1311.564490][ T4229] xfrm_state_alloc+0x46/0x290 [ 1311.569272][ T4229] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1311.575190][ T4229] xfrm_add_sa+0x6f2/0x1b60 [ 1311.579703][ T4229] ? ns_capable_common+0xad/0xc0 [ 1311.584669][ T4229] ? __nla_parse+0x4b/0x60 [ 1311.589126][ T4229] ? xfrm_send_policy_notify+0xbc0/0xbc0 [ 1311.594773][ T4229] xfrm_user_rcv_msg+0x239/0x3a0 [ 1311.599833][ T4229] ? dev_hard_start_xmit+0x1de/0x420 [ 1311.605288][ T4229] netlink_rcv_skb+0xaf/0x260 [ 1311.610039][ T4229] ? copy_to_user_state_extra+0x780/0x780 [ 1311.615781][ T4229] xfrm_netlink_rcv+0x4f/0x60 [ 1311.620477][ T4229] netlink_unicast+0x390/0x4c0 [ 1311.625280][ T4229] netlink_sendmsg+0x4cf/0x8a0 [ 1311.630064][ T4229] ? netlink_unicast+0x4c0/0x4c0 [ 1311.635089][ T4229] sock_sendmsg+0x98/0xc0 [ 1311.639435][ T4229] ____sys_sendmsg+0x493/0x4c0 [ 1311.644223][ T4229] ___sys_sendmsg+0xb5/0x100 [ 1311.648833][ T4229] ? __rcu_read_unlock+0x66/0x2f0 [ 1311.653879][ T4229] ? __fget_files+0xa2/0x1c0 [ 1311.658490][ T4229] ? __fget_light+0xc0/0x1a0 [ 1311.663092][ T4229] ? __fdget+0x29/0x30 [ 1311.667170][ T4229] ? sockfd_lookup_light+0xa5/0x100 [ 1311.672409][ T4229] __sys_sendmsg+0x9b/0x150 [ 1311.676946][ T4229] __x64_sys_sendmsg+0x4c/0x60 [ 1311.681723][ T4229] do_syscall_64+0xc7/0x390 [ 1311.686247][ T4229] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1311.692145][ T4229] RIP: 0033:0x45c889 [ 1311.696057][ T4229] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1311.715670][ T4229] RSP: 002b:00007f380d8cbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1311.724092][ T4229] RAX: ffffffffffffffda RBX: 00007f380d8cc6d4 RCX: 000000000045c889 [ 1311.732078][ T4229] RDX: 0000000000000000 RSI: 000000002000b000 RDI: 0000000000000003 [ 1311.741097][ T4229] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1311.749077][ T4229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 03:33:04 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) fgetxattr(r0, &(0x7f0000000040)=@known='com.apple.FinderInfo\x00', &(0x7f00000000c0)=""/56, 0x38) unlink(&(0x7f0000000080)='./file0\x00') 03:33:04 executing program 4 (fault-call:1 fault-nth:4): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1311.757058][ T4229] R13: 00000000000009fe R14: 00000000004ccba4 R15: 0000000000000003 [ 1311.931977][ T4545] FAULT_INJECTION: forcing a failure. [ 1311.931977][ T4545] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1311.945225][ T4545] CPU: 0 PID: 4545 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1311.953841][ T4545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1311.963900][ T4545] Call Trace: [ 1311.967230][ T4545] dump_stack+0x11d/0x187 [ 1311.971618][ T4545] should_fail.cold+0x5/0xf [ 1311.976147][ T4545] __alloc_pages_nodemask+0xcf/0x310 [ 1311.981452][ T4545] cache_grow_begin+0x74/0x590 [ 1311.986309][ T4545] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 1311.991857][ T4545] kmem_cache_alloc+0x50c/0x5e0 [ 1311.996794][ T4545] ? tomoyo_supervisor+0x170/0xc90 [ 1312.002003][ T4545] ? delay_tsc+0x8a/0xb0 [ 1312.006259][ T4545] ? debug_smp_processor_id+0x3f/0x129 [ 1312.011934][ T4545] xfrm_state_alloc+0x46/0x290 [ 1312.017362][ T4545] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1312.023338][ T4545] xfrm_add_sa+0x6f2/0x1b60 [ 1312.027862][ T4545] ? ns_capable_common+0xad/0xc0 [ 1312.032827][ T4545] ? __nla_parse+0x4b/0x60 [ 1312.037260][ T4545] ? xfrm_send_policy_notify+0xbc0/0xbc0 [ 1312.042923][ T4545] xfrm_user_rcv_msg+0x239/0x3a0 [ 1312.047986][ T4545] ? dev_hard_start_xmit+0x1de/0x420 [ 1312.053311][ T4545] netlink_rcv_skb+0xaf/0x260 [ 1312.058006][ T4545] ? copy_to_user_state_extra+0x780/0x780 [ 1312.063752][ T4545] xfrm_netlink_rcv+0x4f/0x60 [ 1312.068447][ T4545] netlink_unicast+0x390/0x4c0 [ 1312.073305][ T4545] netlink_sendmsg+0x4cf/0x8a0 [ 1312.078089][ T4545] ? netlink_unicast+0x4c0/0x4c0 [ 1312.083136][ T4545] sock_sendmsg+0x98/0xc0 [ 1312.087566][ T4545] ____sys_sendmsg+0x493/0x4c0 [ 1312.092372][ T4545] ___sys_sendmsg+0xb5/0x100 [ 1312.096975][ T4545] ? __rcu_read_unlock+0x66/0x2f0 [ 1312.102036][ T4545] ? __fget_files+0xa2/0x1c0 [ 1312.106673][ T4545] ? __fget_light+0xc0/0x1a0 [ 1312.111289][ T4545] ? __fdget+0x29/0x30 [ 1312.115373][ T4545] ? sockfd_lookup_light+0xa5/0x100 [ 1312.120587][ T4545] __sys_sendmsg+0x9b/0x150 [ 1312.125121][ T4545] __x64_sys_sendmsg+0x4c/0x60 [ 1312.129900][ T4545] do_syscall_64+0xc7/0x390 [ 1312.134411][ T4545] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1312.140327][ T4545] RIP: 0033:0x45c889 [ 1312.144238][ T4545] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1312.163850][ T4545] RSP: 002b:00007f380d8cbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1312.172355][ T4545] RAX: ffffffffffffffda RBX: 00007f380d8cc6d4 RCX: 000000000045c889 03:33:05 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8912, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1312.180423][ T4545] RDX: 0000000000000000 RSI: 000000002000b000 RDI: 0000000000000003 [ 1312.188688][ T4545] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1312.197044][ T4545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1312.205062][ T4545] R13: 00000000000009fe R14: 00000000004ccba4 R15: 0000000000000004 03:33:05 executing program 4 (fault-call:1 fault-nth:5): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:05 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') [ 1312.464016][ T4557] FAULT_INJECTION: forcing a failure. [ 1312.464016][ T4557] name failslab, interval 1, probability 0, space 0, times 0 [ 1312.537883][ T4557] CPU: 1 PID: 4557 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1312.546622][ T4557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1312.556783][ T4557] Call Trace: [ 1312.560256][ T4557] dump_stack+0x11d/0x187 [ 1312.564612][ T4557] should_fail.cold+0x5/0xf [ 1312.569145][ T4557] __should_failslab+0x82/0xb0 [ 1312.573929][ T4557] should_failslab+0x5/0xf [ 1312.578367][ T4557] kmem_cache_alloc_trace+0x26/0x5f0 [ 1312.583882][ T4557] ? should_fail+0x7c/0x2fd [ 1312.588542][ T4557] ? should_fail+0x7c/0x2fd [ 1312.593152][ T4557] ah6_init_state+0x83/0x2d0 [ 1312.597763][ T4557] __xfrm_init_state+0x78e/0x8e0 [ 1312.602752][ T4557] xfrm_add_sa+0x115b/0x1b60 [ 1312.607398][ T4557] ? __nla_parse+0x4b/0x60 [ 1312.611858][ T4557] ? xfrm_send_policy_notify+0xbc0/0xbc0 [ 1312.617543][ T4557] xfrm_user_rcv_msg+0x239/0x3a0 [ 1312.622855][ T4557] ? dev_hard_start_xmit+0x1de/0x420 [ 1312.628198][ T4557] netlink_rcv_skb+0xaf/0x260 [ 1312.632980][ T4557] ? copy_to_user_state_extra+0x780/0x780 [ 1312.638767][ T4557] xfrm_netlink_rcv+0x4f/0x60 [ 1312.643527][ T4557] netlink_unicast+0x390/0x4c0 [ 1312.648316][ T4557] netlink_sendmsg+0x4cf/0x8a0 [ 1312.653114][ T4557] ? netlink_unicast+0x4c0/0x4c0 [ 1312.658249][ T4557] sock_sendmsg+0x98/0xc0 [ 1312.662670][ T4557] ____sys_sendmsg+0x493/0x4c0 [ 1312.667467][ T4557] ___sys_sendmsg+0xb5/0x100 [ 1312.672116][ T4557] ? __rcu_read_unlock+0x66/0x2f0 [ 1312.677157][ T4557] ? __fget_files+0xa2/0x1c0 [ 1312.681763][ T4557] ? __fget_light+0xc0/0x1a0 [ 1312.686374][ T4557] ? __fdget+0x29/0x30 [ 1312.690533][ T4557] ? sockfd_lookup_light+0xa5/0x100 [ 1312.695762][ T4557] __sys_sendmsg+0x9b/0x150 [ 1312.700292][ T4557] __x64_sys_sendmsg+0x4c/0x60 [ 1312.705071][ T4557] do_syscall_64+0xc7/0x390 [ 1312.709586][ T4557] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1312.715491][ T4557] RIP: 0033:0x45c889 [ 1312.719403][ T4557] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:33:05 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x501000, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1312.739029][ T4557] RSP: 002b:00007f380d8cbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1312.747454][ T4557] RAX: ffffffffffffffda RBX: 00007f380d8cc6d4 RCX: 000000000045c889 [ 1312.755438][ T4557] RDX: 0000000000000000 RSI: 000000002000b000 RDI: 0000000000000003 [ 1312.763518][ T4557] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1312.771500][ T4557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1312.779485][ T4557] R13: 00000000000009fe R14: 00000000004ccba4 R15: 0000000000000005 03:33:05 executing program 4 (fault-call:1 fault-nth:6): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1312.905551][ T27] kauditd_printk_skb: 9 callbacks suppressed [ 1312.905570][ T27] audit: type=1800 audit(1586575985.874:530): pid=4562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=717 res=0 [ 1312.985905][ T27] audit: type=1800 audit(1586575985.914:531): pid=4562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=718 res=0 03:33:06 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') [ 1313.096399][ T4589] FAULT_INJECTION: forcing a failure. [ 1313.096399][ T4589] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.136062][ T4589] CPU: 0 PID: 4589 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1313.144766][ T4589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.154999][ T4589] Call Trace: [ 1313.158319][ T4589] dump_stack+0x11d/0x187 [ 1313.162666][ T4589] should_fail.cold+0x5/0xf [ 1313.167192][ T4589] __should_failslab+0x82/0xb0 [ 1313.172032][ T4589] should_failslab+0x5/0xf [ 1313.176520][ T4589] __kmalloc+0x54/0x640 [ 1313.180712][ T4589] ? crypto_create_tfm+0x4f/0x1b0 [ 1313.185821][ T4589] ? up_read+0x42/0x90 [ 1313.190041][ T4589] ? crypto_alg_lookup+0x7f/0x1b0 [ 1313.195149][ T4589] crypto_create_tfm+0x4f/0x1b0 [ 1313.200105][ T4589] crypto_alloc_tfm+0xaf/0x270 [ 1313.204895][ T4589] crypto_alloc_ahash+0x33/0x50 [ 1313.209792][ T4589] ah6_init_state+0xac/0x2d0 [ 1313.214406][ T4589] __xfrm_init_state+0x78e/0x8e0 [ 1313.219484][ T4589] xfrm_add_sa+0x115b/0x1b60 [ 1313.224162][ T4589] ? __nla_parse+0x4b/0x60 [ 1313.228602][ T4589] ? xfrm_send_policy_notify+0xbc0/0xbc0 [ 1313.234265][ T4589] xfrm_user_rcv_msg+0x239/0x3a0 [ 1313.239224][ T4589] ? dev_hard_start_xmit+0x1de/0x420 [ 1313.244652][ T4589] netlink_rcv_skb+0xaf/0x260 [ 1313.249957][ T4589] ? copy_to_user_state_extra+0x780/0x780 [ 1313.255829][ T4589] xfrm_netlink_rcv+0x4f/0x60 [ 1313.260572][ T4589] netlink_unicast+0x390/0x4c0 [ 1313.265362][ T4589] netlink_sendmsg+0x4cf/0x8a0 [ 1313.270174][ T4589] ? netlink_unicast+0x4c0/0x4c0 [ 1313.275139][ T4589] sock_sendmsg+0x98/0xc0 [ 1313.279770][ T4589] ____sys_sendmsg+0x493/0x4c0 [ 1313.284586][ T4589] ___sys_sendmsg+0xb5/0x100 [ 1313.289227][ T4589] ? __rcu_read_unlock+0x66/0x2f0 [ 1313.294268][ T4589] ? __fget_files+0xa2/0x1c0 [ 1313.299024][ T4589] ? __fget_light+0xc0/0x1a0 [ 1313.303643][ T4589] ? __fdget+0x29/0x30 [ 1313.307820][ T4589] ? sockfd_lookup_light+0xa5/0x100 [ 1313.313079][ T4589] __sys_sendmsg+0x9b/0x150 [ 1313.317614][ T4589] __x64_sys_sendmsg+0x4c/0x60 [ 1313.322394][ T4589] do_syscall_64+0xc7/0x390 [ 1313.326977][ T4589] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1313.332874][ T4589] RIP: 0033:0x45c889 [ 1313.336787][ T4589] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1313.356568][ T4589] RSP: 002b:00007f380d8cbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1313.365182][ T4589] RAX: ffffffffffffffda RBX: 00007f380d8cc6d4 RCX: 000000000045c889 [ 1313.373168][ T4589] RDX: 0000000000000000 RSI: 000000002000b000 RDI: 0000000000000003 [ 1313.381244][ T4589] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1313.389230][ T4589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 03:33:06 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80, &(0x7f0000000380)={[{@mode={'mode', 0x3d, 0x4f}}, {@mode={'mode', 0x3d, 0x6}}], [{@dont_hash='dont_hash'}, {@euid_lt={'euid<', r2}}, {@context={'context', 0x3d, 'root'}}, {@dont_measure='dont_measure'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x35, 0x5f, 0x66, 0x66, 0x37], 0x2d, [0x34, 0x33, 0x35, 0x38], 0x2d, [0x65, 0x34, 0x38, 0x31], 0x2d, [0x36, 0x31, 0x2, 0x31], 0x2d, [0x31, 0x37, 0x33, 0x39, 0x64, 0x61, 0x6186ee1a65a70849, 0xeb6d9de62803129c]}}}, {@audit='audit'}]}) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1313.397235][ T4589] R13: 00000000000009fe R14: 00000000004ccba4 R15: 0000000000000006 [ 1313.511527][ T27] audit: type=1800 audit(1586575986.474:532): pid=4676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=719 res=0 03:33:06 executing program 4 (fault-call:1 fault-nth:7): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:06 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') [ 1313.666856][ T27] audit: type=1800 audit(1586575986.534:533): pid=4781 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=720 res=0 [ 1313.677243][ T4836] FAULT_INJECTION: forcing a failure. [ 1313.677243][ T4836] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.702235][ T4836] CPU: 0 PID: 4836 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1313.710903][ T4836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.720951][ T4836] Call Trace: [ 1313.724246][ T4836] dump_stack+0x11d/0x187 [ 1313.728666][ T4836] should_fail.cold+0x5/0xf [ 1313.733344][ T4836] __should_failslab+0x82/0xb0 [ 1313.738100][ T4836] should_failslab+0x5/0xf [ 1313.742509][ T4836] __kmalloc+0x54/0x640 [ 1313.746661][ T4836] ? crypto_create_tfm+0x4f/0x1b0 [ 1313.751707][ T4836] crypto_create_tfm+0x4f/0x1b0 [ 1313.756566][ T4836] crypto_init_shash_ops_async+0x48/0x1b0 [ 1313.762283][ T4836] crypto_ahash_init_tfm+0x19f/0x1d0 [ 1313.767569][ T4836] crypto_create_tfm+0x7e/0x1b0 [ 1313.772435][ T4836] crypto_alloc_tfm+0xaf/0x270 [ 1313.777288][ T4836] crypto_alloc_ahash+0x33/0x50 [ 1313.782140][ T4836] ah6_init_state+0xac/0x2d0 [ 1313.786734][ T4836] __xfrm_init_state+0x78e/0x8e0 [ 1313.791712][ T4836] xfrm_add_sa+0x115b/0x1b60 [ 1313.797016][ T4836] ? __nla_parse+0x4b/0x60 [ 1313.801517][ T4836] ? xfrm_send_policy_notify+0xbc0/0xbc0 [ 1313.808307][ T4836] xfrm_user_rcv_msg+0x239/0x3a0 [ 1313.813250][ T4836] ? __schedule+0x30e/0x690 [ 1313.817775][ T4836] netlink_rcv_skb+0xaf/0x260 [ 1313.822530][ T4836] ? copy_to_user_state_extra+0x780/0x780 [ 1313.828255][ T4836] xfrm_netlink_rcv+0x4f/0x60 [ 1313.832929][ T4836] netlink_unicast+0x390/0x4c0 [ 1313.837696][ T4836] netlink_sendmsg+0x4cf/0x8a0 [ 1313.842502][ T4836] ? netlink_unicast+0x4c0/0x4c0 [ 1313.847843][ T4836] sock_sendmsg+0x98/0xc0 [ 1313.852377][ T4836] ____sys_sendmsg+0x493/0x4c0 [ 1313.857178][ T4836] ___sys_sendmsg+0xb5/0x100 [ 1313.861886][ T4836] ? __rcu_read_unlock+0x66/0x2f0 [ 1313.866916][ T4836] ? __fget_files+0xa2/0x1c0 [ 1313.875359][ T4836] ? __fget_light+0xc0/0x1a0 [ 1313.879978][ T4836] ? __fdget+0x29/0x30 [ 1313.887001][ T4836] ? sockfd_lookup_light+0xa5/0x100 [ 1313.892273][ T4836] __sys_sendmsg+0x9b/0x150 [ 1313.896884][ T4836] __x64_sys_sendmsg+0x4c/0x60 [ 1313.901743][ T4836] do_syscall_64+0xc7/0x390 [ 1313.906266][ T4836] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1313.912409][ T4836] RIP: 0033:0x45c889 [ 1313.916837][ T4836] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1313.936617][ T4836] RSP: 002b:00007f380d8cbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1313.945122][ T4836] RAX: ffffffffffffffda RBX: 00007f380d8cc6d4 RCX: 000000000045c889 [ 1313.953685][ T4836] RDX: 0000000000000000 RSI: 000000002000b000 RDI: 0000000000000003 [ 1313.962118][ T4836] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1313.970085][ T4836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1313.978399][ T4836] R13: 00000000000009fe R14: 00000000004ccba4 R15: 0000000000000007 03:33:07 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8915, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1314.005106][ T27] audit: type=1800 audit(1586575986.584:534): pid=4783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=721 res=0 03:33:07 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0), 0x1) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) recvmsg$can_j1939(r4, &(0x7f00000000c0)={&(0x7f00000001c0)=@alg, 0x80, &(0x7f0000000040)=[{&(0x7f0000000380)=""/209, 0xd1}, {&(0x7f0000000580)=""/173, 0xad}], 0x2, &(0x7f0000000640)=""/201, 0xc9}, 0x2001) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:07 executing program 4 (fault-call:1 fault-nth:8): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1314.250152][ T27] audit: type=1800 audit(1586575987.214:535): pid=4897 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=722 res=0 [ 1314.288420][ T4903] FAULT_INJECTION: forcing a failure. [ 1314.288420][ T4903] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.408274][ T27] audit: type=1800 audit(1586575987.214:536): pid=4904 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=723 res=0 [ 1314.502498][ T4903] CPU: 0 PID: 4903 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1314.512641][ T4903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1314.524405][ T4903] Call Trace: [ 1314.527796][ T4903] dump_stack+0x11d/0x187 [ 1314.532575][ T4903] should_fail.cold+0x5/0xf [ 1314.537414][ T4903] __should_failslab+0x82/0xb0 [ 1314.542271][ T4903] should_failslab+0x5/0xf [ 1314.547563][ T4903] __kmalloc+0x54/0x640 [ 1314.551762][ T4903] ? crypto_create_tfm+0x4f/0x1b0 [ 1314.557172][ T4903] ? should_fail+0x7c/0x2fd [ 1314.561694][ T4903] crypto_create_tfm+0x4f/0x1b0 [ 1314.566638][ T4903] crypto_spawn_tfm2+0x58/0xa0 [ 1314.571426][ T4903] hmac_init_tfm+0x60/0xd0 [ 1314.576047][ T4903] ? hmac_exit_tfm+0x80/0x80 [ 1314.580641][ T4903] crypto_shash_init_tfm+0xd3/0x170 [ 1314.586603][ T4903] crypto_create_tfm+0x7e/0x1b0 [ 1314.591601][ T4903] crypto_init_shash_ops_async+0x48/0x1b0 [ 1314.597475][ T4903] crypto_ahash_init_tfm+0x19f/0x1d0 [ 1314.602775][ T4903] crypto_create_tfm+0x7e/0x1b0 [ 1314.607700][ T4903] crypto_alloc_tfm+0xaf/0x270 [ 1314.612477][ T4903] crypto_alloc_ahash+0x33/0x50 [ 1314.617335][ T4903] ah6_init_state+0xac/0x2d0 [ 1314.621937][ T4903] __xfrm_init_state+0x78e/0x8e0 [ 1314.626893][ T4903] xfrm_add_sa+0x115b/0x1b60 [ 1314.631524][ T4903] ? __nla_parse+0x4b/0x60 [ 1314.636001][ T4903] ? xfrm_send_policy_notify+0xbc0/0xbc0 [ 1314.641731][ T4903] xfrm_user_rcv_msg+0x239/0x3a0 [ 1314.646812][ T4903] ? dev_hard_start_xmit+0x1de/0x420 [ 1314.652172][ T4903] netlink_rcv_skb+0xaf/0x260 [ 1314.656954][ T4903] ? copy_to_user_state_extra+0x780/0x780 [ 1314.662838][ T4903] xfrm_netlink_rcv+0x4f/0x60 [ 1314.667573][ T4903] netlink_unicast+0x390/0x4c0 [ 1314.672373][ T4903] netlink_sendmsg+0x4cf/0x8a0 [ 1314.677248][ T4903] ? netlink_unicast+0x4c0/0x4c0 [ 1314.682224][ T4903] sock_sendmsg+0x98/0xc0 [ 1314.686574][ T4903] ____sys_sendmsg+0x493/0x4c0 [ 1314.691363][ T4903] ___sys_sendmsg+0xb5/0x100 [ 1314.697105][ T4903] ? __rcu_read_unlock+0x66/0x2f0 [ 1314.702327][ T4903] ? __fget_files+0xa2/0x1c0 [ 1314.706982][ T4903] ? __fget_light+0xc0/0x1a0 [ 1314.711616][ T4903] ? __fdget+0x29/0x30 [ 1314.715746][ T4903] ? sockfd_lookup_light+0xa5/0x100 [ 1314.721031][ T4903] __sys_sendmsg+0x9b/0x150 [ 1314.725587][ T4903] __x64_sys_sendmsg+0x4c/0x60 [ 1314.730367][ T4903] do_syscall_64+0xc7/0x390 [ 1314.734947][ T4903] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1314.741015][ T4903] RIP: 0033:0x45c889 [ 1314.744928][ T4903] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1314.764797][ T4903] RSP: 002b:00007f380d8cbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1314.773220][ T4903] RAX: ffffffffffffffda RBX: 00007f380d8cc6d4 RCX: 000000000045c889 [ 1314.781287][ T4903] RDX: 0000000000000000 RSI: 000000002000b000 RDI: 0000000000000003 [ 1314.789546][ T4903] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 03:33:07 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000000c0)=0x80000000, 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400020401000200027400f8fb5100080000000000001ad5a8dd7b721fe8d06e2d19673b60f21b9492b37d02d0958d", 0xee}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') [ 1314.797624][ T4903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1314.805601][ T4903] R13: 00000000000009fe R14: 00000000004ccba4 R15: 0000000000000008 [ 1314.847274][ T27] audit: type=1800 audit(1586575987.314:537): pid=4906 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=724 res=0 [ 1314.993496][ T5015] FAT-fs (loop2): count of clusters too big (5372670) [ 1315.022844][ T5015] FAT-fs (loop2): Can't find a valid FAT filesystem 03:33:08 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8916, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1315.097917][ T27] audit: type=1800 audit(1586575988.064:538): pid=5118 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16926 res=0 [ 1315.192465][ T5118] FAT-fs (loop2): count of clusters too big (5372670) [ 1315.199289][ T5118] FAT-fs (loop2): Can't find a valid FAT filesystem 03:33:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:08 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) mq_timedreceive(r0, &(0x7f0000000040)=""/62, 0x3e, 0x7fffffff, &(0x7f00000000c0)={0x77359400}) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:08 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:33:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1315.667738][ T27] audit: type=1800 audit(1586575988.634:539): pid=5139 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=725 res=0 03:33:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x2, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:08 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x800}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r2, 0xb10c}, &(0x7f0000000200)=0x8) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000040)=0x5000) 03:33:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x3, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x4, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:09 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x2, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000380)="76b03c620f6d7b5e391cf092a5beb021d94347a40c4a107f86f62ae5361da6f904fb307a01f78dfa1f3f4b2f79b36892ef294e86c212371fadad3fd434b27d97eb15dc8d8d5df0352a20fc7570aad1eed3c86553bc6f6e513e00950f5953f7bbb9d5572df7cfefbd37bbd9911576eb02c7cd7c3de269abdd8036fe0aa773e39babc757e3ecf73920e986c1951ee5df7ae2c03160c368493bc622a63dd70330ed2608a4df1ade132dda07654f7af212a07dbeb5aed748e95774ad2e4bb56c6629a425a11974f37d21bed96d514fd00e74fc2f34ab23608b15dd65d6ef26", 0xdd}, {&(0x7f00000001c0)="6b9f73adebc56264aeda66a842b0b9f6857890174b9afbb187b293a5f7744427b4dba0b513677061cf4e972cbb8510fe225d86663004542bf3091a823e3f352332414f902678160b6da9c77ac5ffbfe2e7a21438fd90fb24b872a63279a85ab3643b1ba4342c2fecddb4d1b9f9d396a436cdfe9162e7f12898f0fabb24dc1ef1a83e05446cb007e769e2806bbded234922006682d9d94715a3faccbe8228417daca2561515c6fa2322ce79f19fdf6e348e", 0xb1}, {&(0x7f00000002c0)="b994d4b493086f91034bff46b643b24cf5561cc73d96b834fcfba85f7c70430ce7cd86948c4df01c774652c6c0a886003f5947b82cbcc64c19619214406e33313e0569c39751b7ec4328621133c5ab7e47e94f912fd671a46b89a5943a553a06a2096585617792d7286276c90028bf0d00", 0x71}], 0x3, 0x100000000) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB="b4040000e543fc3b028e36e7b9cf9b9c0ee608ec0e0cbb7b3e4d218172767765608dd4740000000000000000000000000000003cfcecdc20f031a46756ad41fda855c2d46a1b75e2fc6578691f1ece7c5b6f033ce93c2034e90bcf4a501f74a731394473f9e33ae4f3abe56a1aafec51e55bf310b7d8b4d271c1215a869726e5dd95dce5f200628a08e88be3ad3dcb5f2263699c8beaecb1", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) pidfd_getfd(r4, r0, 0x0) 03:33:09 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8917, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x5, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:09 executing program 2: openat$audio1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio1\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x410001, 0x0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x800, 0x0) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r5, 0x4, 0x42000) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, 'bdevself$keyring[lovboxnet1*\xbað0#[wlan0/'}}, {@subj_type={'subj_type', 0x3d, '/dev/audio1\x00'}}, {@hash='hash'}, {@subj_user={'subj_user', 0x3d, 'msdos\x00'}}]}}) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r3, 0xc2604110, &(0x7f0000000380)={0x8001, [[0x80, 0x7fffffff, 0x3, 0x10000, 0x7, 0x0, 0x6, 0x7fff], [0x7, 0x1f, 0x4, 0x6, 0x2, 0x101, 0x8, 0x4], [0x3, 0x77, 0x6, 0xa4b1, 0x80000000, 0x3, 0x8f4]], [], [{0x0, 0x1, 0x1}, {0x7, 0x5, 0x1, 0x1, 0x0, 0x1}, {0x20, 0x3f, 0x0, 0x0, 0x1, 0x1}, {0x1, 0x8, 0x1, 0x0, 0x1, 0x1}, {0xc7f, 0x6, 0x0, 0x1}, {0x8, 0x7, 0x0, 0x1}, {0x5b948c8c, 0x0, 0x0, 0x0, 0x1, 0x1}, {0x80000001, 0x417, 0x0, 0x1, 0x1, 0x1}, {0x1, 0x3, 0x1, 0x0, 0x0, 0x1}, {0x3, 0x6f3, 0x1, 0x1}, {0x40, 0x5}, {0x2, 0x1, 0x0, 0x1}], [], 0x40}) unlink(&(0x7f0000000080)='./file0\x00') 03:33:09 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x39, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff5470ab3f090001006866736300000000070002afba768c000048fd59f6763da528e7641541ed4800000039fcf70397009e0dafedfe13bdd6f6e9f994a10901ecb2cb51dc05360a77059c8fda8169721bad1b9ce53190ab11d0766c146956b0b7e074485362b192699dc14b88027226275ed8637c44c2a2e8489985758edc64240b157554517b5059813a580db7b3531a438b"], 0x3}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="7a34f800000000", @ANYRES64=r2, @ANYBLOB="0e000000001101fb4b2f88cb48592e0074635d6e6458750466d8558b"], 0x3}}, 0x9010) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000002e000704ee00"/20, @ANYRES32, @ANYBLOB="00000000000000000000f1ff0c0001d8510870d00acfa5779754007533320007000000d0455083cf"], 0x30}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_to_team\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x40810) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r3, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r3, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000040)={0x3, 'macvlan0\x00', {0x101}, 0x5}) 03:33:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x6, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x8, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x9, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:10 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0x44, r3, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_DOMAIN={0x15, 0x1, '/proc/partitions\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}]}, 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_REMOVE(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0x50, r3, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x6}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, 'GPL\x00'}, @NLBL_MGMT_A_DOMAIN={0x9, 0x1, 'hsr0\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000040}, 0x200048d0) r4 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r4, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xa, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:10 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8918, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:10 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000002c0)='bfs\x00', &(0x7f0000000300)='./file0\x00', 0x64, 0x2, &(0x7f0000000400)=[{&(0x7f0000000580)="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", 0x1000, 0x20}, {&(0x7f0000000380)="b07c44955a63bb71ca507beebd53802381820f3d7bfa0ea67f82e087fcc2e0a24b0fd7de47a3fa355e289ee819aeaec3d78e9b4273d877aaa68ee343421d28075a475d47d56a56e6021adf1a397af30c5130348b90e5103b28cda4", 0x5b, 0x1}], 0x1002400, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x234080, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x27) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000040)={0x13, 0x10, 0x7, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f00000001c0), r4, 0x2}}, 0x18) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1317.438229][ T5608] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 03:33:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xb, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1317.498807][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:33:10 executing program 2: write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000780)={0x7, 0x6d, 0x1}, 0x7) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000540)=[{&(0x7f0000000380)="321c82fd1db4bc64f64c4a1f9839e75d315aba1666cf0650c1f76dac03efaccacf289d6382cb0fa9d095d19b1f7b01cada1b90d28d1c240477bf86c5f70024b9ab9243c8b33e8c01a76a14a31cfca1d88d27a585b9c5726dc162266cd1e569f11afc15513aeadc6578d3e2ebea0e4c87b1dcae16f530e90b7ba8402667c04ef2ea4e825b456bc0887cc4ae4a7026d17944e85dbb7e1b04b8dc631ea9b169aaeaea7eab5dfa4c77c1de48f4f3ff08873743a1fade9db94f3b874a7e9077e23a39bb73b09eb42b044544d276a29e6433e15985f167e699c128628952f24bacd4f5fb87559cf5", 0xe5, 0x5d}, {&(0x7f00000001c0)="0dec478c6275e3948420b6b463f778897a3bfeec986fbaed663837644040d3e5bc718c793788b7a0eed994f0e5feed8a10e0626de62c4e9ad0a9b52449c4aad80489bbfe1e2705507e8d82589de27690bc659895550990abd8a4d81455eceee8442d520cff6dc5c6662009f6be6ab0cb409838061840655e202a90d7b1ba14bdd6c632a65ec3c254306b8b85a0b48297541e92ddf3c26a2356440100c2147a6e9980a468ae07f47c5702e713504d3a246c46229a08", 0xb5, 0x1f}, {&(0x7f0000000480)="e00157fd61ba895cf44b8da539cb74027be7f11bb9b34d2650cf58b6c14e2ad7609aed07854992e671d3dfc2f71000f325bb4ade001960ba335dfb2dd4d3cfd163dfc0d5c6bfb38f56723ecfc90016c18102c18df1e7ecfb0faf584feed7090b9984a60809c9cfb3d6cc5531dcc9b1ab69ec7ccce088b9ad5cd45b6ddad532b23dcec4f3818ffba3d2860c0eabfbdf1496cdfa4cc5661b7679a319d97b02bf20293cbc1800d8a167235747d968a951ea", 0xb0, 0xfffffffffffffffe}, {&(0x7f0000000140)="21822b5c6d541657a4982971f3f21d7f106caee222fd83b4a9c187a5", 0x1c, 0x7fffffff}, {&(0x7f00000002c0), 0x0, 0xfffffffffffffff9}, {&(0x7f0000000300)="22b080de8e27ce0388c6b9159e284413e8316245807dff6dfbb76c49dbfdfa6dc820c1b9d8a347f5a012b19649f371fa760bc447d1b105781cb7", 0x3a, 0xfffffffffffeffff}], 0x800000, &(0x7f0000000600)={[{@umask={'umask', 0x3d, 0x3}}, {@quiet='quiet'}, {@codepage={'codepage', 0x3d, 'cp737'}}, {@uid={'uid', 0x3d, r1}}, {@quiet='quiet'}, {@type={'type', 0x3d, "06d460ef"}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@hash='hash'}]}) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000700)='./file0\x00', &(0x7f0000000800), &(0x7f00000006c0)=[&(0x7f00000002c0)='V\xcae\tg\xe0a1\xcfW\xe0T\x81\xdd\x01\xca\xd2\xe2\x89)h\xf7\xfa\xd9\x8f\xb6E{\xd0bDJ+\t\x91\x8c\xd4\xd3\xf5\xcaK\xbbP\\\xa5\x8e\x8a\xdb\x8c\x14.\xfa7\x9f\xea\xab\xfan\xd0\xe2', &(0x7f0000000880)='/eth1bdev)\x00', &(0x7f00000008c0)='\x06\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000900)='quiet', &(0x7f0000000940)='securitynodev{mime_typemd5sum\xc0\x00']) fchdir(r2) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000840)={0x101}, 0x4) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000740)) unlink(&(0x7f0000000080)='./file0\x00') 03:33:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xe, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xf, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x10, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:11 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = getgid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r1, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r3, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="020000000100000000000000040003000000000008000100", @ANYRES32=r0, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r2, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r4, @ANYBLOB="1000070000000000200000000000000d"], 0x3c, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0xa, &(0x7f0000001700)=[{&(0x7f0000000380)="065f9a7c3511a0e3373506ab5149ea68e1d84a295e6e8772334042d1b4edcc04b5da4643246e276a829772af70da497a49b33628464856ab12354569b969c536e6f1587c4d100f7adcba80f5276a58d98385cae1bf61ce683ac196ce84bcf149323c8d7e0d09e8d2bfbfbf5d2ad00b57036f3f0db3ca28724d4b33961b778d9e7873c1ce523ed2c12400321d4233620dee5b32ca9e2a80a09ce02aaddd262928ecad35b16af39699b17b93dd0b592b73d797a84e8c92ca6225f7b69936e9049c63bd5433553066e256b28aa083257e6bab5c7dc5cf6af82cdb4994811c5cbcc289b0639be7dbd595680fc24bd6555a479942f75c7d35022bd71815c14e581057546842404d9b93d45898fc4decc177c8f6c08acb85a1fcab7b17c00ce157bfc4cf0e4612ad9ec6ee07d47d8cecdc5775e9814b2b5bf990e202bc7b3b8458db3ab92644bf305196cb51c927b2d9c973c79d75ac96400f795fb2e4eab3df8a8d73c23b98e5483abe3e8783322c7974994ccc9d2a5270dddf7307e4ba2e7fc6a715e58ed1b6f67bc2858586eab5f0ba015f5f14fdbdad8fa94211874a288ca3778c3b843aadb8fb3c747143a055ec7387829041f57c9f9d2d8e8d0a9393c7bc2c0532b0e44a060befc0092b549f302893f645245e81408689696e17c7e2f64e8b87d28bbdaf94264a4cadb84b5f54fee5e52a80aa3c2b9d205065cb530c77e0e6e71c6c38c1a738865fd065a2f04e63870b8ef353ee3bbc6b76ddb9c6035f571aa7571de99f414fdda3f53aecc7320410f29203746ade0b70e5a71959f495824d7f8d729ab62503b8e59ae56c3f73e03d500085f437d4f7a9ad3b7c53930c69a57a2637f2e2a7e1f2b094b8903bfcc9f26e4c0d64f653d0acf17ec955e61a45794e2713e04ec09847610a7a932a08c841f0c81cb717ff4d26d4bacbefa31fb5f1e751b8904bcebc0985fd927c7192e57dfa120565f90e8664763507112411ddbdbabf1dc003868870ed4d4c68bd64d313307571be97142f7e3c0b3cc27016bdc70c6906f2b1bf1348ad69a0340916595c7ae204555cd915c7e72dd76629857d27d2925f311530c237d1cbf9a85f65a253be7ec4bbc453729bab5687ffd9d95300ebc9e327a81fa19ec228675a4929ddc2c503d4e2b809397bb9ec8abb0824eec699a3f69e5b45b4a0d8f469653049f0cae6c184cf18ec272f8ffdafa7bb98843891b843c642d268cc024638c93f5584319c3ab0027784a48d6ec855c57293bc8ec27c932012951abeb3c6fc5641c372bb63cf733f3c47517b4a1d86b51883e403fa170ddce8689519789de17dc96d927c8e5dfd4ed15a471cbb6ae7455cfb1f593f35aaeaae34ccc4ebfa67348a99ab2a8957ea7031e165fb78d1087ae7840ce8f9be4628b513d6b403c2f6f2b22b181d272067c4a04069565a35b4c8c1ad8de698ff1cb10e571589382acd2d529c0d00b81488dcd1b35d50c5dc5f8d701b92a8856f620ec1d04332a4d7aa262f016d49450f2864672fa80a0cd9ef495197b5659551c18377df5485297238e90f070ad4f1194e33caf9660406a44876dc1030d7e652f9457751728600f5a0a0f51e1f90c6840b3201fe3edea9bc0c3c29966f2b88b9244f43c7624783a8b41cf777a3ae21c5f1fdfe1d05ff65cd20f0ebc410f148d66a29643f0036152f8ac629f9c034037f0c44b0df124255f4f0758932120da3c650e0f6b34df7b174fb234226ee8ea64c9aa13e7fe1be42b4504e4fcf12f9529d383930c929c606f2653383b0c5fcb115755e27023aaa6ecfb29a11681dff6edfb0b2925c4aee53ecb2255ba72a88f89d6516c094bb8cbf3f3cf23f305ac7bfd5d58c6259234a9e11441df2432fc21df72dfa23f04e7f3ee0991b3dedc979b24c02da247a775674ac0ef960abf4304799a71d5c8ca63cb301d9616f8c2fdc67504b63638c3138d0ff4ca8dc7f64ef56aa0dbe99e9ed1edc87f4797a481e0a59aaabb451a39c0007101655660759352e5c9bdd587c421c330d64bd41e63e3c5117644c43b2bedef4cf33503adc8ef6b2cca583168c6e9034c5d6465ead3151ec46454e1718ab15888dbe2fca0d63af4853c9c8649a40bbc006396db6ffb4b00a396dac37583d95843e0b9112c18a76c9c5dc7480814474e48da87eb667b4bf13bef15dc6bd1bb248504c7c07a4e4ac5d6c2e820dd97906593a320e217b006abea388144b8c58a6872673c68cea5be31fa945066ec7559c1ca68c2ca1fe2c2881641fe20df9a4524235d34c46550af09a1a10a21b8dd0d28b2875cfa6ee918c2f644bb5757216de66812e2cfe7c8ce7f1ef2d1c16c1ddf614308dbcc36e28ea5eb8b9cf8edc1c91f687ae247be7926419820e13e3faaea8daf75a67ed1b6cef86f0e012bcad026c8f6bf673c44bba2f569f4b2e46a9b7c5823c4510616bb47449ac111dd589136f85d465cc647d3df8d6f878474c55f755d194c9e7c63a38eb686ca30c8fc6e1c464752331e559aed676fc366bca3d58a363a42ff65522b2d34c34ef41b381b85aa36e53d177779cb83e2003a23dd90071a638c6d6ae1ab18872ad4c25355ad12a7a545d75351009a7b75945c7932c4b9b5bd775c2969fe3ad8157e276d0978d5c8f82d910dd66fbdd3ef7c247e547a41321f5cfe4b4645579d04bcca3fe657c23bf3e4ed176d0778a2a957b0b4931ffd51ea3736d5c58444cbcc67c8f763a0c7c08584d7f00f33145e18cb3ddc0dd5b5b7290a2ec11446145b11b5c328e5a502355e8f0ba12e14cb4892d0e3d9f62e9b66e68cd6600f3282180a103aebb77e288c4cfe4228fc55a0a1f576aab06c2a8eff67a4edf15838796a282accaeae956ff65e7ea2fee206f67480349fc89d2e215d1c8326417239600eeda487a1d891c4c7396f56ad3e419659ff1b706cd2212ed1f7ab5b17ea9c988fe846e1abbe9ee88fe656890e412c9fadb3b76b0bf76169230b4c21475e9c114e024067d20d0c2d0da666987842115ad725ecb63f8140b71e93700907891250f9c2f55890501faec646e71d7889910b3e5ffcdda7d776cd55ef14c704d773a352eb3a9c798a2d887fc926a0057b83c63f602ccea56cbd628229584ee7d2c1bb2aa016fc0d7642f9e9045dce9421c34fb5fc1bd77bf5e2cdc4ccbb796a8a46e7b19d5e383b0b54150379c94cbe28dda1a11adbd1a6f996ef6b8518ca890b7b0b9c2d926f98723539f77a59ec9c7a7e8a118b0958fc4999130f6bf4fd74b5b10f658291606a98c3e7181c83cf7b0d153eca039098f23d54e9f89b9a657d587586312b10e8c8fe09197c28447192fbca1a08177cbbb6fb23ebf1dc74c2fcb1dfe31677f480577a13a7b0753e6a86d23c03710178fd1ba787425740a5dbfaa36f461e1629f7fe5b16fafe03d0878081449642f9fd292620572a0252a4420f23a218261322403344fa2e72abc678280561ef28f737a3cf3e43e335e7155009f3b65bebad9789d82e32765abfca66254780a5aa96c4954087b7851936029914d979504472c65bcdd3c82ec1b9a9d2d671f2f981195e02db5af8a60f3ab0af12426da97e18d3c33547b15774f05d18c9bc1fd914575b6e6d6e37fc62f1a91b00d28ed99bd75e323ea15bce718e67962b9970f99236666b5689242acda4e2e3dead9f3d38da3e7c507065d136e6ddb361d309178ba7d5c154e38d0881210635c9db75244222d42b6a4c5b1a4a708f73b503a844735b07bd2d75ab60c443ab8fdcb0323ae125991ad5ad6c5e7bb6a7430a3c39c945398686da2f79e8e2a95ef8721d29d48e99db98d7c518e70068dbb2832bb35fdbed7e3e3794be1d29cedd0dc6b416bfe1695f09a0db5b4199ac7f9d922b4e8d81c863d71b28e55119dab8d1ef37a87a68afef54e550268ddbf0438b22a5d4b7b031506e2344911e1de670beaa5a2555d4cba5c79d08d3787f25dab62a9608ad099ae7892ff2ba4380cd4f44eb8b774a893b4368d4b06810f0b0c03d3cc42244c5b7beca38217f208b3d07d22072813286e07ea176baae27a496f1a11cbc5f404804bbd575f75fc1565fb166beecde95451e176e439a2d7482eb1d92b0486586bf5b8bd074f36f6a863f7e042966030dc704cb6255e16cb37d4803169cf1ef0c3e71ce8b582a8764ea062c149b8fc27ae456225f84e348f601371af1e43c3721ec0b458293fbb11ab3852bd864531ed9c7c06dc5a85b3c6e92682953e002c797c15a666ab1381db2823f787a30f1616c93abc052222213e354ea62496333cdeb6455c915853c8a38d0703242aed4be0acad28183b32d7303c9d45e98c41c394e4d1c6f64f5d0fc095f9475e4a9d0f1e44aa124bfb7627915035b23648c7c2111d14dc093e09c4571570359d516b61476b79c037c9df05030da350fee44236c124bd4f349fc7f60bd62554603e38a55dd592bd7f11d375ec4c1b3687b12dec5e2eca08c84dc7b8680762bf61e753f11f16e1d8dca71d0b1d0f8edd5999d9a6f95443d7021fb7a1c3a58603be1b42c2f27d67cee2f0bbe0bbe5bc7b99de794974e12ba27874301fbca17177ce4dd69607944c026bfdeff15fb9b3308e0dc1ca78234df7d8b4b43bbf0a23de7f604124da8cd5a753c182d868979397282a67abab6962a32aa81ac0af69cb3d2e4568d085c754ffe90ea9e139a91bc22b57e622489e83910b918613a9cc296d2255cdacc1aa7ac261030511285b5df22080fe86e73bcbe783fd8acc382efcc3d129c24e699b1c0a2b5f4171a11619a9e7c8afb6dd4a8080a36c13f1e6e175af3ba38798940dde19c8042cfe7dfd33d0b60a9fc276f7830b507e3d77adf9200f844068a194f2e30095135348c8741366932d29773e7b91cd7c5fbe0f14d0df0c0060c2edcf675b2dee6dca9a1b0d14a11489e137c773c924264165b8f620e0d2e787ac639ec5c3a186b1170867eb524ba2d3d32f02fc4d090aba33e599c3b09372256df1a6e970041d37cb8073948b54484f7f31e7c1a8be5cd669f82709f955e1e0268f59f1cc889b78dca921c2db7a5c7108daef457cad2828cabb8d71fcd8497188d4bec4a560ec91454dfcd04ebeab23824728d751e16e7484e13a4b52e4963097155022f7d10aa61ec90187d520590466a105aff7ae637e27e4ffa91a3ed4d4138f638b7399bbd543432e84275f3b7c661b7c66d3d5692613ed937645921b5419be06210ace07c7a6cec7e3ac57584b037abfa9ceec3f9fd8aa5d39a9b1b8ff8f70e3b83cc9975b64c21db821ddf1439783118db690ccb564d571416175df4c2f3e0c5a314836f9b652041156678314730a9168cd8bee4d6a7f0fc9aab332f5c5f345e3d429b127c650f428a1092d4ccb6646eac07224d4d98e26fa9849708a1272af4f908aae17b725dde38593335a2a9b70859344fccc98994b9339a9c732080f6f3b48e7aa171a2a7441a18ae60a3b00f70bbc7e15a1cc055720afce1fed475cd3fe7fa5a2f04ded78cee37b0ffedc427fb3c622792567ce32cdc40365c2d5eb6959aee0bd0d60608d1b6b4696baf75b2ee61c7e2a42e9ed1057f149b5092928c6f72834d86f383c48f16966121adb01f9d1098dcb9193defdc3a67d811b9a6c16dcb3f94b80117ac177e2907967b66cbb6438df35aa4d4ba393675c8078db2b90f0a77f95f8b3e1d3a51218807f0ea5368f6681c77370644b2521dba8ecb607fd7569639f419632f323303ee15c6d046ed6b151887036db21d334a16aef3a9bcea217aee0ee6ff49c3b9bacd351c2d9e57873b6cc14cfad45beb66c1adfbdc8603326", 0x1000, 0xd12}, {&(0x7f00000001c0)="9b610a0bbc4552a2ddfdb3ed24d414b053fce2e96810d9b6e021409ae374f71d9f1f2f1e7cbddb7b0ce974f77223c45c368d36344b3b629b55ce89900d4721746e9dc431e607d70987c8edd289f4b5b71e8eb620d447080f708fe6be5f159d6c3750520017d896a95d5072879ad50096aa2f2b23f1a21334ea5b9566d2", 0x7d, 0x20}, {&(0x7f0000001380)="167873651123dbb6b6658df719f72efdf4b579ee7bcfcaf3a2d9e694579164c511a6a9e5475819372d6c993d15c6405e6d486d423847f87c7a27ab6775b0cb62a80277ecf46b9dd5e83e70cd51bcaa9f48aced32549343b126e401734b288533e36445c4e036fdb17bf90290ce3416c0aaaf8366d4bf9c253a818eea4f302ebf15686093e3c92f5211d1", 0x8a, 0x1}, {&(0x7f00000002c0)="2ef2dc8e2e02617cba42ccaada34ae8f6f483b322ce4822f11ce7eae076cf33331c7587c05571f86d1febbc790372e33ee1a1ccab70f537d7d0d0079ceb2ef24b13c2f7414dabff21f86c1dd525ca9dc76e7066d2d358bb49424507fbc7a87f64bc9406a16e5fe73ed", 0x69, 0x6}, {&(0x7f0000001440)="b88d622ad549c357d326f9caee4723d9d3f22c8f224c705de9260013ad28379e67fed3c114a8ab020f5a4fba999e80dee52e38c27f4a48479a37e7cfce2affdc4c3ffcee76fd95c1177d5164c5ae2914f1ae6c4d2e4e4ff4dc89b6f58ad5f2fa38d5e7fb9f319ebf2c043ccf05c8dc17269785481531fa08a8c65e9a98881e20e7b2f9e178cd273795e8c59a925e57fe928707f96d336e3f46fc7d", 0x9b, 0x2}, {&(0x7f0000001500)="c6113098f29b1788e5e359bb221e840b83d6df00364409f747f165d480c2e077850ee92036dc4f3232e1e1864b033273b8fba634aab58789c946cb7090ecd89f610488c42ebbd509eed1b7083ccb1d10", 0x50, 0x80000001}, {&(0x7f0000001580)="0e5a3886706b433c632f721b8ba921fa194cae710724499ba94c49b7601c050c01a2f8cfecc7a57c2144d96bff130afa471cbd99c785255de95f80e0fc540f72275142fcd1516dc80ec216f47773be298ae302145a71b212e0eff8e55261338adc7b3e218e25158a230493dc470ed4b7b3e93f4ee076089fda9d79183217be6802e0ab72c25e7fb0bd7582ca381e6e07bc08e1f560592fab765b9f798ead46b327", 0xa1, 0x5}, {&(0x7f0000000240)="dce2aba43b9003a71ce7de5b9904d8937737159965e73f0e18c7bd00e6ffba083552d902", 0x24, 0x1}, {&(0x7f0000001640)="57e7979f13ab486aae212c8060f1f74ae6dee7fca2", 0x15, 0x8}, {&(0x7f0000001680)="6aaf3d45dabedfb42e8f06e941e8fea1b3c9056697ab135843f75fe77ae6796160a87a4d6bb837c3bf41ba4ef9ec8a64e98a517be26021401452b99fc7356d1c7edab3911c8029f61a91fb04cc8a86d5e74ca3c59a0fae8b928b1eea357420a58e2ea2d839489b91d8dff3c089e12652a93da61c9dcc", 0x76, 0x1000}], 0xb40044, &(0x7f0000001800)={[{@grpquota='grpquota'}, {@umask={'umask', 0x3d, 0x101}}, {@resize_size={'resize', 0x3d, 0x48}}, {@gid={'gid', 0x3d, r2}}, {@nodiscard='nodiscard'}, {@integrity='integrity'}, {@resize='resize'}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}], [{@uid_lt={'uid<', 0xee01}}, {@fsname={'fsname', 0x3d, 'msdos\x00'}}]}) r5 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r5) setitimer(0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:33:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x11, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:11 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="b40400404a2fe3db883e7fea", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r1}, &(0x7f000034f000)=0x2059b000) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f0000000200)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) fcntl$setstatus(r2, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x62, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000000724b600cbd5223b00000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953801ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41d9bfd5d3d1a9c79cb41027f063b6c3f84829c3fcc74e5eda26d675fcfb4fec948f340d4200"/791], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000007c0), 0x8, 0x10, &(0x7f0000000440), 0x10}, 0x78) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:11 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8919, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1318.613738][ T27] kauditd_printk_skb: 9 callbacks suppressed [ 1318.613755][ T27] audit: type=1800 audit(1586575991.584:549): pid=5948 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=735 res=0 [ 1318.773487][ T5963] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 03:33:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x12, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:11 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x59, 0x80400) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f00000000c0)) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1318.851386][ T27] audit: type=1800 audit(1586575991.614:550): pid=5951 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=736 res=0 [ 1318.876920][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:33:11 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x0, 0x0, 0x3, 0x9, 0x0, 0x3, 0xfffffbae, 0xb8, 0x40, 0x2bd, 0x7, 0x6, 0x38, 0x1, 0x4, 0x1, 0x2}, [{0x1, 0x94e, 0x401, 0x9, 0x19, 0x7f, 0x21ea, 0x2}], "a96abf9d473e3c5728f7f7e4a282f8993603c3ad7f3ef56b40a12448b7049baaeb7ce36f138e8e4a873576fb80c92f25c14500d35620195b4f138de6d0791ea730572e90051a9bce1f16"}, 0xc2) open(&(0x7f0000000100)='./file0\x00', 0x18001, 0x11c) unlink(&(0x7f0000000080)='./file0\x00') r1 = socket(0x10, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f00000001c0)={0x77f9, 0x2, {0x1, 0x3, 0x10001, 0x1, 0x4}, 0x80}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x10000, &(0x7f0000000380)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@common=@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@rq={'rq', 0x3d, 0x1f}}, {@sq={'sq', 0x3d, 0x9}}, {@sq={'sq', 0x3d, 0xa6f}}, {@sq={'sq', 0x3d, 0x1}}], [{@context={'context', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@uid_lt={'uid<', r2}}]}}) 03:33:12 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x891a, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1319.068383][ T27] audit: type=1800 audit(1586575992.034:551): pid=6074 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=737 res=0 03:33:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x13, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:12 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r4 = socket$netlink(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, r5, 0xb03, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f00000001c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)={0x11c, r5, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xa0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'eth', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x704}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8b60}]}, @TIPC_NLA_SOCK={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4f2}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6dd}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x74}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x8840}, 0xc0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:12 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x27) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000040)={0x13, 0x10, 0x7, {0x0, r6}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x2, 0x7fff, "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", 0x0, 0x44, 0x5, 0x2, 0x4, 0x6, 0xf8, 0x1}, r6}}, 0x120) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:33:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x14, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1319.386978][ T27] audit: type=1800 audit(1586575992.354:552): pid=6189 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=738 res=0 03:33:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x60, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xa0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:13 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semop(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x1800}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)) semctl$SEM_INFO(r0, 0x2, 0x13, &(0x7f00000001c0)=""/153) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x2400, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000980)=ANY=[@ANYBLOB="b5040068318fba29f422aed386d192b43300", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000900), &(0x7f0000000940)=0x4) ioctl$KDFONTOP_COPY(r4, 0x4b72, &(0x7f0000000140)={0x3, 0x0, 0x20, 0x11, 0x4a, &(0x7f0000000380)}) lchown(&(0x7f0000000040)='./file0\x00', r3, 0x0) unlink(&(0x7f0000000080)='./file0\x00') r5 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300)='/dev/input/mice\x00', 0x82) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r5, 0xc1004110, &(0x7f0000000800)={0x8, [0xe85a, 0x4, 0x5], [{0x2289, 0x2020000, 0x0, 0x1, 0x0, 0x1}, {0x3, 0x8, 0x0, 0x0, 0x1, 0x1}, {0x4, 0xffffffd2, 0x0, 0x0, 0x1, 0x1}, {0x1, 0x10001, 0x0, 0x1, 0x0, 0x1}, {0x1ff, 0x1000, 0x1, 0x1}, {0xfffffffa, 0x1000, 0x1, 0x1, 0x1}, {0x8, 0x7e0c, 0x0, 0x1, 0x1, 0x1}, {0xffffff62, 0x6, 0x1, 0x0, 0x1}, {0x4, 0x80000001, 0x1, 0x0, 0x0, 0x1}, {0x40, 0xfff, 0x1, 0x0, 0x0, 0x1}, {0x3, 0x1000, 0x0, 0x1, 0x1, 0x1}, {0x78, 0x45cd, 0x1, 0x1}], 0x2}) connect$ax25(r1, &(0x7f0000000780)={{0x3, @bcast, 0x1}, [@bcast, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast]}, 0x48) 03:33:13 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 0x3, 0x0, {0x3, 0x5, 0x0, 'hsr0\x00'}}, 0x26) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x80000000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x300, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x500, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1320.204522][ T27] audit: type=1800 audit(1586575993.174:553): pid=6512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=739 res=0 03:33:13 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x891b, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:13 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x600, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:13 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe7ff, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:33:13 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) r1 = socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) readv(r2, &(0x7f0000000440)=[{&(0x7f0000000200)=""/100, 0x64}, {&(0x7f0000000280)=""/225, 0xe1}, {&(0x7f0000000380)=""/50, 0x32}, {&(0x7f00000003c0)=""/122, 0x7a}], 0x4) socket$inet(0x2, 0x5, 0x10001) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f00000000c0)={0x6, 'geneve0\x00', {0x1f}, 0x8}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x62, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r4 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r4, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x900, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1320.576779][ T27] audit: type=1800 audit(1586575993.544:554): pid=6632 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=740 res=0 03:33:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xa00, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1320.754144][ T6715] FAT-fs (loop2): bogus number of reserved sectors [ 1320.804326][ T6715] FAT-fs (loop2): Can't find a valid FAT filesystem 03:33:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xb00, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1320.859552][ T27] audit: type=1800 audit(1586575993.824:555): pid=6853 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16942 res=0 [ 1320.973563][ T6715] FAT-fs (loop2): bogus number of reserved sectors 03:33:14 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41d9bfd5d3d1a9c79cb41027f063b6c3f84829c3fcc74e5eda26d675fcfb4fec948f340d4200"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) accept4$unix(r4, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1321.031511][ T6715] FAT-fs (loop2): Can't find a valid FAT filesystem 03:33:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xe00, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x94000, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x468000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = open(&(0x7f0000000180)='./file0\x00', 0x80, 0x1d3) fchdir(r2) r3 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) unlink(&(0x7f0000000080)='./file0\x00') r4 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fcntl$setstatus(r4, 0x4, 0x42000) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000240)={&(0x7f00000002c0)="044cd79545bdfe1ef5741ce651420e21ece1525d8bcd099284ee04f0fa7030f182b4ee1c327db45b94e40cec5a31e14ea4dd5de68da5bf1c19e8c02d12db411fbed2162d5482b1b3d1837cca9cab4ef0b57c5b21b06a949fde0cebc34cc7baeefd578e3186f166127f091e946f24497bd399d57d23d4c4ffea7b", &(0x7f0000000380)=""/80, &(0x7f0000000400)="26844abe8c7e232edd04226ce5572ba86ccc42c236a04e833bcdacb72b54d69f09f489e6ba1cccc803c6bd7be9a486edfcd90ee034e1ea09487853fa5226fcaddf5c6d20f20c2fb0a807c9083feaf9d2af72ba6caf9f7e4b58a19a95e121aa2ff4e09dd64a08c4929bfb7ad8bb8bf555a7a1f0c9e6196b569c3c084e5460ca96d68e9cf58b614e9b8940be827eddc2496928815991391983e9be5655c78fa02082a02d3d199774690cd2dbdaf1e76b31961b847e459a4f3ddb52e14e52b5dbe343c6eb89d09474e51b", &(0x7f0000000580)="01da0de3e795663a0135deae4d96de2f0f22056312c532a28f3bdb3826da014652f8021428e15db1e8b4a7365f5ea9a7ac2d0054074aab1e5d3774ef7c8695e61fadae00edf08d6a0599a9a62e3a661080cb27088d83d7ddad54904e4d6e94d56e9b542ac8e01d1cffb22b5f0132ba2cd7f8427667f8271cbfc3ac28dda543078d3bcfdd47f08b77a26c3e579311f094584d76ce306d585fdc0ee2d545ad", 0x0, r3}, 0x38) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x2d, 0x6, 0x0, "a08817bddc0a8b771149df139f2a7d9c", "3d5dec8423c90920470c2a83ff5c62ed14e6d0dde4160a9a"}, 0x2d, 0x3) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) r6 = accept$ax25(0xffffffffffffffff, &(0x7f0000000640)={{0x3, @default}, [@netrom, @null, @rose, @rose, @bcast, @default, @rose, @null]}, &(0x7f00000006c0)=0x48) accept4(r6, &(0x7f0000000700)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, &(0x7f0000000780)=0x80, 0x0) 03:33:14 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x891c, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1321.526930][ T27] audit: type=1800 audit(1586575994.494:556): pid=7172 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=741 res=0 03:33:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xf00, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:14 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00000002c0)="0dfdab614f871d94de074284cead42a0f4bf36ab5e6c16ecc2fde2dea03b019b5c50ef053552ebe85eec6a9a4eb8867d9f1f6de72b76b22fc1f0d51685b25d9a9a93", 0x42, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="00001000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f00000000c0)={0xa20000, 0x9, 0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9f0903, 0x1000, [], @ptr}}) write$P9_RSTATFS(r6, &(0x7f00000001c0)={0x43, 0x9, 0x1, {0x0, 0xffff, 0x9, 0xa8, 0xfffffffffffffffe, 0xffffffff, 0x7, 0x9, 0x400}}, 0x43) 03:33:14 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x62, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket(0x4000000000010, 0x1000000000080002, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x36000082}, 0xc, &(0x7f0000000140)={&(0x7f0000001780)=ANY=[@ANYBLOB="000000000000200000100d28bff033d542cb5ed9b262ff755d2b3add4e1732239c8f6869c36f4e3faa5899756e199a7bdfe7d5c1d34214691fc3085bd2c7808a19c4ec3087875525bb4f6c558fe14ebb30", @ANYRES16=r3, @ANYBLOB="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"/1655], 0x678}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000a00)={0x338, r3, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_IE={0x322, 0x2a, "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"}]}, 0x338}, 0x1, 0x0, 0x0, 0x1}, 0x80) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x7c, r3, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCAN_SUPP_RATES={0x50, 0x7d, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x3d, 0x2, "0207141e9d91ea780b0392d9ea8d1bf3c013e5f8865dec3765712ab819fb5628dbeaba70559b53535e715a4dadee02941870c112d58606ea16"}, @NL80211_BAND_6GHZ={0x9, 0x3, "6b134b7aea"}]}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x4}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x404c041) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r4 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r4, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1321.716890][ T27] audit: type=1800 audit(1586575994.684:557): pid=7178 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=742 res=0 03:33:14 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x262082, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000240)={0x0, 0x0}) r4 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000380)={0x0, 0x70, 0x7f, 0x8, 0x0, 0x4, 0x0, 0x1f, 0x10008, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x13, 0x1, @perf_config_ext={0x24, 0x7fffffff}, 0x3404, 0x6, 0x10000, 0x2, 0x0, 0x9, 0x5}) sendmsg$AUDIT_SET(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x3e9, 0x0, 0x70bd2a, 0x8000, {0x1, 0x0, 0x2, r3, 0xffffffff, 0x20, 0x593, 0x0, 0x9}, ["", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20004804}, 0x805) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1321.899980][ T27] audit: type=1800 audit(1586575994.864:558): pid=7294 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=743 res=0 03:33:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000a40)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x9, &(0x7f0000000940)=[{&(0x7f0000000140)="b441330f038bbbe0d76af29c85dea9f2bcda86e96c4ace4b6d7e0af8e0ce1875bcc1", 0x22, 0x3}, {&(0x7f0000000380)="8d48ad476399cdd0b6918b7f0dbc800c67d6c66855e9a00aa1c89f84893ce3f4de4176df580a5f5868ad74b82792c8f66f98db7439da6a2498513aeaf8a0ec2195d21544e47c7d216fbf533a056d5dd4b2023371dfd2e8ce4c00748b3677029d815b5da1894f30ddfbd296941f0515554a3cdb511c40241d759929a961137d4e0f8c2b5eb59fed103391676481b80cb9f06e664909176ebf7a3773ce4ed570ec6850fbf4ca8d31bf36e0a05cd816537afbc730fd856f71f42169ff4e0d8ede11d65c4d1ac1a8379878f69d7870c676e2b0e27055e5e6fac3442827748c5e722ecb45a1ae7ad7d4a5", 0xe8, 0x3ff}, {&(0x7f00000001c0)="bf783338902d05cbbd1ba9e8026c77e1958cac399edbfcc7a12c15c0dd5d52921e81b6818ba8cea9e1ad111905dd5079a62d0f92ab12260e3096d283cb6bb86757cb18b4df50c9f860538e43e85a1199914baaccb934aa239fe011e2dfe9d8725aed5232878ec88cd57babe7852da1", 0x6f, 0x4}, {&(0x7f0000000480)="fbbfad5ed404755d2d4b4f922d1d9d098f2ef3efd6fad6b188869d487625d71657fcae0cf6d02dca3b3f45fbc315ed57ab1892558480b83abbe82d3d886c036a7549e55bd5c37f2d18ece7b0894bd64a45430cccacc45c72db691ba8296e9cf540c9893255ffc8a8fbe97d806824dd683ad84437266d80189a2e293c60784b0825c9cb661e5ad8e2a7a0a42500b2dd1bc06a0b8d7147a66611ddd970390711ca0ed9655e36af0ce88f5bd82a1a73f10ef6a96994322577e217c34e00a1002451d1d58e44804ac0947239e5a8d240b460535a1d33228e64a3d6aa04dda9c2a79c2a50e1cd9e5c8f55d91c", 0xea, 0x7fff}, {&(0x7f0000000580)="bcf8c27dc876211fa150ec0058455a185488676891947809ed6ca4cc158cc45e32e811e76a3b6fc22feb387df6723da2ab1668c3cd21216111815190fcafa937980496bd4f600d558ae03f930fc76b6bcd5af2dd8cecbe1b9e1c5a55d2b676bd70924dc51daf744a883ad97cb44517daa0ecb2d9b2bd18446dc56a92ba6bd9f33393697d16b78814db360811ed9bcb3fa8b9df793a080995724678e60a835d3d99b5f3cac54bf79c98f08ee39d51a00b6765879b2161d90dd6f5a97806eb77d8b36b", 0xc2, 0xff}, {&(0x7f0000000680)="ab8a87ed47e204f99b5992f934a4e587fae796fafc02d0debcef5fb7da9323a914597e4e76502a7d969a12952337163af0ac67e86b8ab5a1c906376ea93eabb99e3f3d97dbd77cd61fd05b95a2d523db94cf0227082a6e8e44b80a3ba6188017b7f223bc5a31b6b47d9fd1933adae3cb8847eed29131efffc3d466b26d0cde3b863b204e89497be47f95c1bafaa7bc67ce5b9b9ce616b5df207fcf71d5d7ca2745509163d5927508aaf269ff0777a6d8e20be33906b09bc26462385b60bb929d81ea", 0xc2, 0x78}, {&(0x7f00000002c0)="fd84d7f12360bd062e21c4297219352235461ddf4ae25c5368b8125c3421e3b232a826e4c7d829e15e6db72bc2fa768a7d823745929fb9d075aa2eb3336d89063c6d1117c92ae662cb246e4f85113587bb36941c3090", 0x56, 0x6}, {&(0x7f0000000780)="c0638f03dddb4501c5d5c48adce797d1e3a877eb065d3f2804fe86cc46a23ac18958611099c3b29dc895e9a72b0efcf3b83693aa9644d6472d65a4906b88742e22b7f1f0e4785835780a4c41f07dbf1a57534ad571e49d8b67b398cf9f2f8d7e559cf0f82488cf21b17ceae20a820bf9adf6b6e15b4b94bdc014b5b4f06f7e1d71b5f8d85f417c963dd115f095bda35c72e5622b2ef2b023ce544985e41d195e8f85839a6de20c2399", 0xa9, 0x4}, {&(0x7f0000000840)="1094c6ab8864178432272871fc7cb707fe06f43dd46278341c98d211d94a5f2252d158fcbbe2ff607c1e41bbff59690575b88fceea48a1d84d0a93c3a83e97304925111b18a31929b7c6b1a274de4dc9bf193e1d2d7c0d033b147ceefb160e276e0b5b2c9ccd6a299e1775cff1426f33f2458285c2fb06b72ff0765f80b266c8df49450a0485855d274f8230893008974c4b30c74f7bccd12fc360a0923c66301d826ecc8307226d8ff759c3911afa56b46ae96d0d871e8d38cf9c035a55d15784", 0xc1, 0x1}], 0x1, &(0x7f0000000a80)={[{@integrity='integrity'}, {@uid={'uid', 0x3d, r2}}, {@umask={'umask', 0x3d, 0x8000}}, {@resize='resize'}], [{@fowner_eq={'fowner', 0x3d, r3}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsmagic={'fsmagic'}}, {@uid_eq={'uid'}}]}) 03:33:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x1100, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:15 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x62, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x1200, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:15 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="01000200027400f800"/22, 0x16, 0x200}], 0x2, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b404ebff", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000040)) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r4) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:33:15 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000007f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x1}, 0x0, 0x0, 0x0, 0x7}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41d9bfd5d3d1a9c79cb41027f063b6c3f84829c3fcc74e5eda26d675fcfb4fec948f340d4200"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) creat(&(0x7f0000000200)='./file0\x00', 0x174) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000240)={0x93, 0x3ff, 0x1000, 0x5, 0x8, 0x40}) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x1300, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:15 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8933, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1322.748100][ T7836] FAT-fs (loop2): bogus number of reserved sectors 03:33:15 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) pwrite64(r2, &(0x7f00000001c0)="383e9b565f977ab1cb4f5c6f2a650e17518b4244cbb32844fab37e6c01ce4f97d65219ed6392927afa0c05b9abb24fd81f09831bca7f257efa8201de3ddc9a39130dff7182d9ded27768803cc631a7d5ecc816edbee0c6088fcddb6122f72d8a8e4fda68c101e9d6ed5d4a9157feefa20d5490156bc577af18187c0ec83013c63cad6d147bee0233fc7de2d0152b44fee24bf5d83d48dd8611ea08b6620e92d058e81f5904fe019f430b2d2a4b53", 0xae, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) 03:33:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x1400, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1322.852516][ T7836] FAT-fs (loop2): Can't find a valid FAT filesystem 03:33:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x4000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:15 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@int=0x8, 0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r4 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r4, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000200)=0x1, 0x4) 03:33:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x5db1, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:16 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dri/renderD128\x00', 0x60800, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000200)={@bcast, @default, 0x2, 0x56}) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f00000001c0)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x14000, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1323.185507][ T7836] FAT-fs (loop2): bogus number of reserved sectors 03:33:16 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x100, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1323.237122][ T7836] FAT-fs (loop2): Can't find a valid FAT filesystem 03:33:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x6000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:16 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) acct(&(0x7f0000000140)='./file0/file0\x00') sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r4) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:33:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xa000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:16 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb05826f767edc6cb452fe1b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a5993fea6ff94664a4ac945057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f70080c826c170afa1eab8f3f0144b96b9edff19dccd41d9bfd5d3d1a9c79cb41027f063b6c3f84829c3fcc74e5eda26d675fcfb"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x3, &(0x7f00000000c0)=0x7fffffff, 0x4) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1323.756668][ T27] kauditd_printk_skb: 5 callbacks suppressed [ 1323.756684][ T27] audit: type=1800 audit(1586575996.724:564): pid=8293 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=747 res=0 03:33:16 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8934, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xb15d, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1323.908647][ T27] audit: type=1800 audit(1586575996.874:565): pid=8293 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=748 res=0 03:33:17 executing program 0: r0 = socket(0x11, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:17 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r6 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x42000) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000080)={0xc55a, 0x4, 0x4, 0x1, 0x68, {r4, r5/1000+30000}, {0x1, 0x1, 0x6, 0x9, 0xfa, 0x0, "bfafc71c"}, 0x7fff, 0x4, @fd, 0x81, 0x0, r6}) connect$rxrpc(r7, &(0x7f0000000140)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x24) r8 = open(&(0x7f0000000180)='./file0\x00', 0x404800, 0x0) fchdir(r8) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 03:33:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x1000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x2000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1324.326824][ T8678] FAT-fs (loop2): bogus number of reserved sectors [ 1324.335811][ T8678] FAT-fs (loop2): Can't find a valid FAT filesystem 03:33:17 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200, 0x4}, 0x9000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000fffffff7000000000900010068667363000010000800020000bc0000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000002e000704ee00"/20, @ANYRES32=r2, @ANYBLOB="00000000000000000000f1ff0c0001d8510870d00acfa5779754007533320007000000d0455083cf"], 0x30}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg0\x00', r2}) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:17 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000002e000704ee00"/20, @ANYRES32=r4, @ANYBLOB="00000000000000000000f1ff0c0001d8510870d00acfa5779754007533320007000000d0455083cf"], 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=@gettfilter={0x64, 0x2e, 0x400, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, {0x4, 0xfff1}, {0x7, 0x1}, {0x7, 0xb}}, [{0x8, 0xb, 0xc6}, {0x8, 0xb, 0x400}, {0x8, 0xb, 0x7}, {0x8, 0xb, 0x7}, {0x8, 0xb, 0x100}, {0x8, 0xb, 0x8}, {0x8, 0xb, 0x3c}, {0x8, 0xb, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x40010}, 0x20008010) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r5, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r5, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x3000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1324.534573][ T8678] FAT-fs (loop2): bogus number of reserved sectors [ 1324.562654][ T8678] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1324.709151][ T8699] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1324.710182][ T27] audit: type=1800 audit(1586575997.674:566): pid=8692 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=749 res=0 03:33:17 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) semget(0x2, 0x4, 0x1) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8400, 0x2c) syz_open_dev$ptys(0xc, 0x3, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f00000001c0)=0x0) mq_notify(r1, &(0x7f0000000200)={0x0, 0x30, 0x1, @tid=r7}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f00000000c0)={0x0, 0x108000}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1324.819220][ T8699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:33:17 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockname$netrom(r2, &(0x7f00000002c0)={{0x3, @bcast}, [@rose, @bcast, @null, @remote, @default, @null, @null, @bcast]}, &(0x7f0000000040)=0x48) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000380)={0x4, "e4e93bd1dd31bd3a6885efa9dcd1a28e1380b3e7aeb66e53322923ddbf775b43", 0x3, 0x8643a973, 0x4, 0x20000, 0x8}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$sock_ax25_SIOCDELRT(r2, 0x890c, &(0x7f0000000400)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0xff, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r5 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r5) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:33:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x4000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:18 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8935, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1325.012634][ T27] audit: type=1800 audit(1586575997.984:567): pid=8916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=750 res=0 [ 1325.215308][ T27] audit: type=1800 audit(1586575998.124:568): pid=8920 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=751 res=0 03:33:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x5000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1325.394581][ T27] audit: type=1800 audit(1586575998.274:569): pid=9032 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=752 res=0 03:33:18 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8940, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:18 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, 0x0, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, r0, &(0x7f0000001580)=[{&(0x7f00000001c0)="e4c6ac2d982bae9ab3318df86fb98b2dad9b2f4536474cbf6b03497f3f32027bef96fa3aca4b180a49752e9db1941fba67862d8e274f6c1e8461da38ddee8d64c421837ed91fa5a13e93d05138bde7440e801b14d3280fc3989c996d763ee34f591d7f26f79599eacc4d8a1ed330ccba0b46e4ef082fefa518efce11aaef2106bad44ee2b84a9f1c844498f83119321a6d54c5a9861613", 0x97}, {&(0x7f0000000380)="16463327dd3d9bdacb1e43c4aed9ea761f457b1e8fd2b86124287ad7677d3d3a4fadfa44344ab352645b206e16669093b152c494d23a08b1d3af6ecbdb65306dfa8525bde550f43870c85c095e9177be377c48b2a1eb4ecc58ebe4ed46ac2303d709b3d8dbcbf89867f272e47d516666feb53803adbea4c9f5cfb627ae443f0aff4f8670146ea6c0f1951f6a00da06ca2b1989649a8b4d6c8896475caf1d2186b168884ad4ecc7cef7d91afbf3f3b8b0697195669909bc17658d1fe3f9715fe7b104ea204cc8cfe39de510c5884741040a0113677529b83fb363b0e0097d43515d059012b79227bd45a7d5641d080cf6381646e673c83be4835d5f41a3cb9e8ee961bd732f1533726c84f07ca60e16391599575c0178d22e29b21a0c747b11f8e7d8183dcd60f228aebcb1fc5d42d1fefcd2717fb6e1f14323bb386a7fa91a838e89f3b1a88f168e51dec3a7a508bb77ad07d2bd833990d231aa399313221825ce1e9b651e697034e612ac9dda7c80899e8f77d2245609c46d61e0ae98ec948d919bc6c01aa137de63235f256637c7e32f587f5553b13513e23a8aad7b5ac31c1789d5d0c99ab3ed17e8e0c3c95cde6db0549eafd9b3526fb67f7846d91dd5d72d08f0bdfd7ed06844fdb9cd7eaca3ecdf20be764efa63ff29d42c5c85f44a8b834a3316e364bfb37a7eafc9eb53f272ef0f9ab0cd1e19544b6cf64282a26ae72e1604d34a37e9bf635d7d05e3e15f6fdf211fa4b83e964f8640ad00403faab0a78bd73aab5a9652542047b3f740c99b17ba09e4f8d9a7d617b6eca1a175319f0fa6c2928670b63f26dc05d88704edb27cbfa226cb16e3db38d7f4d6ce7ae3d2bde02faffa1f135bf0746fe76cfd99376a493c2a38d6cb955d61e9131b18b7d03799d4ac1cd7a86e208dcff715298045df563099fb22520b8ed2ee3b8b97a4c268551565a547e9a5db3f43e93ff318fa99603c77bb17670bd9fbd62670ec5fb576632d797bd14bba622864f6974084d38c660c9e7ca247c538fb246711bdb7a33c6591d3e4f5bb5495483e2d378bbf76a40daecea131d0484ac1da5ee70cd9a4db78596e9c94ed102e6668e9353a53d358c47c9ddc074e4e4c8240767742c81174ca426c6c88213334970536478143b5b1baf34c64649a4ab5050151303a9227a1a7cdc0771f96ec7ded1b0aa9ae6c6ab6568c355bc255399d851ea8a42592d6143933d23bff89506028549be5e4b4f86b143d3128cc4d3d0d0b81e3637ef680108387098b2afe7a520f5d4755ec16b3a2a9198a8d0d1bcc2a59f84fa02fad0ecfd207d92812b1a3e951799443460e52ca3a12989e351a1a4f15d2560c5718e61834c65ae02c4c4e1e8599b0a3f076fd45ed3551cf8596b81b43d6fde22cce166f53262640b480abe898208a9ed9a1e7fbbbbbe48419089e8e1ff6ba87faa8d7007add7768551fe7302a85a4bac57989f879273222ee04a390a6ac42070a1280dc4982791cac70934b0550be231a2ea83232419067cf874a0861f48b2b920dc7ffe4d1d6b0231815c864ceeca423ad82363b579adf9074e259732f9dac14959b80ba29d76c4481b8961a8b018a049472f834ddec10d14e0f900e2895da8f945b84424fe88bbe1ea15d55be78242c190d3b196880e2320016303eb1ffbd878c2659653c9ffb434d41a82f317f538de129ce72f9d3ef0ceee97bde28480f2718cb32faea0cb8b2910a8fbefc3f54a58f8230555efe31acc1aab00799b4c95ac1ae97199a512878f3b745eb3aec276272ad6c9fec214993bf0f7ed7d3ab22439c093c1021602c6dbfe4ddd20935ada0f541373cf1998fd061f8e30750f591197af0ed25f3a2046da866ccf59c44828cdd9ee6e8e7fe1b6372a88e706d627cdbbd6a0dc305268522241c93478e2c17ea08b2d4adb27307816c62d6a3c3b6f97ec888fa90aaf32fcca0a248c15d64d800e7ee5ffc5806debb93ce3ad79102435215083c3aa04a74320583a7964470161e444516778fb34d2609d4a65fa7efb3b753bab508d9df9f791f7e044b495bad29f1427ce69a9761507deac7c7d8d6a5e664f662024435d2785c4f12cf790d2cc31f84e0702b13d905ef9e1610a260bd4a26a005b85eea292f2613b90e4eefa1df0e6357b0a3275f44441d103e3ada1bd571418074791434fa36a860f86c17f2309567444ea9c09646880ff9b028158dc6870e76fd97d2c5dc1e7f7d7db8f4e60717c0de2277c3289b26c3a9a3f27f7050a24df20d0f27b29c0f5a41affb0c3c1dc2b826c8a88a408ec1b33c89011626bfc1092cb2251bc827699d8c5b477d7b7207c00221c3cde233703148f504656fea80c438e17675b34e4edfd38a95b41c72fa473b7ecb0819fc7d0de49b22700224e5442ae74e3fd7653bd138754b4c1360398af60da3b870135b79f133e9f66f43c471fda6bd07dce308140552c963da3a585d2a40ee55062188ed5d3a64549dc01fa4c72f58b6d2f8a64df4d589c78cd75861b96d38411d2a4657526b0d0c762d0567c8934f9e6bac85ed4d42bd8e67fdfe40b37947692122e4b28789407b3e0bfbc8612f5b6172275118cef6ef7cba1c48b863d4fcc87f8686ce871631814ea7b6aed978749f3b1b526cafe38f1ae2e2fe0fedde2f59ba71ac8d32145b1d4fd827fec94829d4f7ff729e8546beafb61c01f9451e4bb5ec2a1f4da4dd51d897f663f4e6f5c4c83a8a993c26e53986f14d8967ad1fe091d825f7dd4f41ed128fdadd080b41a4512a3e18105472c7395a0bd6b9f2dd5a56c143c71275fc2b45cadbe8331ba101d28511b5a43b4f98c2f65732236d56ac9cc26fb142eb96550db5ef439597cb8a63880ca42f84a2ab7b73e206351c56e2a6dddbcc4dac9cc43c7ee0920e6a934dd8ba3ca84aa29bc6bb35676f814e632ab1eee9964db526186274ccf36142f8ae1ae27d71f68101976c3f5e8fdb388c43346661c667297056adc7e1bc4e70c1bf26f8a59a40dcd605d2615c0b0d5e7ca0d3e3803963aaeabdaaef54237e8366f36354f11a0d859e2b4d4ee4406c4d7208bf1b800e6c4fae5b4c763d2a77f6dcf110920aaa9dca5dd138e0afb641175db8ec63614e42e01965a9d7939a7b74bd47922ee880388c4b4d2930519303d1b3cbe4dfebf155995689eef91c14026c18f9237d2ae0546ebc79a7b7d19cea55de6ee305f542fe9a3fb407ac771b6a05e3cb60ea114e85cd814a727fb0377e1363d3a45f051a88cba612ad9f5826311c6b96b90b19ad05c3f8e8d89cb86b881b0d4cbdeb16b69a7e8c9135fef9d86c280c6a0695f7fd9b9f7e89f39ccd291ea1314db53c6b6bce31e656342d5e02560b9143152d0dafba3db238e384204376bca903dc503efdecabeae27b0066c4d4a1ae1b0c7f696e87a6677825a8ee94d7f8cbcf148538a4a296c51a6a5849ada29ca8d37ae76d98dd623f2b1668bef68d4cf3a5709718d931b3fcde20df965d8fb98bfdf408b6cdfd266f33488cd6a3875aa3170204da76b34de7699d0257505c4cfb88c3e3528a779b58063f0afb155a21b7cde54e9d788531bf95119d1bc683e01aa6a96d9e3168e4d3c6a55436dec98ae575a486e2ee9ec6ba94da4c5db943c0b7b4fee378156ffb92e06db87512180e77c157fcd22b2201ef3db2b385ec862a1ce0d1cea1bbf1e9174e878c311d45c3d4a82d76463ae932f58b3fe2df63c1ea2c95d5c2e19af071dc62c91634941faced3720f1f95b5b5702eeb6c4162ead090981be19f8899f8872a517e26fe81337cc600af516b623aebecaedf29b4fd7cfa7e6b292f62f26a32e325ac8e725e52edfdd3adcadd5c14db9ecf3f7250d664f0c199d163259b608b9cf407deaa4bc0c5a5ee174411977e7e41a239cb05527ee4d066bf41fe7fc517935b78242c49dce54bba344f2bfda25f6a47c7d35720c3712c85feff83a42e203f776c0535cdde198060a0abbe112814a7d9e39efb25286d278a48c071a7be914e4c42cdf618bf68c9c94ead4cdafc68481d98acc787e30079b3f82dd2799df7b96f584506f416498ffe5c610a055319e1efbfea89b22298e35933ec4cb076b7d670bf01a5e7624bed0f4dbdc6a6697848902223d65b18a42a6423a9eff1e533fda8b6e2f9f4abb55c66dd4cf92072c19a7a411bbdc101fa2d3f501f3b256a238b166ba1bbaf1091d5d221dfec5600cf9625fb9ca3e317672f40a478b681274859c71133a9bc91053e869db131e05a0ea35cfa741bf456a2866dd4ae3c9c0df600ac21131874df2bd628ca498c17ec26ce38d012fe46045a2cfa210dccf2119510d0d3b73c3bfffdc826078c929ee3ec123d70d1ee31668de8c0ec0d8b90881b5920974dc760cf69dd47d7f03ba676352b1e61b7c3cad867f4f80e7754c6908ccc48cd59f279936feece9ddfa625859758d34104bd3505b0b426d84f8788528f7447331dd7225079f32bb752d6392c2ff57b368a95d1f2ed9bcb36df14c65f877f24277345673284c9aa31565c1010e91f28e105ab5c9679b27950f90c17c1e7aa134d52e019fe5c7d0493b3bdde44b2d7894461edda51d9ef32003b8ee373d6fc279934deaeb1ead93e604a3e7bf14633c608842e8a4d39211026264b3a7774602183e8f55f711cb325cf30107777ea94dfc5e610957f5d86ff583d4bf65acf4c7ab752714133f22dcab50e59e1dda0644043249da13cb18799892d27f32a70d01a1c2b1daf071c7c00150da4fa0ec9bd92fb9c903645afd09c99d66ff0ce198093429e0190b0141229372a64f7260ad4942c148ac5eabff5edce1173d445c51eb4e886d28b4e862164d29660afad0a6957e63e430f9f78043bfc28fa84ca6a6c38393c93454abca6ea7883ba112ea7a517c0ef0b3877ac48b1c803cffa17da48676de809c1a626681eda5b0e5f21a3d75a0dd70512a2d1b5a0f0e07434861b23868afa5940263ee93cefd6d1e85bbc771e4b7f9fe742dc5f0cd8403c23bffeeeeab90288da4fa9a00e6d1f46cdfc01eea14d31ba0749ae4c03350a557a9b0301008181952127553fb8cf34935cb5e0f548076b4588b86342d2437b8f713a37778573fcd12eb66b48255acb1d7201cdcdca8e381f64518d7a40ae51a9a2f00f65eea604117f622bd8aae625ee5c178c4250a630e405fadd0e3337042c869c36dbb85b58507ab3a2e5fd7a50b057b067f29f86c6b8491937571d725e26e8caf63af095adaf12697ccfdc2c27df70c9f588ddf00d076bbd3fb4b551cd5a4a9dfaf06261c3589ea8567ad6917e39559170ad996c2b2d0f826a5d405e61e360eea5fb1a77d4f9659ca60d6cf3c71990647b866a1120cc4c3db20a201bf49d317fcae09e9190d6c27c0c86806334604d0ccf17cfe0645f2f440212f107693718b596253c042d4bb863c6a2efc6f2d8aa2d728c55726f5be70b16873ff45e180723b2189e8ce609f7639191a31c71f780c76e0d8009a2872e67d78b6e4ba5f584e671ff41b38387908114a34980bec9119d84ef3bc4c6a980ccf92b20d8221c391b53f6f9b31782180828a7c34180f60a26f0772edce9098d3c4b3c6f1a9253dad890720ebaa475bf5585377c1b275825a28889268d25e3f4b24a0959a29c189d8a4a88db6bf1adb78fcf68fbdfc6c47045729f1c86ec89435e9e3438f805427f1ab02586104ea67b95a3cf2fd6cf11806b47fdd148bae488ed90e1f995fe5be40ac0a3cfa6a4761708e4ac72b3c605bbe914e2a18d9cd94e7ec4ce5e94233e8827552685b7fa360555bc10fd5c05c858cc9cf03303194ffe8", 0x1000}, {&(0x7f00000002c0)="3c04b275eb55109174fcbbf7225e4536706d63663c39ac0640e1cdd4cc3c29e79f348a5a77fa648b682927cc6c807e5e88d9263e196d5233c837d9ac13edd27d843e6395424ae9570bd59e7d0d60ca1fa556b7ed22a10ac0e64f8903a8b4afafb4ec1023031ae75fb1bbe17bff87470873a280455a8966b0036d", 0x7a}, {&(0x7f0000001380)="cdfd5e5cdb4da483518673f3a9e9556109ae4ef7f90e83019dcab3f0c4007a8848e029ff00c4d50a7112aea74d7674ce6348bae99b86d02d71d4fbc5cd887cfb2ecc1418dfda7dc869648938ee7cd5df5ad7d0e11657f25d993aea3dcae002356bd99fe400e00a3b6d9774474e63b71a4e99b5", 0x73}, {&(0x7f0000001400)="8cff8c4ee92a0e4f9b87fa2fc7f6f3f66b6feb7a76817fc8edc9497866b7ae9db8bda4bcb1a381c17fd3420146f6ba407a63ea4395204e4ef49595a42f1ae6395a2768776391ae1b1b0c8eb08ed41b4bb2987bc112769df25fe97e1cceecb1c8056d6a10407e01940f2f76d3ca6486d72928432af38e46ee003cc1cfe077d3651c99e3f2e8f9d92dc7f9773e2cc2d2fbcfad797e82e83ce6a99ebe01956a486d677dd24443c05d42f624f4bbbbd018bda038410c65e569e680fc13c514420f60674412e4007c37e64939822a3a640ed8335a3592c0a50d28", 0xd8}, {&(0x7f0000001500)="a58ec68d6235a551fccc5b972dc8f980f071faa39f30960626f0a957a558ff2bfa979c5148e562645e5fe30fe299a1fe92293651f4c93802e5afee157608f6c4ed2c33e70cfc20efc98f022fc856c6", 0x4f}], 0x6, r1) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:33:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x6000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x8000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1325.815340][ T27] audit: type=1800 audit(1586575998.784:570): pid=9357 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=753 res=0 [ 1325.865157][ T27] audit: type=1800 audit(1586575998.824:571): pid=9361 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=754 res=0 03:33:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:19 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) unlink(&(0x7f0000000080)='./file0\x00') 03:33:19 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8941, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:19 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x200, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x101, 0x7, 0x0, 0x0, 0x6}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r5, 0x805}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r5, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x88d1}, 0x10) 03:33:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xa000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:19 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) inotify_init1(0x40800) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x54000000, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r1, 0xd, 0x0) shmat(r1, &(0x7f0000ffd000/0x1000)=nil, 0x7000) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000001, 0x13, r2, 0x4cbc2000) r3 = gettid() tkill(r3, 0x1000000000016) getpgid(r3) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:19 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000000c0)='./file0\x00', 0x32000, 0x42) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x5) 03:33:19 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e21, @loopback}], 0x10) accept4$unix(r4, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) socket(0x11, 0x3, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80, 0x0) sendto$inet(r5, &(0x7f0000000200)="ddac49bb4ac05a13e174795fe20f97e0f7b630ee7d152861e32754eee51bf7551434fe0f7a23b56e20f70e8146f89a4ceeed193b72f569fc52e3738827a8242f17436815e16342837b32a43c9a1a92bb9180ecc7d15be44505982d3813fc5fbcea4c45e85a70a7efb4a4b64cac4697eae1ca849e3a40ba5ccb88e6d84db4c77aba0283ef84", 0x85, 0x4008014, &(0x7f00000002c0)={0x2, 0x4e22, @loopback}, 0x10) 03:33:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xb000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1326.445159][ T27] audit: type=1800 audit(1586575999.414:572): pid=9489 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=755 res=0 03:33:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xe000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xf000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1326.762060][ T27] audit: type=1800 audit(1586575999.724:573): pid=9500 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=756 res=0 03:33:19 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000007c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093d39de815e6393bbacb2f37aa83a502e65cf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41d9bfd5d3d1a9c79cb41027f063b6c3f84829c3fcc74e5eda26d675fcfb4fec948f340d4200"/807], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) waitid(0x1, r2, &(0x7f0000000280), 0x40000000, &(0x7f0000000300)) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:19 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:33:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x10000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:20 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x894c, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:20 executing program 0: r0 = socket(0x2b, 0x4, 0xfffff000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040040", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000000c0)={&(0x7f0000000200)="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", &(0x7f0000000300)=""/186, &(0x7f00000007c0)="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", &(0x7f00000003c0)="44968599081d7aec6148e069f10e99ddc150b249766ac155a5ca05838a99d6171f8f81f1ea22a1b0d2065b615031a64222ff3c50c74c276827a93769bb9beda45899247b12b63ec1798c80295790a6fa2b3bd68bb601aa41005428a6380152ceadfce2a2dd3a61caccc78a6000316b21cd87c67561df2a034a5e9c", 0x8}, 0x38) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x11000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:22 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000380)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c00027400f800"/22, 0x16}], 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1a003, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000004, 0x30, r0, 0x400) fchdir(0xffffffffffffffff) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x6, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) accept$ax25(r1, &(0x7f00000002c0)={{0x3, @bcast}, [@netrom, @netrom, @netrom, @remote, @bcast, @null, @bcast, @null]}, &(0x7f0000000240)=0x48) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r3, 0x4cbc2000) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self\x00', 0x80002, 0x0) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:22 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) mmap$snddsp_status(&(0x7f0000ffc000/0x4000)=nil, 0x1000, 0xa, 0x1010, r1, 0x82000000) unlink(&(0x7f0000000080)='./file0\x00') 03:33:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x12000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:22 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x4000000000010, 0x1000000000080002, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x36000082}, 0xc, &(0x7f0000000140)={&(0x7f0000001780)=ANY=[@ANYBLOB="000000000000200000100d28bff033d542cb5ed9b262ff755d2b3add4e1732239c8f6869c36f4e3faa5899756e199a7bdfe7d541d34214691fc3085bd2c7808a19c4ec3087875525bb4f6c558fe14ebb86", @ANYRES16=r3, @ANYBLOB="00022cbd7000fedbdf25100000004c067f0054837dbc5881b5d214be90312b3f7f0f56dd75a64bee8b9a99ef9a06fdfe5683911b15e099aecc9d9908f915f48d00f7d59c338de0adffa1acdedb0412d428c1ef925291f99e7ccfbe42cc7faf0231d370ac9684ce89a884593bd4074e02200f63c5041f0eb416f70d2738879f35029ace1344e59634ec2d02a59b93a93468ec3daa93c9402ca5f46251651c61f72d37d027627cd9c9bd3541086b2ee05fc039d6685b519e373fd996c08f409875354e64c7f6924e6639933d79b9b06281b1a66aeb1fe5564d34cecc4e4be5e2a248aaecc89a98509906b230c7f52ae97d4b7d7e31ec58524ee61710742d38cfa9653933cdbe8433c8e21e64b4b4f6457dc3351d26e436afaf7a9391a69d05fef2f51e6b4e1116d33fd765c6041a49c20713f449ece3802a01d1e127dba54bdc58a00a45d2a79faf76e6e3a87c213c002fa5aea9ba068d2ee1d3b04db8416cb8013cbec9a5ed4eb51cb646c8b9bf0fcf2f08a7fd0bc203fc71fae53cb6bb43a4264f0e10e344112ee43742ee98ead91dce63fb0a9212df57b3cf097f5411367412fce3a223e80c5f79a9caf0f5a330b3700e9a8e7f5e0eac3c61906c0f36aab0df6d40e193154a59ac5a950cee6f25971cbf0f543ba8df8764d421feff44a13e63cb40f4989dff530e8b4a58d61a779e3efb57820968cb0d8e2a9b18b8f354b033c536cf684eb0cb59b7731b0d37c62beb8c215aa1dbe34f24ba6fcc591d50432a65a4cc4110c7c7eebb647631764de9d75dce06cf1e12fafb1ca50319594bb1141ddea703e3153d6b87f01d64d1fe36098bec363cf84d6598282cab4b5ba1720b7e3f4456d50e2b92bf164cd18305710a59b9e7fff53315a936b55d82eed79041466246d06befca0558ebea4f4f3f5e8473b20ef2870b93d4d7bdb841fbaae12a25c4dec0fb81d14ae7adde661ec639973e20f3502389b83e55adddc51d642045c3a0942dfb2dccee08e13f6e410a1a5d75f20e6a3c9aa4958061e30f0f7e895d21df1d0952a0ecaf9d5cc13401de6f51a8b0d62984ca01f9aa1e5c2e5ef447fd0fe52a24d796410f992583f2d4c5e5547acf709c9346ddc091e0b57a0fb4fa07418e6cb40b21f8f2327ba30541a86bc7f7e21db7d5f743255304ecdf49460288a66103377aafb52e410996460560b2da9ab04e7c67f6e33e8523105ddac660fc55b195d53fc903720d39f373df46b55cca94b92297ee9069967a89c4bc473bb34f770d43df525d3685a8d0b6cf1fa2adf26244894b68f4dc10c369326f7a229911d705f0b3d1c47455a6df294d6c24ad0e0ccc6ff39dcc4fd523d3d77080c266de01db2dc5331156b1e342f686ad18b16e77e808262078ee806522d75b50c3050a5e1d8e6da2330d0241948e849977798f98fde902634bd4be35e444aac49a1497bdf177c3e26044f6bd5b998fee615634b9960a921777d525e37f2f4c69d1d3c3a0658d5ca39b19697068194f30b3fa4ce3cccf7f4b15908f31cfb2908b0041e16e805bb32c794c8d1f117b0ae45fba7bfa1137fcb17e1d7cf2d4effd797bbf1261db3a088951851a687234184992b91aa6f4c03ae4964582d501e22e44bde7d3177d918066f56087a97484e1624b540d9a292160bdf9601a9be53c3ebf3d067ef0994d14379e31d55d28025a9b266ef4b354106ff2161b4964d271e964b8f531147dd6c9ac84cb4508397d0d25de4455b6921d742879e2c1a0ae474e71986700add66c7bd82f6b768bf9f6ae18090500b53f47b43181f3088312df763278de9755d1942823579bf748ee239958a16032fbdd373a63768d40248949a1712ecf983ed4f47f8426e211c08714b0ad4de0e2422ac2af3bc1a56b095d17b7abf1e7fc2b531e7830213e145932c85caf7f8d80e723c82d78c428fbea4d6f7051e26ee2cdf68d83fe6f81e649e2304bbc6cd7d2319848865bffe132d7c8c026da428a9a0cb4c9f0ce5388c38b48647488becbe3eaf1b611d2a4d116eb3b69b0e1ea9cf09ad7b7cd6c0044f7752354e6bb03c8bb977c1f898894da726523553dd7b1b89fc1838aeb3715c55a161b45ceccf5c548d92dbb62fa726fd15eff8a92567d67f01f8aca443621d470b53f2ee0be6871d1b11ae806a6f31979a5d69ae7ad5f4c9be087ea64c5c432f4722cbecb1f5ea35cbf7f620e29a36a4cb92771821a10f7ba229d478046fa14f873a6473397e26574b3583f00d19764e249c3e6ff98e2b12e25817ff9145582c305e074f99edd100049000172140008ac0f000e00000008003500070000006e7789ad8900"/1655], 0x678}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000a00)={0x338, r3, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_IE={0x322, 0x2a, "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"}]}, 0x338}, 0x1, 0x0, 0x0, 0x1}, 0x80) sendmsg$NL80211_CMD_NEW_STATION(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="000425bd7000ff27b0c4fa0000000500740005000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4040015}, 0x4000000) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000002c0)={0x0, 0x80000, r4}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000300)={0x0, r6, 0xfff}) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r7, 0xc0045006, &(0x7f0000000080)) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:22 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8953, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:22 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x2, &(0x7f0000000480)=ANY=[@ANYRESDEC=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280), 0x8, 0x10, &(0x7f0000000000)={0x4, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x78) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) bind$ax25(r0, &(0x7f0000000200)={{0x3, @null, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, &(0x7f00000000c0)={0x0, 0xfffffffa, 0x9, 0x7ff}) setuid(r5) setuid(r5) 03:33:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x13000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:22 executing program 1: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000040)=0x8) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r4, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r4, 0x28, 0x1, &(0x7f0000000100), 0x112) [ 1329.500436][T10076] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1329.510965][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 1329.510983][ T27] audit: type=1800 audit(1586576002.474:577): pid=10069 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=759 res=0 03:33:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x14000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:22 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c2, 0x0) unlink(&(0x7f0000000080)='./file0\x00') [ 1329.625480][T10076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1329.644760][T10084] FAT-fs (loop5): bogus number of reserved sectors [ 1329.656740][ T27] audit: type=1800 audit(1586576002.514:578): pid=10069 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=760 res=0 [ 1329.684197][T10084] FAT-fs (loop5): Can't find a valid FAT filesystem 03:33:22 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) connect$vsock_stream(r8, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x40000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:22 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1329.938102][ T27] audit: type=1800 audit(1586576002.904:579): pid=10400 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=761 res=0 [ 1330.004329][ T27] audit: type=1800 audit(1586576002.964:580): pid=10400 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=762 res=0 03:33:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x60000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:23 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r5 = accept4$x25(r4, &(0x7f00000000c0), &(0x7f0000000140)=0x12, 0xc0000) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r6 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x4, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x42000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="94040001", @ANYRES32=r5, @ANYRES32=r6], &(0x7f0000a8a000)=0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) ioctl$SNDRV_PCM_IOCTL_STATUS32(r4, 0x806c4120, &(0x7f0000000040)) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) [ 1330.082884][ T27] audit: type=1800 audit(1586576003.054:581): pid=10411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=763 res=0 03:33:23 executing program 0: r0 = socket(0x11, 0x3, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000200)="2dd47780837de899abcb3f2ea7d7bccfb577df1579c49d3a2f04b32c77b5f5942427dcadf172dc5be5b7791ad294df53587b6dcf38a20f5707043c1d2997e54f36bc75a844053d5fc912ccb77761de2f4d74eef1345c83be6fd6617416915fe0cfa2aa2617b1368b9d14ec99b3947a2873a4d3151faeeba7b53d3733d21f4d4af82944c1daa1bdb94c994195", 0x8c, 0x40004021, &(0x7f00000002c0)=@ethernet={0x306}, 0x80) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x86, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:23 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x10000, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000140)={0x101, 0x80000000, 0xa0b73a1e6b678ec6, 0x10001, 0x6, [{0x400, 0x4ad, 0x2, [], 0x409}, {0xf25a, 0x9, 0x3, [], 0x3100}, {0x7, 0x1a577812, 0x332, [], 0x888}, {0x7, 0x80000000, 0x200, [], 0x400}, {0x7fffffff, 0x4, 0x0, [], 0x1}, {0x47, 0x8, 0x6, [], 0x1000}]}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:23 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8955, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:23 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40402, 0x20) fchdir(r0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:33:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x9effffff, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:23 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040)=0xcf, 0x8) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={r3}, 0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={r3, 0x6, 0x9, 0x5, 0x80000001, 0x2}, 0x14) fcntl$setstatus(r2, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80000000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e23, 0xfffffffe, @loopback, 0x956}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @multicast2}], 0x5c) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="b4ba3d128e5b0be7643dbffc37338bfa6c9cc5ba2407d45cab93e17c5d805c704309156bb1b750963960eb3be36368a8eb08941bf9386ec18f6d2cc4191e98b55168f46a0b84b92196109978abaad1ec83f39ff930c550f5316eea2600af30200886afa4cf52594f87e2ebc79c407315f1ed94c2841cad31db1ecaaaae61b937a65e1ecae44f9b5e0c911c5cd9190ead8263fd15e2ec8ea0bc362df20250cd492251559f31bef168a8", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x6, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) write$FUSE_LSEEK(r6, &(0x7f0000000080)={0x18, 0x0, 0x4}, 0x18) 03:33:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xa0000000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:23 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x62, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x20}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xe}, 0x10}, 0x78) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xb15d0000, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:24 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)=ANY=[], &(0x7f0000a8a000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e21}]}, 0x1c}}, 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x24}, 0x1, 0x0, 0x0, 0x15810}, 0x80) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r4, 0x805}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, r4, 0x4, 0x70bd29, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x726f}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x5}, 0x20000000) 03:33:24 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x200, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000240)={@fixed={[], 0x10}, 0xb60}) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="010000004b39522a6aa83d7183ff61ec9aefd8d6523f149aeca0c1daafc3c88dda6d7c9318d92ec6129bc45fa96598de5ba1c109f4f5fb919344f1807b752eb3eaf58210c74fd57f1c9afc6896e3903b3309373173371ce989f8518875f437990630957985ec41e07a6c13cbf11b2192f6d09bea480465ea4681fb209c3daeb5276ce1b0ccf9df391f7f9ec283407cdc032f9e5f38f7ceae77d1f86de963abd1ea70ece785fd3bea4f4017a9977ce94b860976f3aa1ff347fbccf91d5e7d59c846440482999796", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300), 0x8) tkill(0x0, 0x1000000000016) sched_setparam(0x0, &(0x7f00000002c0)=0x1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r5, 0x4}, &(0x7f00000001c0)=0x8) 03:33:24 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xf0ffffff, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1331.307159][ T27] audit: type=1800 audit(1586576004.274:582): pid=10964 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17007 res=0 03:33:24 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x20, 0x480) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) [ 1331.516342][ T27] audit: type=1800 audit(1586576004.484:583): pid=10954 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17074 res=0 03:33:24 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8974, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xfcffffff, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:24 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000080)=0x1) write(r2, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) readv(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/65, 0x57}], 0x1) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000040)) 03:33:24 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000006140fffdbdf25080001000000000008000100000000000800010000000000b990d07b5a02725e45e4e981663b4e9206fdf074d93b0f3ae0b567ebc91ce3a363198d1068e77166611d9c05ce81f01bf860be2cca81f7ea43adabd3492b383858c700a366af3d832b"], 0x28}, 0x1, 0x0, 0x0, 0x24000025}, 0x4000080) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000380)={0xfffff001, 0xe9, 0x4, {0x1, @vbi={0x3, 0x9, 0x7fffffff, 0x3436324d, [0x1, 0x22], [0x8, 0x3ff], 0x3}}, 0xa9a4}) r6 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r6, 0x8905, &(0x7f00000000c0)) unlink(&(0x7f0000000080)='./file0\x00') 03:33:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xffffff7f, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:24 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000080)=0x6e, 0x80000) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:24 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000140)=0x2) sendmsg$IPVS_CMD_GET_DEST(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)={0x14, r5, 0xf01}, 0x14}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4008001}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x94, r5, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfffffff8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x295}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfd}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa85}]}, 0x94}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000080) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2710}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:24 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, [@netrom, @bcast, @netrom, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @netrom, @null]}, 0x48) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x23, &(0x7f00000004c0)={r5}, 0x8) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000002c0)={0x0, {0x2, 0x4e24, @remote}, {0x2, 0x4e24, @loopback}, {0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='team_slave_0\x00', 0x101, 0x101, 0x3}) bind$pptp(r0, &(0x7f0000000240)={0x18, 0x2, {0x1, @loopback}}, 0x1e) unlink(&(0x7f0000000200)='./file0\x00') clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) nanosleep(&(0x7f00000000c0)={r6, r7+10000000}, &(0x7f00000001c0)) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xffffff9e, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1331.987061][ T27] audit: type=1800 audit(1586576004.954:584): pid=11297 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16996 res=0 03:33:25 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = creat(&(0x7f0000000040)='./file0\x00', 0x80) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x0, @hyper}, 0x10) [ 1332.125514][T11524] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1332.139115][ T27] audit: type=1800 audit(1586576005.104:585): pid=11297 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16902 res=0 [ 1332.216755][T11524] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:33:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xfffffff0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:25 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0x110, r1, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x38, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fffffff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfe36}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2e, 0x8}}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x3ff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xf18}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xce54}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0x1) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') [ 1332.608416][ T27] audit: type=1800 audit(1586576005.574:586): pid=11647 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=764 res=0 03:33:25 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8980, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0xfffffffc, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:25 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="b4040000df457bad5b836d5b5f75ecc9f3fa1e8f3a6e3b199faad3af39b8b5ed53279b1a5803000000c9971b3be59ce362033f8fe6c82a7effb9be213eb9775b93b520", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e20, 0xd3, @remote, 0x1ff}}, 0x2, 0x89, 0x0, 0x49dc, 0x2}, &(0x7f0000000480)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x8) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(r6, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x36000082}, 0xc, &(0x7f0000000140)={&(0x7f0000001780)=ANY=[@ANYBLOB="000000000000200000100d28bff033d542cb5ed9b262ff755d2b3add4e1732239c8f6869c36f4e3faa5899756e199a7bdfe7d5c1d34214691fc3085bd2c7808a19c4ec3087875525bb4f6c558fe14ebb30", @ANYRES16=r7, @ANYBLOB="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"/1655], 0x678}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000a00)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="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"], 0x338}, 0x1, 0x0, 0x0, 0x1}, 0x80) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='i:\x00_', @ANYRES16=r7, @ANYBLOB="100029bd7000ffdbdf251a00000008000100ffffffff050092000000000008000100ffffffff060021006200000008009a00000000000400cc0008009a0002000000"], 0x3}, 0x1, 0x0, 0x0, 0x4040001}, 0x80) sendmsg$NFNL_MSG_CTHELPER_DEL(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x58, 0x2, 0x9, 0x201, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFCTH_STATUS={0x8}, @NFCTH_TUPLE={0x2c, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x7}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x17}]}, 0x58}, 0x1, 0x0, 0x0, 0x5}, 0x8) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:25 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r0, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6, &(0x7f000059aff8)={r1}, &(0x7f000034f000)=0x2059b000) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000003c0)={&(0x7f0000000380)=[0x2, 0x1f, 0xa5c, 0xffffffff, 0x2], 0x5, 0xe36, 0x200, 0x8, 0x4, 0x6, 0x7, {0x200, 0xffc1, 0x4f36, 0xe6ee, 0x3, 0x1, 0x9, 0x8, 0xfc54, 0x3f, 0x5, 0xef2, 0x10001, 0x5, "d02283f3df897504232f17555b963743748710747f57f6783286c556337e15bd"}}) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r3 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r3, 0x4cbc2000) r4 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x101000) ioctl$DRM_IOCTL_MODE_GETGAMMA(r4, 0xc02064a4, &(0x7f0000000300)={0x0, 0x1, &(0x7f00000000c0)=[0x857d], &(0x7f0000000240)=[0x0, 0xf625, 0x1f], &(0x7f00000002c0)=[0xa52, 0xd66c, 0x81, 0x8, 0x6, 0x200]}) unlink(&(0x7f0000000080)='./file0\x00') bind$netrom(r2, &(0x7f00000001c0)={{0x3, @null, 0x4}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:25 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0/file0\x00', 0xe800, 0x0, &(0x7f0000000180), 0x4000, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r1}, &(0x7f000034f000)=0x2059b000) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0x9}}, 0x18) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r3, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r3, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000000440), 0x4) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r2, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) listen(r2, 0x6) 03:33:26 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x3}, 0x0, 0x1, 0x0, 0x7}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) ioctl$DRM_IOCTL_MODE_GETPROPERTY(0xffffffffffffffff, 0xc04064aa, &(0x7f0000000280)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[{}], 0x80000000, 0x0, [], 0xa, 0x1}) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) clock_gettime(0x6, &(0x7f00000002c0)) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0xf, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:26 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) connect$llc(r2, &(0x7f0000000080)={0x1a, 0xfd6e, 0x0, 0x1, 0x7, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0xf0, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:26 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x2, 0xb8c, 0x6, 0x40, 0x6, 0x2, 0x7c7, 0x4], 0x8, 0x3, 0x0, 0x7, 0x6632, 0x86a, 0x1, {0xde48, 0x401, 0x8000, 0x9784, 0x8000, 0x2, 0x3, 0x949, 0x2, 0x3, 0x7fff, 0xfffe, 0x8, 0x4, "853d9b92269a92b1be941e0196b8881bd5601bb18fa27d55d773db7e4aad18c2"}}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:26 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x400000, 0x1a0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:33:26 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x460, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000000c0)={r5}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0xdf, 0xa, 0x200, 0x1, 0x80, 0x3ff, 0x4, r5}, &(0x7f0000000200)=0x20) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:26 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8981, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:26 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)="d3", 0x1, 0x840, &(0x7f0000618000)={0x2, 0x4e22, @local}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$EVIOCGRAB(r4, 0x40044590, &(0x7f0000000040)=0xffffc3ad) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:26 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast2, @in=@dev}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f00000001c0)) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') remap_file_pages(&(0x7f0000ff8000/0x7000)=nil, 0x7000, 0x2, 0x6, 0x80000) 03:33:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x103, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:26 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) r1 = socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="48000000100005070000000000000000000000008a7928219864131651f1cde74a4ccd4fb286615b9511ead05fed3a6fad9cda3126cc9310790bc443e31ed8200100000000000000198a895a751ce21823f6", @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="0000009e0f0bb4df2eae836b2b3ada81b2f43c00ffffffff0000000009fc000068667363000000000800020000000000de228a43b8a1550f0bd4de756e953cbeb9779946d6"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x14, 0x2, [@TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_MASK={0x6, 0x2, 0x5}]}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="304057002e000704ee00"/20, @ANYRES32=r3, @ANYBLOB="00000000000000000000f1ff0c0001d8510870d00acfa5779754007533320007000000d0455083cf"], 0x30}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000000c0)={'wg0\x00', r3}) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x34832, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x51526, 0x0, 0x0, 0x9, 0xfff, 0x0, 0x1f}, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'syz_tun\x00', 0x1}) 03:33:26 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x10010, r2, 0x4cb46000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1333.948960][T12434] netlink: 19 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1334.098903][T12440] mmap: syz-executor.2 (12440) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 03:33:27 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41d9bfd5d3d1a9c79cb41027f063b6c3f84829c3fcc74e5eda26d675fcfb4fec948f340d4200"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:27 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r3, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r5, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="020000000100000000000000040003000000000008000100", @ANYRES32=r2, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r6, @ANYBLOB="1000070000000000200000000000000d"], 0x3c, 0x0) setfsgid(r4) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:27 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40000000000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x15c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:27 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xd) ioctl$TCXONC(r1, 0x540b, 0x2) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:33:27 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000100), 0x112) socket$nl_generic(0x10, 0x3, 0x10) 03:33:27 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x5, 0x7) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x101000, 0x2) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x2c0, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:27 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="9473ee24331f1a37dcb9ea8f50dc0523c2a8f69963d35094e486b3e5eac7d1f56fef92cf545343d689e489c2f1d9885af1fc7ae6970ca7453d476ca2e0aa97f4ac1783d13cfbcd9d816469de681cad4e2ddc9f955fd6fe270279cd0bc49990af2df99b3d4523679acba142a3dc562dd36550aa81c26ceec64b6f040b81ad8104aee42ec7a2ae4bcb8cde4255f206c767aa39779ccdf3027873e0232c49d8ad782c9b270ad8b4048a2b", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040)={0x1, 0xc1}, 0x2) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:27 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$DRM_IOCTL_SWITCH_CTX(r4, 0x40086424, &(0x7f0000000040)={0x0, 0x2}) 03:33:27 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8982, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:27 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000006140fffdbdf25080001000000000008000100000000000800010000000000b990d07b5a02725e45e4e981663b4e9206fdf074d93b0f3ae0b567ebc91ce3a363198d1068e77166611d9c05ce81f01bf860be2cca81f7ea43adabd3492b383858c700a366af3d832b"], 0x28}, 0x1, 0x0, 0x0, 0x24000025}, 0x4000080) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000380)={0xfffff001, 0xe9, 0x4, {0x1, @vbi={0x3, 0x9, 0x7fffffff, 0x3436324d, [0x1, 0x22], [0x8, 0x3ff], 0x3}}, 0xa9a4}) r6 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r6, 0x8905, &(0x7f00000000c0)) unlink(&(0x7f0000000080)='./file0\x00') [ 1335.000209][ T27] kauditd_printk_skb: 9 callbacks suppressed [ 1335.000228][ T27] audit: type=1800 audit(1586576007.964:596): pid=13016 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=772 res=0 03:33:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0xec0, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:28 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @ioapic={0x5000, 0x9, 0x86, 0x6c, 0x0, [{0x7f, 0x1, 0x3f}, {0x4, 0x87, 0x0, [], 0x8}, {0x3, 0x1, 0x1f, [], 0x1}, {0x3f, 0x7f, 0x7f, [], 0x1f}, {0x7f, 0x7, 0x4, [], 0x3}, {0x1f, 0x2, 0x9, [], 0x40}, {0x51, 0x1, 0x20, [], 0x4}, {0x5, 0xb8, 0xfe, [], 0xe6}, {0x1f, 0x9, 0x6, [], 0x59}, {0x0, 0xc6, 0x7, [], 0xc0}, {0x3, 0x0, 0x8}, {0x0, 0x4, 0x60, [], 0x3}, {0x0, 0x8, 0x0, [], 0x1f}, {0xb1, 0x3f, 0x5, [], 0x6b}, {0x0, 0x40, 0x7, [], 0x6}, {0x0, 0x1, 0x2, [], 0xc}, {0xeb, 0x0, 0x5, [], 0x80}, {0x40, 0x0, 0x0, [], 0x3f}, {0x5, 0x0, 0x2, [], 0x3f}, {0x3f, 0x6, 0x2}, {0x18, 0x6, 0x54}, {0x5, 0x5, 0x3, [], 0x9f}, {0x1, 0x20, 0x1, [], 0x7f}, {0x2, 0x7, 0x98}]}}) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) accept$alg(r3, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r5, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r5, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x33fe0, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:28 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:28 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1335.321790][ T27] audit: type=1800 audit(1586576008.284:597): pid=13029 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16676 res=0 03:33:28 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000006140fffdbdf25080001000000000008000100000000000800010000000000b990d07b5a02725e45e4e981663b4e9206fdf074d93b0f3ae0b567ebc91ce3a363198d1068e77166611d9c05ce81f01bf860be2cca81f7ea43adabd3492b383858c700a366af3d832b"], 0x28}, 0x1, 0x0, 0x0, 0x24000025}, 0x4000080) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000380)={0xfffff001, 0xe9, 0x4, {0x1, @vbi={0x3, 0x9, 0x7fffffff, 0x3436324d, [0x1, 0x22], [0x8, 0x3ff], 0x3}}, 0xa9a4}) r6 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r6, 0x8905, &(0x7f00000000c0)) unlink(&(0x7f0000000080)='./file0\x00') 03:33:28 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @rand_addr=0x2}, 0x10) sendto$inet(r2, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f0000000040)={0x7, 'lo\x00', {0xaf}, 0x8}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) [ 1335.525929][ T27] audit: type=1800 audit(1586576008.494:598): pid=13262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=773 res=0 03:33:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x2000090c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:28 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, 0x1406, 0x300, 0x70bd2d, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x2}, 0x10) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x441a5909}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x7ffff000, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1335.895751][ T27] audit: type=1800 audit(1586576008.864:599): pid=13493 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=774 res=0 [ 1336.033561][ T27] audit: type=1800 audit(1586576008.914:600): pid=13433 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16993 res=0 03:33:29 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8983, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:29 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r2 = gettid() tkill(r2, 0x1000000000016) setpriority(0x1, r2, 0x3) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:29 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000180), 0x8) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=0x2, 0x4) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x2, 'macvlan1\x00', {0x6}, 0x3}) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000000c0)={r5}, 0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={r5, 0xab9, 0x30, 0x8, 0x1}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000140)={r6, 0x2}, 0x8) 03:33:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0xfffffdef, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:29 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000006140fffdbdf25080001000000000008000100000000000800010000000000b990d07b5a02725e45e4e981663b4e9206fdf074d93b0f3ae0b567ebc91ce3a363198d1068e77166611d9c05ce81f01bf860be2cca81f7ea43adabd3492b383858c700a366af3d832b"], 0x28}, 0x1, 0x0, 0x0, 0x24000025}, 0x4000080) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000380)={0xfffff001, 0xe9, 0x4, {0x1, @vbi={0x3, 0x9, 0x7fffffff, 0x3436324d, [0x1, 0x22], [0x8, 0x3ff], 0x3}}, 0xa9a4}) r6 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r6, 0x8905, &(0x7f00000000c0)) unlink(&(0x7f0000000080)='./file0\x00') 03:33:29 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$VHOST_RESET_OWNER(r4, 0xaf02, 0x0) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x2, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:29 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) accept4$inet6(r3, &(0x7f00000000c0), &(0x7f0000000200)=0x1c, 0x800) [ 1336.339974][ T27] audit: type=1800 audit(1586576009.304:601): pid=13749 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16543 res=0 03:33:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x3, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:29 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB='4\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r5, @ANYBLOB="0000000200000000000000835f0ee7288f00000079677f9269cde52c"], 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000002e000704ee00"/20, @ANYRES32=r5, @ANYBLOB="00000000000000000000f1ff0c0001d8510870d00acfa5779754007533320007000000d0455083cf"], 0x30}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0xf5, r5, 0x1, 0x82, 0x6, @random="6654f9ea38b6"}, 0x14) ioctl(r1, 0x890f, &(0x7f0000000040)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r0) 03:33:29 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x0, 0x7, 0x201, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000014}, 0x24000044) r3 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) write$capi20_data(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="10000000ff83e4001f00000000000000c3004f7ae529ad0cdd86e1ec019535c211f9e80752f65d8b975d58f87fb19aeab57221483967c45d82afc6e8c48a3d28490000010000000000e90b33f739521a4cf04686c4a12ecadecc18843465893d6cfeaac4454cba2da1f9b2dacde1cd919ddb0df4ef9a98e69177cbecc2b17d96df55c7f6d1bbe612c60fdca4b0aba06abbb0caea6de7e3025d22c37750226e1554de177b165abd36c79cd3e9e639a764d88661a717e679f586531f95fba4ec642911f7c065e70000000000000000"], 0xd5) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r3, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:29 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000006140fffdbdf25080001000000000008000100000000000800010000000000b990d07b5a02725e45e4e981663b4e9206fdf074d93b0f3ae0b567ebc91ce3a363198d1068e77166611d9c05ce81f01bf860be2cca81f7ea43adabd3492b383858c700a366af3d832b"], 0x28}, 0x1, 0x0, 0x0, 0x24000025}, 0x4000080) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000380)={0xfffff001, 0xe9, 0x4, {0x1, @vbi={0x3, 0x9, 0x7fffffff, 0x3436324d, [0x1, 0x22], [0x8, 0x3ff], 0x3}}, 0xa9a4}) r6 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r6, 0x8905, &(0x7f00000000c0)) [ 1337.030726][ T27] audit: type=1800 audit(1586576009.994:602): pid=14160 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16983 res=0 03:33:30 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x89a0, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:30 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x8, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:30 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) setsockopt$inet6_dccp_buf(r1, 0x21, 0x89, &(0x7f00000001c0)="39396781b99b22b64e20218b886de9ad860fa24ef1ea14e613ccdcbe5d856965328b70fc8db1796806d7025f9ad6134209fdf744ac98d0ba8034a1541f17bd34bbe05a1bcfa362f44a7566cb5377553b2267c7523ca7c8e0797c495edc8eb8c45dc49749d20d7957c50f0ccc5e35b4c8e4a7d587366622e6ae15d3a18d517cc0f0", 0x81) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x5) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:30 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000006140fffdbdf25080001000000000008000100000000000800010000000000b990d07b5a02725e45e4e981663b4e9206fdf074d93b0f3ae0b567ebc91ce3a363198d1068e77166611d9c05ce81f01bf860be2cca81f7ea43adabd3492b383858c700a366af3d832b"], 0x28}, 0x1, 0x0, 0x0, 0x24000025}, 0x4000080) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000380)={0xfffff001, 0xe9, 0x4, {0x1, @vbi={0x3, 0x9, 0x7fffffff, 0x3436324d, [0x1, 0x22], [0x8, 0x3ff], 0x3}}, 0xa9a4}) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) 03:33:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x9, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:30 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0x58) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB='(\x00\x00 ', @ANYRES16=0x0, @ANYBLOB="2c0328bd7000fbdbdf252000000008000300", @ANYRES32=r3, @ANYBLOB="0c0099000400000003000000"], 0x28}, 0x1, 0x0, 0x0, 0x884}, 0x8000) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="71d481cbdd1cb201000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000000c0)={r5}, 0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r5, 0x4, 0x101, 0xff, 0x4, 0x7fff}, &(0x7f0000000080)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0xa, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:30 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f0000000200)={0x5, @raw_data="48dd7253506726d05a7447949cdbe35551df9d6e0109295d1372da65523aee59ce3cfb31b87c259f0a2223e749b1906b29a993f5a12be0c19e09d588905f98e1f6010a9aef4f7cbac442d5be18f285834b848e2d48e35ceab3a6648e77f88770584259382fec24886540e2ada61010cb18f5016928239dfe3982e8326089c22585b0e9f92e7f694bbf180c89e07efb75d5c987caaf14df40e4dce2867175399f00c8dfa2a9f86e8ffcb008c05ff9351ebad67addcae08539ddfdc658cce0741727605e5a1f2581d5"}) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="b40486c9b4fa97862f3e0000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x6, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) sendto$unix(r5, &(0x7f0000000040)="4afa70d387ca2f3678f8589fdc2829b0b1d250fcadc041f35a1e81", 0x1b, 0x800, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e24}, 0x6e) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:30 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1337.635211][ T27] audit: type=1800 audit(1586576010.604:603): pid=14381 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17409 res=0 03:33:30 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, &(0x7f0000000380)={{0x2, 0x3, 0x3, 0x3}, 0xb828, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x400, 0x4e, 0x4, 0x8}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0xf, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1337.971065][ T27] audit: type=1800 audit(1586576010.934:604): pid=14617 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=775 res=0 03:33:31 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) socket$netlink(0x10, 0x3, 0xa) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl(r1, 0x1, &(0x7f00000001c0)="080db5055f0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r3 = socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040), &(0x7f0000000080)=0x10) keyctl$search(0xa, r2, 0x0, 0x0, 0x0) keyctl$revoke(0x3, r2) 03:33:31 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000006140fffdbdf25080001000000000008000100000000000800010000000000b990d07b5a02725e45e4e981663b4e9206fdf074d93b0f3ae0b567ebc91ce3a363198d1068e77166611d9c05ce81f01bf860be2cca81f7ea43adabd3492b383858c700a366af3d832b"], 0x28}, 0x1, 0x0, 0x0, 0x24000025}, 0x4000080) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000380)={0xfffff001, 0xe9, 0x4, {0x1, @vbi={0x3, 0x9, 0x7fffffff, 0x3436324d, [0x1, 0x22], [0x8, 0x3ff], 0x3}}, 0xa9a4}) 03:33:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x11, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:31 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54914e8dc30000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41d9bfd5d3d1a9c79cb41027f063b6c3f84829c3fcc74e5eda26d675fcfb4fec948f340d4200"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f00000000c0)) 03:33:31 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x89a1, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:31 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, r3, 0xb03, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x88, r3, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x3c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8a}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x400c800}, 0x4010000) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r2, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x200, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1338.476476][T14933] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.4'. 03:33:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x18, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1338.582194][T14972] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1338.597946][T14972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:33:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x1a, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1338.723408][T15155] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.4'. 03:33:31 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000000)='./file0/file0\x00', 0x400000e802, 0x1, &(0x7f0000000180)=[{&(0x7f0000000040)="eb619540f8ba5bb0ab2f027400f8", 0xe, 0x1}], 0x130000, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:31 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000006140fffdbdf25080001000000000008000100000000000800010000000000b990d07b5a02725e45e4e981663b4e9206fdf074d93b0f3ae0b567ebc91ce3a363198d1068e77166611d9c05ce81f01bf860be2cca81f7ea43adabd3492b383858c700a366af3d832b"], 0x28}, 0x1, 0x0, 0x0, 0x24000025}, 0x4000080) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) 03:33:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x1c, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1339.071893][T15169] netlink: 312 bytes leftover after parsing attributes in process `syz-executor.4'. 03:33:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x1e, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:32 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x3, 0xffffffff) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x20, 0x140e, 0x4, 0x70bd2c, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x24000051) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:32 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0x3, 0x8) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="9d040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) r6 = socket$netlink(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, r7, 0xb03, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NET_SET(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xb00}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0xb8, r7, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MEDIA={0x60, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf52}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x40}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa68}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4000000}, 0x8010) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000180), &(0x7f00000002c0)=0x4) 03:33:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x26, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1339.338367][T15279] netlink: 268 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1339.483883][T15587] netlink: 316 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1339.576068][ T27] audit: type=1800 audit(1586576012.544:605): pid=15585 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=776 res=0 03:33:32 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000840)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa011f000000d5a77d2f4f9220f79dc917755e66e953900ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdcee5bb6688ae353e7feadddbd6789c1f97badd02fd1e55f04602a057d7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41d9bfd5d3d1a9c79cb41027f06343a75c15d9d030f8e9b6c3f84829c3fcc74e5eda26d675fcfb4fec948f340d42000000000000000000000000000000000000000000000000d75576c6a056d2ee46f83aefa93938c1a1d444c5592189c22422b9834c61498a2cb3e0918afb25c5c69a9b7bd7c9288b598c59971429ccaf3112e7fe603b2aad335b6331225049f78c61ce0c6caa0bde1303cee353bf8e390651768b167c9498bbf3cc3b2236454a5566be1be8e104ed7d33da86ece4d03b5bed5c79f59be9086800"/898], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, @any, 0xa1}, 0xa) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:32 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000006140fffdbdf25080001000000000008000100000000000800010000000000b990d07b5a02725e45e4e981663b4e9206fdf074d93b0f3ae0b567ebc91ce3a363198d1068e77166611d9c05ce81f01bf860be2cca81f7ea43adabd3492b383858c700a366af3d832b"], 0x28}, 0x1, 0x0, 0x0, 0x24000025}, 0x4000080) 03:33:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x13c, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:32 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") clock_gettime(0x0, &(0x7f0000002040)={0x0, 0x0}) futex$FUTEX_WAIT_MULTIPLE(&(0x7f0000001a40)=[{&(0x7f0000000200)=0x2, 0x2}, {&(0x7f0000000240), 0x1}, {&(0x7f0000000280)=0x1, 0x2}, {&(0x7f00000002c0), 0x1}, {&(0x7f0000000300)=0x2, 0x2}, {&(0x7f0000000340)}, {&(0x7f0000000380)=0x1}, {&(0x7f00000003c0), 0x2}, {&(0x7f0000000400)=0x1, 0x1}, {&(0x7f0000000480), 0x1}, {&(0x7f00000004c0)=0x1}, {&(0x7f0000000500)=0x1, 0xfffffffe}, {&(0x7f0000000540), 0x2}, {&(0x7f0000000580), 0x2}, {&(0x7f00000005c0)}, {&(0x7f0000000600), 0x1}, {&(0x7f0000000640)}, {&(0x7f0000000680), 0x1}, {&(0x7f00000006c0)=0x1, 0x2}, {&(0x7f0000000700)=0x2, 0x2}, {&(0x7f0000000740)=0x1, 0x2}, {&(0x7f0000000780)=0x1}, {&(0x7f00000007c0)=0x2, 0x1}, {&(0x7f0000000800)=0x1}, {&(0x7f0000000840)=0x2}, {&(0x7f0000000880)=0x1}, {&(0x7f00000008c0)=0x1, 0x1}, {&(0x7f0000000900)=0x1, 0x1}, {&(0x7f0000000940)=0x2, 0x1}, {&(0x7f0000000980)=0x2, 0x2}, {&(0x7f00000009c0)=0x1}, {&(0x7f0000000a00)=0x1, 0x2}, {&(0x7f0000000a40)=0x1, 0x2}, {&(0x7f0000000a80), 0x2}, {&(0x7f0000000ac0), 0x5}, {&(0x7f0000000b00)=0x2}, {&(0x7f0000000b40)=0x2}, {&(0x7f0000000b80)=0x1}, {&(0x7f0000000bc0), 0x1}, {&(0x7f0000000c00)=0x1}, {&(0x7f0000000c40)}, {&(0x7f0000000c80), 0x1}, {&(0x7f0000000cc0)=0x1, 0x1}, {&(0x7f0000000d00)=0x2, 0x1}, {&(0x7f0000000d40)=0x1}, {&(0x7f0000000d80)=0x2, 0x1}, {&(0x7f0000000dc0)=0x2}, {&(0x7f0000000e00)=0x1}, {&(0x7f0000000e40)=0x1}, {&(0x7f0000000e80)=0x1, 0x2}, {&(0x7f0000000ec0)=0x2, 0x2}, {&(0x7f0000000f00)=0x2}, {&(0x7f0000000f40)=0x2, 0x2}, {&(0x7f0000000f80)}, {&(0x7f0000000fc0)=0x2, 0x1}, {&(0x7f0000001000), 0x2}, {&(0x7f0000001040), 0x1}, {&(0x7f0000001080)=0x1, 0x1}, {&(0x7f00000010c0)=0x2, 0x1}, {&(0x7f0000001100), 0x1}, {&(0x7f0000001140), 0x1}, {&(0x7f0000001180)=0x2}, {&(0x7f00000011c0)=0x2, 0x2}, {&(0x7f0000001200)}, {&(0x7f0000001240), 0x2}, {&(0x7f0000001280), 0x2}, {&(0x7f00000012c0)=0x2, 0x2}, {&(0x7f0000001300)=0x2, 0x1}, {&(0x7f0000001340), 0x2}, {&(0x7f0000001380), 0x1}, {&(0x7f00000013c0)=0x2, 0x2}, {&(0x7f0000001400)}, {&(0x7f0000001440)=0x1, 0x2}, {&(0x7f0000001480), 0x1}, {&(0x7f00000014c0)=0x1, 0x2}, {&(0x7f0000001500)=0x2, 0x2}, {&(0x7f0000001540)=0x1, 0x2}, {&(0x7f0000001580)=0x2, 0x2}, {&(0x7f00000015c0), 0x1}, {&(0x7f0000001600)=0x2}, {&(0x7f0000001640)=0x1, 0x2}, {&(0x7f0000001680)=0x1, 0x1}, {&(0x7f00000016c0)=0x2}, {&(0x7f0000001700)=0x2, 0x1}, {&(0x7f0000001740), 0x2}, {&(0x7f0000001780), 0x1}, {&(0x7f00000017c0)=0x2, 0x2}, {&(0x7f0000001800)=0x1, 0x2}, {&(0x7f0000001840)=0x2, 0x2}, {&(0x7f0000001880)=0x2, 0x2}, {&(0x7f00000018c0)}, {&(0x7f0000001900)=0x2, 0x2}, {&(0x7f0000001940)=0x1, 0x1}, {&(0x7f0000001980)=0x1, 0x1}, {&(0x7f00000019c0), 0x2}, {&(0x7f0000001a00)=0x1, 0x1}], 0xd, 0x60, &(0x7f0000002080)={r2, r3+10000000}, 0x0, 0x0) r4 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x44500, 0x0) tkill(r4, 0x1000000000016) ptrace$poke(0x4, r4, &(0x7f0000000040), 0x3) open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="405b912543d6e596b2645c822006dec2c067adf895ec0c58933885df9a04b82ef50119caf3c06121d98584365b3d510a6f7c826f96e7c59f0a67eb2e723a2a9a65cbc6ed1080d99af46a3071f4dc80bccc10a318c3affd8102cf451d3a8bfde30ee87d5ce4e1ca464efc5f6145b0e9e3aaf0cc2d48e2b84faec0332930bef168c28cdbe8ff7f233159b10eb0c2151c659453251af26173405b3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:32 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x89e1, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:32 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/795], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$HDIO_GETGEO(r3, 0x301, &(0x7f00000000c0)) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x2, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:33 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) [ 1340.177655][T15821] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1340.233102][T15821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:33:33 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x24) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x6}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:33 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) 03:33:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x3, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x4, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x5, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x6, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:35 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x58, 0x4, 0x8, 0x5, 0x0, 0x0, {0xc, 0x0, 0x4}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0xaa}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8914}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x4305}]}, 0x58}, 0x1, 0x0, 0x0, 0x8008010}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x8, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:35 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0xab00, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:35 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 03:33:35 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') ioctl(r1, 0x1, &(0x7f00000001c0)="80ac1d3bb10be71a864cff8e14712f6ec013d748614532117fb9c7f780dde977b26fa76961e4243ba3930dff52373f4fbc31f37e9fa03540be844cf66a2ddb857ff1") openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000000240)="7e9ee0bc527dbc2b1a7b083d0dbb0c09", 0x10, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0xfffffffffffffd52) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4040000aa49e72e57ab00622e859c7f44a86055571b6a0000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x6, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$KVM_TRANSLATE(r5, 0xc018ae85, &(0x7f0000000040)={0xd000, 0x0, 0x4, 0x2, 0x5}) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:35 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x82000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x9, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:35 executing program 1: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000080)) r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) fgetxattr(r1, &(0x7f0000000040)=@known='trusted.overlay.origin\x00', &(0x7f0000000200)=""/158, 0x9e) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x40000, 0x0) getsockname$tipc(r2, &(0x7f0000000140)=@name, &(0x7f0000000180)=0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f00000002c0), &(0x7f0000000300)=0x4) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x8) 03:33:36 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x4, &(0x7f00000002c0)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}, {&(0x7f0000000040)="23f198769b89b24fb1265b3e1fd60d1be1086e238ac8a579", 0x18, 0x100000000}, {&(0x7f00000001c0)="359600e530691dbcf154f63bc557160e8d7c9071227fc265327951bd6b13f2009c6eab8277b96990589da327820fcb4cd3f3129ac811f73f68c4b6d7a9a06bda7a209f1a2d3b6763ae9e47e783ed7442552de0276284b36810fa245d61454647722af1aad45f0d21723452f8de097add6ef088b7012f12ad0f8814df9228f60d54d18c91c007a08bf18b4df4bf04f7d2ffc2d91fcc0adb6186e4e04a4d16ca2e893724a04f3386063a5f28b921452c", 0xaf, 0x40}, {&(0x7f0000000380)="c0754b114916a7136c4b17939888cf58921c8404251791f5afd48583092d8e6f8589a5a2a73695de2c29fafca6163316f404b7217b38d9de238224e7ae6e9a0adee6e21cb53a1e81ae519765b7aa611761e31bccb40cb89c884a1a73ebbcf4e43f7214393b5db3e0b60e16b3eb0cb8e8a587b05e222aa64926b2ef804178a40e62727b60ade4c5d211146b7be4e959e0ba51d94d02e49e5f5c7bcb4ab9906a4901333b3b29b961dc58677b9fbbf63d27b5c8d1fa00825227a0b9cb43c3db531d857e7e3a2635c13215fb43767ee79e23d97643ddc94d91", 0xd7, 0x7}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x7fff}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0xb) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:36 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 03:33:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xa, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:36 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$VFIO_GET_API_VERSION(r4, 0x3b64) 03:33:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xb, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1343.265481][T16400] FAT-fs (loop5): invalid media value (0xcf) 03:33:36 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000003180)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) fstat(r4, &(0x7f0000002c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002dc0)=[{&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002940)=[{&(0x7f0000000280)="6ac6856734b145103a713e3cd25ad9d452f32fc71ffb634f2a4a801cc812564b1a6cb27e82ef4a785607e646920e0a3b642197d53ea98f7b626f5f937cb9e11273245e185a1597074a179aa4b4382c4756c4e2f49f7d93e8cc3a5c72958d8a1e383d813a176d2a1996d34882afb360871588bd33762a0ccfdead08", 0x7b}, {&(0x7f0000000300)="cf28061c9d3149b8829db2ebc32d7d9b001b31f07a5f3db325b2980c1f2ce3ede8b1ec018e143c02a45b0e92f6879ab260812fcbb4aef0828374e63a9fbb4958", 0x40}, {&(0x7f0000000340)="c1639c26281ba2efe855b7bd18d491931282f3fc1c6914fcc2e748b8a6c488a2122805dc6d2bda833df101791686925f8065c322c3966b432b411fe450bbba83a68340a190074a78dfc216841ac3a07c7f9b4d6f01235ca9957c39d4bda02dc4574276e146f3d8bcb3f8cb3f58f4505fee886e660f1b5022e0b20fdb9254e53737c088e54d57321ef23f6ef8fecb8be1d08a822ba889c40e683da9f3de42574c9a2db3baf50523c0fa40e45381e637b1d87771256062e397ca868eb6e8e366b7ca9694883585959cb73d", 0xca}, {&(0x7f00000007c0)="390c82815b2829fb29e299451fa3e07950ad82e55b52c559b09ca1bc22b0ce4a42d1a2ec375425bded8715647aab290b0429450a126a791b816ffcb20f1eba05922810875345daf49a5637feb8edffebfc562c34ec49011746bcd31155", 0x5d}, {&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000001840)="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", 0xfd}, {&(0x7f0000000440)="f5d404460817c0", 0x7}, {&(0x7f0000001940)="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", 0x1000}], 0x8, &(0x7f0000002d00)=ANY=[@ANYBLOB="18000000002000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r3, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00'], 0xb0, 0x10}], 0x1, 0x4000000) r6 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r6, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1343.378519][T16400] FAT-fs (loop5): Can't find a valid FAT filesystem 03:33:36 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db50731199f9df0b6cb") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xfffffffe, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xe, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:36 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) 03:33:36 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, &(0x7f00000000c0)) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:36 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0xae01, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:36 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x44, r4, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}]}, 0x44}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x38, r4, 0x14, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3f}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x8001) 03:33:36 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) [ 1343.940216][ T27] audit: type=1800 audit(1586576016.904:606): pid=16729 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=777 res=0 03:33:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xf, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:37 executing program 1: write$rfkill(0xffffffffffffffff, &(0x7f0000000200)={0x4, 0x3, 0x3, 0x0, 0x1}, 0x8) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r0}, &(0x7f000034f000)=0x2059b000) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000000c0)={0x5, 0xa42, 0x2}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000080), 0x0) sendto$inet(r5, &(0x7f0000000140)="09e7655e81fd03cb12b255650b569806d37cb4ed5759184c460c653d4cb2c89bc6e3644d88a8ff11d53e7561dfb03b2d49930c33b7ac758909b7be3683cdc3ee38d112a4edf62549c8e2ce55f0423e", 0x4f, 0x0, &(0x7f00006f7000)={0x2, 0x1, @local}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000001300)=ANY=[@ANYRESOCT, @ANYRESHEX, @ANYRES32=0x0, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESDEC=r1, @ANYPTR64=&(0x7f0000001380)=ANY=[@ANYRES32, @ANYRES64=r4, @ANYBLOB="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", @ANYRES32, @ANYRES32=0x0, @ANYRESDEC, @ANYRES32, @ANYRESHEX, @ANYPTR]], @ANYRESDEC], &(0x7f0000a8a000)=0x5) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x6, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCL_SETVESABLANK(r7, 0x541c, &(0x7f0000000040)) connect$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:37 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) 03:33:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x10, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:37 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) getpeername$netlink(r1, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x11, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:37 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x9f81, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x1}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:37 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) socket$inet(0x2, 0x4000000805, 0x0) 03:33:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x12, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:37 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0xae41, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:37 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0xfd, 0x2, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x9}, 0x2402, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10000}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r5, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r5, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_int(r6, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r6, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @rand_addr=0xfffffffc}, 0x10) sendto$inet(r6, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) ioctl$sock_inet_SIOCGIFBRDADDR(r6, 0x8919, &(0x7f0000000040)={'ip6_vti0\x00', {0x2, 0x4e24, @multicast2}}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:37 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x6) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x13, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:38 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) [ 1345.245287][ T27] audit: type=1800 audit(1586576018.214:607): pid=17402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=778 res=0 03:33:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x14, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:38 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x303203, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000000400)={0x18, 0x0, 0x4, {0x20}}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000004c0)="080db5055e0bcfe847a071") syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x41000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x5, &(0x7f0000000440)=[{&(0x7f0000000200)="b81e73e18b93566456c515b07e6a6cf70b85202b283a44c1bd23dde500991e4be49af63f28bdbc5cf7d89e429ed02350271a68272a94a8df18387e7446c202e2f5b680b69db105268c26c63667b010bad2712e4e03202c7e031b6deb8339df8ce0f9833aa0603a33a8315cf839e7fa372ae5f84cbb7bbf1d68d4238a3b0b057ca5df81b74fea2314371c96d610290e2b02179b21918b04a970968e091a67ca318f58731840aa30ea3587", 0xaa, 0x7}, {&(0x7f00000002c0)="88ebc3140e413da768ad0f3e192e08b1457c05f94ce2ee5a00b597e23a036962a31998db6cddba943a636f4a420684b8cc3b22ddd82d3796ce9f1a4811d94abc70dc37af97b83b39477ce31e7fc891b193f32420703d74352cb1ef95f7e4e1d6610878d86c15ae85c857cced481a6284b3ef58ede4ea3375dbc0cfd836e341b4985649d9135dc7c2b1da80f978269a1e79fd794b9832468244b94d0e7c98241b4e", 0xa1, 0xb07}, {&(0x7f0000000380)="2157bbe7301386fd8e18bd3bda3aa2db57d9ce8ef7d4e6b34e65af22554f62ff1b218f9c393d0fe895fabacb6e1703aa62ccf523aab5a51eccb27b049fa34eb9c26bebccbe29e4c34242ba1dde1dd3ace58e02035a6d98f1af5816ee8498aedbfaa9fdf7280de2c2eac456e9edbd6c5abbc9164de89d509e49fd0e5623", 0x7d, 0x10000}, {&(0x7f0000000540)="825ec6d7d56b40459d8166fa0e50f12ac5080834470d53115e5449f82a4efb6b37d7788f28fafab3d6daa605077c93fbdd756e2ae6db0bb6d54f0a11874f7d25ed4b264b952efc00e6fb23846c38e5b20b8f6caab9f7e5b275f7ce5b853fc185efd8241098178018c098dc7212d72b6a9390ca1f88868b037cdcd91a2650428e30", 0x81, 0x3ff}, {&(0x7f00000000c0)="e78d4fc76d513eae38d3d97a5fb720", 0xf, 0x6}], 0x100400, &(0x7f0000000140)=ANY=[@ANYBLOB="757365725f783f0074722c61636c2c61636c2c6e6f757365725f78617474722c61707072616973655f747970653d696d617369672c7375626a5f757365723d626465762c00c2f4e028dc215a9d3daae1bfbd"]) r3 = socket$inet(0x2, 0x4, 0x2) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000000500), &(0x7f0000000600)=0x4) 03:33:38 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x60, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:38 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 03:33:38 executing program 1: prctl$PR_GET_SECUREBITS(0x1b) r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) openat$cgroup_ro(r1, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) fsetxattr$security_capability(r2, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x7, 0x3ca}, {0x5, 0x7}], r4}, 0x18, 0x1) 03:33:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xa0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:39 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0xae80, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:39 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x0, &(0x7f00000001c0), 0x90800, &(0x7f0000000200)={[{@alloc_mode_reuse='alloc_mode=reuse'}, {@usrjquota={'usrjquota'}}, {@two_active_logs='active_logs=2'}, {@adaptive_mode='mode=adaptive'}], [{@euid_lt={'euid<', r3}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}]}) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x300, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1346.404427][ T27] audit: type=1800 audit(1586576019.374:608): pid=17760 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=779 res=0 03:33:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x500, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x600, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:39 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x202042, 0x10a) r3 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r2, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) r4 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x800000000000001, 0x8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x800000, 0x2, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) r5 = perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x8) fcntl$setstatus(r5, 0x4, 0x42000) r6 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000009, 0x10010, r6, 0x4cbc2000) ioctl$DRM_IOCTL_MODE_GETENCODER(r1, 0xc01464a6, &(0x7f0000000200)={0x2}) write$rfkill(r1, &(0x7f00000001c0)={0x3, 0x0, 0x1, 0x1, 0x1}, 0x8) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000000c0)=0x4) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x900, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:40 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0x10ec, 0x8) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) write(0xffffffffffffffff, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/65, 0x57}], 0x1) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)={0x14, r6, 0xf01}, 0x14}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48020000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x64, r6, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2f3f}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xfff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x40}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x44000) 03:33:40 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0xb) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:40 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x400454ca, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:40 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='nfs\x00', 0x2810000, &(0x7f0000000200)='msdos\x00') r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xa00, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:40 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) [ 1347.677105][T18126] nfs: Unknown parameter 'msdos' 03:33:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xb00, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xe00, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:40 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x9, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x400000, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000440)=0x5, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB="3519d2e8dfff53da49f47838cde9e556491cadff9e658c8b9daaff1b60b5dc804f79339320846048b235c22c5d84a6cd0b63ccb4503686eea7d523252091a75bdfeb5c700aad7126b97a3add3ca43b1f678a0f251db2767e9780303c32d518f9867a482bad0f7b995784e688c02c5ea1389855b6e65b3f12b1", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000240)={0x1}) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) sendto$inet(r1, &(0x7f00000000c0)="675821930887c417", 0x8, 0x58065, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xf00, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000040)) 03:33:40 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r4, 0x80585414, &(0x7f00000001c0)) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:41 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) write$apparmor_exec(r4, &(0x7f0000000040)={'stack ', '\x00'}, 0x7) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) [ 1348.235117][ T27] audit: type=1800 audit(1586576021.204:609): pid=18255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=780 res=0 03:33:41 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x40045564, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x1100, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:41 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:41 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000040)) 03:33:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x1200, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:41 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(0xffffffffffffffff, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="88000000", @ANYRES16=r5, @ANYBLOB="040025bd7000fcdbdf25010000002800018006000100020000005b85e02dc3d15364ff0b00736970000c000700000000000c0000000800050001a73a29d5b3527c420005000008000900740000000600010002000000080009001400000008060b0073697000060004004e23000006000000000000000000"], 0x88}, 0x1, 0x0, 0x0, 0x8040}, 0x4000040) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)={0x3, 'veth0_to_bridge\x00', {0x60000}, 0x80}) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:41 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f00000002c0)=[@in6={0xa, 0x4e23, 0x3, @rand_addr="5036c95348bae572254ee7d2b362aef3", 0x2}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x200}], 0x68) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) r8 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x88, r8, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @remote}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x21}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x21}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={[], [], @multicast1}}, @NLBL_MGMT_A_DOMAIN={0x9, 0x1, '{$\\$\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @loopback}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:42 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="8bad83bfb040da0cb7c35dc259b34f74f7249d000000", 0x16}], 0x8001, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000040)) 03:33:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x1300, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:42 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = io_uring_setup(0x64, &(0x7f0000000040)={0x0, 0x0, 0x4}) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x5, 0x0, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:42 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:42 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0)="eb3c906d732e66617400020401000200027400090100e56de23ec6ca094a1cdeb5bedb6526b690c459a3a644da1aea1fcbfc38578d4d269bc6333fe577bc0d5790e7fa4f4d26710e6694a922", 0x4c}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r0, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1349.580228][T18611] FAT-fs (loop5): invalid media value (0x00) [ 1349.591919][T18611] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1349.704875][T18611] FAT-fs (loop5): invalid media value (0x00) [ 1349.716611][T18611] FAT-fs (loop5): Can't find a valid FAT filesystem 03:33:42 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e22, 0x1f, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x28}}, 0x7fff}}, 0x0, 0x0, 0x2d, 0x0, "4feeb02183ea9b26607c6bec5a1d5ad076867c66dec1330e68d25d81acc37eb624f6d17817e1163b765ea4a20be5ce88533a593eb37faaa1d248e1ae2f44f104e76f7f652e13912195bdefe64045cce7"}, 0xd8) unlink(&(0x7f0000000040)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x1400, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:42 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x3, 0x48180) r3 = socket$packet(0x11, 0x2, 0x300) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000140)) bind$netrom(r2, &(0x7f0000000080)={{0x3, @null, 0x5}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) ioctl$SNDCTL_DSP_RESET(r2, 0x5000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f0000000180)=0x3) 03:33:42 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:42 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x40049409, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:43 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:43 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8f, 0x40, 0x0, 0x6, 0x20, 0x1, "510df10a1054567480f159149a26c4b640fb4deeaf0d0ae88acfa01c97d3e6d33370ea8789cc2218ca3986b33bb566538538d82b86d8bf9c66dba207be1a4933", "6f2b0b3340ddec61f12c1e50f436818ea59e3f5121d192c737f6cbd5c3243bbbcce5d4c756a2fd79c1ae7318d53ee8ba18656f78ef9a801efe7665cf6ccf3d60", "38897d74cb066756a52f295528beaa8549c691547d4629b486a9aafb9ab3cceb", [0x1, 0x3]}) [ 1350.152106][ T27] audit: type=1800 audit(1586576023.114:610): pid=18832 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=781 res=0 03:33:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x4000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:43 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x5db1, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:43 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x6000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:43 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x2000, 0x22) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0x3, 0x1, 0x3f, 0x3, 0x7}) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x18c0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000200)={0x30000, 0x9, 0x7f, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x990a7c, 0x9, [], @p_u16=&(0x7f00000000c0)}}) 03:33:44 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xa000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1351.158168][ T27] audit: type=1800 audit(1586576024.124:611): pid=19076 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=782 res=0 03:33:44 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:44 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x4008af20, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xb15d, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:44 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x1000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:44 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x2000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:44 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x3000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:45 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:45 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x4000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1352.352444][ T27] audit: type=1800 audit(1586576025.314:612): pid=19288 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=783 res=0 03:33:45 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x40186366, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x5000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:45 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:45 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000005200000825bd7000fcf8df2502080005000300000008000500b2dd3f35000000"], 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x200040c0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x6000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:45 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x10, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) [ 1352.828733][ T27] audit: type=1800 audit(1586576025.794:613): pid=19449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=784 res=0 03:33:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x8000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:46 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x9000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:46 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xa000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:46 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) r6 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000480)='NLBL_UNLBL\x00') setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/144], @ANYBLOB="00000000000000000000f4ff0030fe65e0000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000078eca2bc349903417bfd459ede3ad5dd000029525263ecf13dd92429ea9843a9c3c6fd16f941394b1ad9772e92ca22bfdaf28c75a3b94a120556502c4362d402afa19ef3beac0138ddc9bb7a21f8463ae1078e85883326c22eb221edcc1cf1f792af0d2d033c839ad213b04691ce81ba51109fa29a01c9f23e9141f8f895787619990e6fb492c4"], 0xb8) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='k\x00', @ANYRES16=r6, @ANYBLOB="ee0d0018012b13dbdf25070000000801804000000000"], 0x3}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x44, r6, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_SECCTX={0x2e, 0x7, 'system_u:object_r:audisp_remote_exec_t:s0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x20000880) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:46 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x4020940d, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:46 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:33:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xb000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:46 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:46 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000040)) 03:33:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xe000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:47 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r7) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r9) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x20, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000200)="d9afffaebf9babcf2cb57cbc2b9dd74ab9421b26d4aafc8c1269bb7034da470c4840377c8e2604bbfb8edcbd656470d720097a69c59d36fd8e9d42ecd8acb2d9cc1ab1ff2997302e16906a4dff294d995e43c58bd12e1ceab4a8a5242bb45336f77d9d73fc2b1116234586ca5d87ab84e964ce0769423b48b4ed361f890fc8e1a745581fce85fd3cec77720854865bc75a0da1db15a141a2438c0dfac36122bbb2fae9b9509792", 0xa7, 0x101}, {&(0x7f00000002c0)="3667174120550c81bb25654f3c17875545ea5f6a6bcde0e2e21eb991036a384daac4268ba48706d38792c604f32243318b9ad8e2f5163c3fa1789a5c8f16617af29e14215232174474a5ef5f3d9e96207f1faa3dcb00d9895a32b0a05f1ed97e011468d92e1ca54799fa2068ff7c0f9b543bd3721b34ce9404223c169f603f2d6b90f0fd37a39dc8252b70d2574fd5cf9cd93ad37016ee3b1ba6cd6ff1f375a5a358e21007425debfe647ce213d58781c7ff0510d6ed4aca13c422861a1a45c1f6994f67b00bf25d89c053c878524f12", 0xd0, 0x100000000}], 0x10a000, &(0x7f00000003c0)={[{@swalloc='swalloc'}, {@qnoenforce='qnoenforce'}, {@biosize={'biosize'}}, {@qnoenforce='qnoenforce'}], [{@uid_eq={'uid'}}, {@obj_role={'obj_role', 0x3d, '*lo'}}, {@uid_eq={'uid'}}, {@fowner_eq={'fowner', 0x3d, r7}}, {@euid_gt={'euid>', r9}}]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r4, 0x28, 0x1, &(0x7f0000000100), 0x8) 03:33:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xf000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:47 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000040)) [ 1354.219454][ T27] audit: type=1800 audit(1586576027.184:614): pid=19701 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=785 res=0 03:33:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080)=0x8, 0x4) r1 = socket$vsock_stream(0x28, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xfff, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="5e0bcfe847a07100000000") connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x10000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x11000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:47 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x4020ae46, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:47 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0xffffffffffffff47}], 0x40040, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xb1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x110, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="0001ff03", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="f3e4b53625898e8ba7fa14c5e3c37b91a01fb91184d813c1fe097b4fcb7028a2f2bcf8c9707b592a60a2e6dcb4b6dba05220d3bfa7a262328db5ade0d63c4d1aef4b1361749e49df0fe068644156e5572988c24ee694453afd2162a0c947dafcba636f345a40d135b2e115ba1e5235f798731f1f0447becc22a00c82f199d774a2f3351ad6e97e670ee384d26d4131aabd66546a8e2712c8485e0de80286e275aebbc8dae9b6180ad4f878fc971b308ab805a21f738bcd69966f7124ddefd42d", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000000c0)={r5}, 0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000040)={r5, 0xbfb9, 0x20, 0x3, 0x0, 0x10001}, 0x14) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:47 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000040)) 03:33:47 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x8e) 03:33:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x12000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x13000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:47 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, 0x0) 03:33:47 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x624942, 0x0) write$nbd(r2, &(0x7f0000000200)={0x67446698, 0x1, 0x3, 0x2, 0x1, "17ee6a07619632297bfbb31944603a1308f99402018355962a09ae5722f18b37588d8c3cd4ef75966279a3e2468ffa0ed70cd0025a5d62657b1c1e48fc4aa24762a4bc072e0f1d1d4962b421e255b8a9e9eacdbb1d7164d83981140c6ac8174f955f9cdcc2d0b7c0daec9cccd29b6fe5ce118c16a00671ebfdd657105dea3d61936b63b39d7f8469962ebeac75f2154cbf3aa098327da2bba5dbe2375aefe99e19a1417ffbaf4b023427dbcf2beeb2d6a7250df58ed42b79bea87859cc202d3975"}, 0xd1) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x14000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:48 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, 0x0) 03:33:48 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:48 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3f, 0x20100) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0xfffffffffffffe68) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:48 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x40305828, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:48 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, 0x0) 03:33:48 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x1, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) r2 = socket$inet(0x2, 0x4000000805, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000200)={0x9, 0x8, [0x1, 0x7]}) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) unlinkat(r4, &(0x7f0000000040)='./file0\x00', 0x0) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:48 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x13) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r2, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000080)={0x32, @remote, 0x4e24, 0x4, 'sh\x00', 0x9, 0xff, 0x47}, 0x2c) fcntl$setstatus(r1, 0x4, 0x42000) r3 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) finit_module(r3, &(0x7f00000000c0)='@\x00', 0x3) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:48 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x80000, 0x292f) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x9) fcntl$setstatus(r2, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) connect$x25(r0, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x3731d308ad61521d}) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40a04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r4 = socket(0x7, 0x3, 0x0) ioctl$SIOCSIFMTU(r4, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x40000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x60000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000005200000825bd7000fcf8df2502080005000300000008000500b2dd3f35000000"], 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x200040c0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x9effffff, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xa0000000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1356.418445][ T27] audit: type=1800 audit(1586576029.384:615): pid=20523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=786 res=0 03:33:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xb15d0000, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:49 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) connect$vsock_stream(r4, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x112) 03:33:50 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x408c5333, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0)="eb3c906d732e66617400020401000200027400090100e56de23ec6ca094a1cdeb5bedb6526b690c459a3a644da1aea1fcbfc38578d4d269bc6333fe577bc0d5790e7fa4f4d26710e6694a922", 0x4c}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r0, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xf0ffffff, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1357.170036][T20817] FAT-fs (loop2): invalid media value (0x00) [ 1357.181746][T20817] FAT-fs (loop2): Can't find a valid FAT filesystem 03:33:50 executing program 0: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r0}, &(0x7f000034f000)=0x2059b000) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000000c0)={0x2, 0x2, 0x1}) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea028563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3d1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc32001010000d9100bb036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41d9bfd5d3d1a9c79cb41027f063b6c3f84829c3fcc74e5eda26d675fcfb4fec948f340d4200000000000000000000000000cfbcecad0fdbc0a23a18afa700fa98be20fb"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r1, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="9473ee24331f1a37dcb9ea8f50dc0523c2a8f69963d35094e486b3e5eac7d1f56fef92cf545343d689e489c2f1d9885af1fc7ae6970ca7453d476ca2e0aa97f4ac1783d13cfbcd9d816469de681cad4e2ddc9f955fd6fe270279cd0bc49990af2df99b3d4523679acba142a3dc562dd36550aa81c26ceec64b6f040b81ad8104aee42ec7a2ae4bcb8cde4255f206c767aa39779ccdf3027873e0232c49d8ad782c9b270ad8b4048a2b", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040)={0x1, 0xc1}, 0x2) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xfcffffff, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="9473ee24331f1a37dcb9ea8f50dc0523c2a8f69963d35094e486b3e5eac7d1f56fef92cf545343d689e489c2f1d9885af1fc7ae6970ca7453d476ca2e0aa97f4ac1783d13cfbcd9d816469de681cad4e2ddc9f955fd6fe270279cd0bc49990af2df99b3d4523679acba142a3dc562dd36550aa81c26ceec64b6f040b81ad8104aee42ec7a2ae4bcb8cde4255f206c767aa39779ccdf3027873e0232c49d8ad782c9b270ad8b4048a2b", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040)={0x1, 0xc1}, 0x2) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:50 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r1}, &(0x7f000034f000)=0x2059b000) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xffffff7f, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="9473ee24331f1a37dcb9ea8f50dc0523c2a8f69963d35094e486b3e5eac7d1f56fef92cf545343d689e489c2f1d9885af1fc7ae6970ca7453d476ca2e0aa97f4ac1783d13cfbcd9d816469de681cad4e2ddc9f955fd6fe270279cd0bc49990af2df99b3d4523679acba142a3dc562dd36550aa81c26ceec64b6f040b81ad8104aee42ec7a2ae4bcb8cde4255f206c767aa39779ccdf3027873e0232c49d8ad782c9b270ad8b4048a2b", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040)={0x1, 0xc1}, 0x2) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:50 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)=0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r3, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="020000000100000000000000040003000000000008000100", @ANYRES32, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r4, @ANYBLOB="1000070000000000200000000000000d"], 0x3c, 0x0) r5 = getgid() r6 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r6, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) fstat(r8, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="020000000100000000000000040003000000000008000100", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r7, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r9, @ANYBLOB="1000070000000000200000000000000d"], 0x3c, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x6}, [{0x2, 0x1}, {0x2, 0x2}, {0x2, 0x7}, {0x2, 0x4}], {0x4, 0x1}, [{0x8, 0x0, r2}, {0x8, 0x3}, {}, {0x8, 0x4}, {0x8, 0x4, r5}, {0x8, 0x6, r2}], {}, {0x20, 0x5}}, 0x74, 0x3) 03:33:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xffffff9e, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1357.783979][ T27] audit: type=1800 audit(1586576030.754:616): pid=21162 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=787 res=0 [ 1357.859122][ T27] audit: type=1800 audit(1586576030.794:617): pid=21051 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=788 res=0 [ 1357.985964][ T27] audit: type=1800 audit(1586576030.804:618): pid=21115 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=789 res=0 03:33:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xfffffff0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:51 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r3}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={r3, 0x2, 0x20}, 0xc) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="9473ee24331f1a37dcb9ea8f50dc0523c2a8f69963d35094e486b3e5eac7d1f56fef92cf545343d689e489c2f1d9885af1fc7ae6970ca7453d476ca2e0aa97f4ac1783d13cfbcd9d816469de681cad4e2ddc9f955fd6fe270279cd0bc49990af2df99b3d4523679acba142a3dc562dd36550aa81c26ceec64b6f040b81ad8104aee42ec7a2ae4bcb8cde4255f206c767aa39779ccdf3027873e0232c49d8ad782c9b270ad8b4048a2b", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040)={0x1, 0xc1}, 0x2) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:51 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x4090ae82, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:51 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)=ANY=[], &(0x7f0000a8a000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e21}]}, 0x1c}}, 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x24}, 0x1, 0x0, 0x0, 0x15810}, 0x80) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r4, 0x805}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, r4, 0x4, 0x70bd29, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x726f}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x5}, 0x20000000) 03:33:51 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x15082}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0xfffffffc, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1358.628339][ T27] audit: type=1800 audit(1586576031.594:619): pid=21379 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=790 res=0 03:33:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="9473ee24331f1a37dcb9ea8f50dc0523c2a8f69963d35094e486b3e5eac7d1f56fef92cf545343d689e489c2f1d9885af1fc7ae6970ca7453d476ca2e0aa97f4ac1783d13cfbcd9d816469de681cad4e2ddc9f955fd6fe270279cd0bc49990af2df99b3d4523679acba142a3dc562dd36550aa81c26ceec64b6f040b81ad8104aee42ec7a2ae4bcb8cde4255f206c767aa39779ccdf3027873e0232c49d8ad782c9b270ad8b4048a2b", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040)={0x1, 0xc1}, 0x2) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:51 executing program 2: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200, 0x4}, 0x9000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000fffffff7000000000900010068667363000010000800020000bc0000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000002e000704ee00"/20, @ANYRES32=r2, @ANYBLOB="00000000000000000000f1ff0c0001d8510870d00acfa5779754007533320007000000d0455083cf"], 0x30}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg0\x00', r2}) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:51 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x1f, 0x3, 0x400004) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:51 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x2, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x3, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1359.203691][T21720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1359.228788][ T27] audit: type=1800 audit(1586576032.194:620): pid=21723 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=791 res=0 03:33:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x4, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1359.281864][ T27] audit: type=1800 audit(1586576032.194:621): pid=21718 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=792 res=0 03:33:52 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x80086301, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x5, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:52 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = dup3(r0, r1, 0x80000) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000040)={0x0, 0x5}) r3 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r3, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x400, 0x0) ioctl$IMSETDEVNAME(r4, 0x80184947, &(0x7f00000001c0)={0x0, 'syz0\x00'}) 03:33:52 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) semget(0x2, 0x4, 0x1) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8400, 0x2c) syz_open_dev$ptys(0xc, 0x3, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f00000001c0)=0x0) mq_notify(r1, &(0x7f0000000200)={0x0, 0x30, 0x1, @tid=r7}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f00000000c0)={0x0, 0x108000}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x6, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1359.825125][ T27] audit: type=1800 audit(1586576032.794:622): pid=21945 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=793 res=0 [ 1359.901775][ T27] audit: type=1800 audit(1586576032.834:623): pid=21947 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=794 res=0 03:33:52 executing program 2: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="b40400404a2fe3db883e7fea", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r1}, &(0x7f000034f000)=0x2059b000) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f0000000200)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) fcntl$setstatus(r2, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x62, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000007c0), 0x8, 0x10, &(0x7f0000000440), 0x10}, 0x78) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:52 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) r1 = socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fstat(r1, &(0x7f0000000200)) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x8, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:53 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000040)={0x0, 0x8, [@random="2c919ff6aa70", @random="035c6ee4063d", @local, @empty, @local, @multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @local]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x9, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1360.269990][ T27] audit: type=1800 audit(1586576033.234:624): pid=22319 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=795 res=0 03:33:53 executing program 0: r0 = socket(0x11, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r1, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYRES16], 0x1}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3400599698df36f593600000080000002fe350ca", @ANYRES32=r1, @ANYRES64], 0x3}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000002e000704ee00"/20, @ANYRES32=r1, @ANYBLOB="00000000000000000000f1ff0c0001d8510870d00acfa5779754007533320007000000d0455083cf"], 0x30}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv4_getaddr={0x2c, 0x16, 0x20, 0x70bd25, 0x25dfdbfe, {0x2, 0x40, 0x84, 0xc8, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0xa4, 0x2, 0x6, 0x2}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24048854}, 0x44814) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400220) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'vlan0\x00', 0x2959}) 03:33:53 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/196, 0xc4, 0x80000000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x412000, 0x0) write$P9_RAUTH(r2, &(0x7f0000000240)={0x14, 0x67, 0x2, {0x0, 0x3, 0x5}}, 0x14) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=0x1, 0x4) unlink(&(0x7f0000000080)='./file0\x00') r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000580)={0x0, 0xbc, "102aab15ebac0652079e1d95aae3621c965ab994a16c52117d9aa21e30bedc21ade98231456ae96c2f9683650b6fb5751d71e3815ebb8645ba4e59786a660d36d1963f119fc4478f1f451adf86d51c48cba69d7e90301cc105f2baa80aaedfe56ad3ad9ffab41e373966c5ff3bff13d8426357c32fc1f4b2bed5ee6baed0ae8246f30d0dc4f27456c1d7cf2c484413f1d9c772ec89ea3d65d92614f8258d8492f72e802d8fe8511b1733db1095e1685696bc7198aca060aaa897482f"}, &(0x7f00000002c0)=0xc4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000300)={r4, 0x28, "ad10fd2e40710a5db1ef264bea1543239be2e8fc369a14fc12117854e7968f7086d942fb059f0781"}, &(0x7f0000000480)=0x30) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1360.540044][T22297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:33:53 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x62, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f92037261dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787f6dbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41d9bfd5d3d1a9c79cb41027f063b6c3f84829c3fcc74e5eda26d675fcfb4fec948f340d4200"/791], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xa, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:53 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000040)={0x0, 0x8, [@random="2c919ff6aa70", @random="035c6ee4063d", @local, @empty, @local, @multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @local]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:53 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$TIOCL_SCROLLCONSOLE(r4, 0x541c, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) ioctl$SNDCTL_DSP_RESET(0xffffffffffffffff, 0x5000, 0x0) 03:33:53 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x80108906, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:54 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000002c0)='bfs\x00', &(0x7f0000000300)='./file0\x00', 0x64, 0x2, &(0x7f0000000400)=[{&(0x7f0000000580)="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", 0x1000, 0x20}, {&(0x7f0000000380)="b07c44955a63bb71ca507beebd53802381820f3d7bfa0ea67f82e087fcc2e0a24b0fd7de47a3fa355e289ee819aeaec3d78e9b4273d877aaa68ee343421d28075a475d47d56a56e6021adf1a397af30c5130348b90e5103b28cda4", 0x5b, 0x1}], 0x1002400, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x234080, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x27) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000040)={0x13, 0x10, 0x7, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f00000001c0), r4, 0x2}}, 0x18) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xb, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1361.079772][T22812] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1361.138904][T22812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:33:54 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x80108907, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1361.510038][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 1361.510055][ T27] audit: type=1800 audit(1586576034.474:628): pid=22921 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=799 res=0 03:33:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xe, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:54 executing program 2: openat$audio1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio1\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x410001, 0x0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x800, 0x0) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r5, 0x4, 0x42000) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, 'bdevself$keyring[lovboxnet1*\xbað0#[wlan0/'}}, {@subj_type={'subj_type', 0x3d, '/dev/audio1\x00'}}, {@hash='hash'}, {@subj_user={'subj_user', 0x3d, 'msdos\x00'}}]}}) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r3, 0xc2604110, &(0x7f0000000380)={0x8001, [[0x80, 0x7fffffff, 0x3, 0x10000, 0x7, 0x0, 0x6, 0x7fff], [0x7, 0x1f, 0x4, 0x6, 0x2, 0x101, 0x8, 0x4], [0x3, 0x77, 0x6, 0xa4b1, 0x80000000, 0x3, 0x8f4]], [], [{0x0, 0x1, 0x1}, {0x7, 0x5, 0x1, 0x1, 0x0, 0x1}, {0x20, 0x3f, 0x0, 0x0, 0x1, 0x1}, {0x1, 0x8, 0x1, 0x0, 0x1, 0x1}, {0xc7f, 0x6, 0x0, 0x1}, {0x8, 0x7, 0x0, 0x1}, {0x5b948c8c, 0x0, 0x0, 0x0, 0x1, 0x1}, {0x80000001, 0x417, 0x0, 0x1, 0x1, 0x1}, {0x1, 0x3, 0x1, 0x0, 0x0, 0x1}, {0x3, 0x6f3, 0x1, 0x1}, {0x40, 0x5}, {0x2, 0x1, 0x0, 0x1}], [], 0x40}) unlink(&(0x7f0000000080)='./file0\x00') 03:33:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xf, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:55 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000000000000, 0xbd2c}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1362.129215][ T27] audit: type=1800 audit(1586576035.094:629): pid=23249 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=800 res=0 03:33:55 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9bfad4301000000000095000000000000000500000000004000950000000000b9e1e603f862b5173583f1d7eb634f76b1cef9eeb7763c14f8f7494a564babf363654191aadbd61d7d0bdc18ebc296e1085dcbdf299b20712872a269cb051b233ea0bdb6a80b4c05f82dfafe5f7ace236861a8e3c9de7b9acd782bea026f25e26ab2430243f2155491072a55d5ff51de093dcf8cffed7409bfd712b24ffed61e78648f791c1abe4604b7e0fea0953f7d8f920372ba9a90c6af4cee95aa0cb4569461dbe8791ea01c826928563a5488dfb605d26dbfb74289975594b56e4a9c7163e7bce1672ef356d20d66e7810341fae4aa0116bba4f4d5a77d2f4f9220f79dc917755e66e953800ea5578f97c793baaac7ff56c6678563f482ed32fadccb750786e574fb251bd26941ebdceed7744ac909e29a9562eddc985fee5bb668ca48cbd7488ae353e7feadddbd678963475fdd7786586d4dc05b502922cd6fc3f7346f365a9a51de24c1f97badd02fd1e55f04602a057f7d3d61913355ce6f38de5bb7aa7e13eaf320bdd3229e4517ff4786785553d47a5af429ff29bde9fbb096c03e5b25aff8381641eb9b171f57e1a71c3787fedbfc5d87c06af820185e350e373c705d172505d805330ba81737c63cdc74e3a70d2f88d8e2e759dfae0842e450d99a2bfac2a481ce5bdfb1f06c2386cb30cc591a875bbe442afdd51afecbde83c6a82b18d77b35e872a8b1e9d7c5649b5f24836d72ad3f47990509a45b7ab2ebc3200359c4bfd9100bb0f055bb228036344acd7ef5c20207845e906ac3a9dbcd1ec3b900000000000000db86fb56f7d9e2c826c170afa1eab8f3f0144b96b9edff19dccd41d9bfd5d3d1a9c79cb41027f063b6c3f84829c3fcc74e5eda26d675fcfb4fec948f340d42"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x10, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:55 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000040)={0x0, 0x8, [@random="2c919ff6aa70", @random="035c6ee4063d", @local, @empty, @local, @multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @local]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x11, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1362.426502][ T27] audit: type=1800 audit(1586576035.394:630): pid=23263 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=801 res=0 03:33:55 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/780], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000000c0)={r4}, 0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={r4, 0x800}, 0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1362.551365][ T27] audit: type=1800 audit(1586576035.494:631): pid=23352 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=802 res=0 03:33:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x12, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:55 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:55 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x80585414, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:55 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:55 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$TIOCL_SCROLLCONSOLE(r4, 0x541c, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) ioctl$SNDCTL_DSP_RESET(0xffffffffffffffff, 0x5000, 0x0) 03:33:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x13, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1362.939343][ T27] audit: type=1800 audit(1586576035.904:632): pid=23791 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=803 res=0 03:33:56 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/791], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000002e000704ee00"/20, @ANYRES32=r3, @ANYBLOB="00000000000000000000f1ff0c0001d8510870d00acfa5779754007533320007000000d0455083cf"], 0x30}}, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={0x0, @rc={0x1f, @none, 0x9}, @rc={0x1f, @any, 0x8}, @xdp={0x2c, 0x1, r3, 0x9}, 0x4, 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000240)='veth0_macvtap\x00', 0x7fffffff, 0x4, 0x9}) 03:33:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x14, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:56 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file1\x00', 0xe800, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}, {&(0x7f00000001c0)="10ca21719c60c5a5d4d2d97eec302b750ad719cd632f42908e8676e06f401ceccc8a32ced0ac222d5dd4288276f74c01fe457282fcad8bf2eeb47126a1ea96b4162fae655e174f0af8ea6ad481630c2f7f27f3e2b3fe9d34d1a644962081dc03b59f0d12644d8846d375ad8eedabd03deb67c75303c7350d2500d69e53d3eb820f5149d6da8a09bdac418c2811cc44632f737ed0c7fc954a91540c671fe7ff6693392fb78fc8f743bdabc4472e51f69e07d7e169783c7d", 0xb7, 0x204}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = gettid() tkill(r1, 0x1000000000016) ioprio_get$pid(0x3, r1) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000040)={0x0, 0x8, [@random="2c919ff6aa70", @random="035c6ee4063d", @local, @empty, @local, @multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @local]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1363.339051][ T27] audit: type=1800 audit(1586576036.304:633): pid=24015 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17140 res=0 03:33:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x60, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xa0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:56 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) socket$inet6(0xa, 0x0, 0x84) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4441, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffe}, 0x0, 0x9, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/790], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000080)=0x6e, 0x800) r2 = socket(0x11, 0x3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="83b600"/15, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/115) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000980)={0x184, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2bfd}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK={0x60, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd830}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x83e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xabe9}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x61f}]}, @TIPC_NLA_LINK={0x38, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x44, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x8d1}, 0x4) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x300, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1363.758770][ T27] audit: type=1800 audit(1586576036.724:634): pid=24139 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=804 res=0 03:33:56 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8138ae83, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x500, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:56 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:56 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x39, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff5470ab3f090001006866736300000000070002afba768c000048fd59f6763da528e7641541ed4800000039fcf70397009e0dafedfe13bdd6f6e9f994a10901ecb2cb51dc05360a77059c8fda8169721bad1b9ce53190ab11d0766c146956b0b7e074485362b192699dc14b88027226275ed8637c44c2a2e8489985758edc64240b157554517b5059813a580db7b3531a438b"], 0x3}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="7a34f800000000", @ANYRES64=r2, @ANYBLOB="0e000000001101fb4b2f88cb48592e0074635d6e6458750466d8558b"], 0x3}}, 0x9010) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000002e000704ee00"/20, @ANYRES32, @ANYBLOB="00000000000000000000f1ff0c0001d8510870d00acfa5779754007533320007000000d0455083cf"], 0x30}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_to_team\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x40810) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r3, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r3, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000040)={0x3, 'macvlan0\x00', {0x101}, 0x5}) 03:33:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x600, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1364.042479][ T27] audit: type=1800 audit(1586576037.004:635): pid=24393 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=805 res=0 [ 1364.173940][ T27] audit: type=1800 audit(1586576037.144:636): pid=24428 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17127 res=0 03:33:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x900, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:59 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}, {&(0x7f00000001c0)="c4eb159d7b6064fbc0121c3a49a45c93e3b249c153547cd40730e5fc8d9938021b7e24675feab502775efa08d9c06385dd913ebbf1f0dabb5502821396fc12ec8b02dde1b1f6528599da60a74cfa86707f4a4a95", 0x54, 0x8}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="ff24b6a25ae0afe97873697f0aea9fa4831013ce488fc971a3b30dc2a20e72183276ab4e90cbab51820184c39a59c03ad716ef6f2a0e130a8924c90701aec138306ea2ca2781dea0fbb868cdc08b2ef470b0141e6c71b625b88b6abc098baa96d096230e459a609292a3f0e2007ec00bbd5def64debbde50fd477434f0708249ac2cb93d0dd3a7e693cd85a755d25cd931bfca90f31df3aa13db70f91f936720138381789577faee57f7c2f17e509f55a5e713db6a3dcd9d8a321d61fefa607316c431405529bfa25dbf896b356137e9e7e001697584447358b653b6f95eacb7d267f38a51f7e410488196e51b35661061ac561d788799ee4b639e5d94a7ecdaff1210012fb7e694a9bd5dd6b510d99ad7289b26a1ae9972626a167458beec172befd4362e3db537e3b13c9d14d5f124351f7f1118da68ec4ba2f1651000"/330, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) write$P9_RREAD(r3, &(0x7f0000000240)={0xc, 0x75, 0x1, {0x1, "c4"}}, 0xc) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r5, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r5, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:59 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x39, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff5470ab3f090001006866736300000000070002afba768c000048fd59f6763da528e7641541ed4800000039fcf70397009e0dafedfe13bdd6f6e9f994a10901ecb2cb51dc05360a77059c8fda8169721bad1b9ce53190ab11d0766c146956b0b7e074485362b192699dc14b88027226275ed8637c44c2a2e8489985758edc64240b157554517b5059813a580db7b3531a438b"], 0x3}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="7a34f800000000", @ANYRES64=r2, @ANYBLOB="0e000000001101fb4b2f88cb48592e0074635d6e6458750466d8558b"], 0x3}}, 0x9010) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000002e000704ee00"/20, @ANYRES32, @ANYBLOB="00000000000000000000f1ff0c0001d8510870d00acfa5779754007533320007000000d0455083cf"], 0x30}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_to_team\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x40810) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r3, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r3, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000040)={0x3, 'macvlan0\x00', {0x101}, 0x5}) 03:33:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xa00, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0), 0x1) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) recvmsg$can_j1939(r4, &(0x7f00000000c0)={&(0x7f00000001c0)=@alg, 0x80, &(0x7f0000000040)=[{&(0x7f0000000380)=""/209, 0xd1}, {&(0x7f0000000580)=""/173, 0xad}], 0x2, &(0x7f0000000640)=""/201, 0xc9}, 0x2001) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:59 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x39, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff5470ab3f090001006866736300000000070002afba768c000048fd59f6763da528e7641541ed4800000039fcf70397009e0dafedfe13bdd6f6e9f994a10901ecb2cb51dc05360a77059c8fda8169721bad1b9ce53190ab11d0766c146956b0b7e074485362b192699dc14b88027226275ed8637c44c2a2e8489985758edc64240b157554517b5059813a580db7b3531a438b"], 0x3}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="7a34f800000000", @ANYRES64=r2, @ANYBLOB="0e000000001101fb4b2f88cb48592e0074635d6e6458750466d8558b"], 0x3}}, 0x9010) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000002e000704ee00"/20, @ANYRES32, @ANYBLOB="00000000000000000000f1ff0c0001d8510870d00acfa5779754007533320007000000d0455083cf"], 0x30}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_to_team\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x40810) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r3, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r3, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000040)={0x3, 'macvlan0\x00', {0x101}, 0x5}) 03:33:59 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8818564c, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:33:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xb00, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1366.638822][ T27] audit: type=1800 audit(1586576039.604:637): pid=24717 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17393 res=0 03:33:59 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x39, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff5470ab3f090001006866736300000000070002afba768c000048fd59f6763da528e7641541ed4800000039fcf70397009e0dafedfe13bdd6f6e9f994a10901ecb2cb51dc05360a77059c8fda8169721bad1b9ce53190ab11d0766c146956b0b7e074485362b192699dc14b88027226275ed8637c44c2a2e8489985758edc64240b157554517b5059813a580db7b3531a438b"], 0x3}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="7a34f800000000", @ANYRES64=r2, @ANYBLOB="0e000000001101fb4b2f88cb48592e0074635d6e6458750466d8558b"], 0x3}}, 0x9010) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000002e000704ee00"/20, @ANYRES32, @ANYBLOB="00000000000000000000f1ff0c0001d8510870d00acfa5779754007533320007000000d0455083cf"], 0x30}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_to_team\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x40810) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r3, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r3, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d00000eefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000040)={0x3, 'macvlan0\x00', {0x101}, 0x5}) [ 1366.701743][T24879] FAT-fs (loop5): invalid media value (0xa4) [ 1366.713508][T24879] FAT-fs (loop5): Can't find a valid FAT filesystem 03:33:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0), 0x1) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) recvmsg$can_j1939(r4, &(0x7f00000000c0)={&(0x7f00000001c0)=@alg, 0x80, &(0x7f0000000040)=[{&(0x7f0000000380)=""/209, 0xd1}, {&(0x7f0000000580)=""/173, 0xad}], 0x2, &(0x7f0000000640)=""/201, 0xc9}, 0x2001) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xe00, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:33:59 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x5, 0x4) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:33:59 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x23a0b0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:34:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xf00, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1367.157700][ T27] audit: type=1800 audit(1586576040.124:638): pid=25077 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=806 res=0 03:34:00 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x5, 0x4) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:34:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0), 0x1) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) recvmsg$can_j1939(r4, &(0x7f00000000c0)={&(0x7f00000001c0)=@alg, 0x80, &(0x7f0000000040)=[{&(0x7f0000000380)=""/209, 0xd1}, {&(0x7f0000000580)=""/173, 0xad}], 0x2, &(0x7f0000000640)=""/201, 0xc9}, 0x2001) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:34:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x1100, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1367.296679][ T27] audit: type=1800 audit(1586576040.214:639): pid=25032 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=807 res=0 03:34:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x1200, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1367.543944][ T27] audit: type=1800 audit(1586576040.514:640): pid=25319 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=808 res=0 03:34:00 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0xc0045878, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x1300, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1367.741080][ T27] audit: type=1800 audit(1586576040.704:641): pid=25368 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=809 res=0 03:34:00 executing program 0 (fault-call:12 fault-nth:0): r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:00 executing program 2 (fault-call:2 fault-nth:0): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:34:00 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') getresgid(0x0, 0x0, &(0x7f0000000140)) 03:34:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x1400, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1367.923502][T25484] FAULT_INJECTION: forcing a failure. [ 1367.923502][T25484] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.958441][T25484] CPU: 0 PID: 25484 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1367.967154][T25484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1367.977297][T25484] Call Trace: [ 1367.980611][T25484] dump_stack+0x11d/0x187 [ 1367.984948][T25484] should_fail.cold+0x5/0xf [ 1367.989474][T25484] __should_failslab+0x82/0xb0 [ 1367.994310][T25484] should_failslab+0x5/0xf [ 1367.998891][T25484] __kmalloc+0x54/0x640 [ 1368.003071][T25484] ? tomoyo_realpath_from_path+0x85/0x3d0 [ 1368.008809][T25484] tomoyo_realpath_from_path+0x85/0x3d0 [ 1368.014396][T25484] tomoyo_path_number_perm+0xff/0x360 [ 1368.019774][T25484] ? _parse_integer+0x12f/0x150 [ 1368.024695][T25484] ? __fget_files+0xa2/0x1c0 [ 1368.029306][T25484] tomoyo_file_ioctl+0x28/0x40 [ 1368.034096][T25484] security_file_ioctl+0x69/0xa0 [ 1368.039164][T25484] ksys_ioctl+0x5a/0x150 [ 1368.043415][T25484] __x64_sys_ioctl+0x47/0x60 [ 1368.048022][T25484] do_syscall_64+0xc7/0x390 [ 1368.052546][T25484] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1368.058938][T25484] RIP: 0033:0x45c889 [ 1368.062848][T25484] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1368.082564][T25484] RSP: 002b:00007f4a39453c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1368.091150][T25484] RAX: ffffffffffffffda RBX: 00007f4a394546d4 RCX: 000000000045c889 [ 1368.099129][T25484] RDX: 0000000020000040 RSI: 0000000000001279 RDI: 0000000000000003 [ 1368.107129][T25484] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1368.115190][T25484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 03:34:01 executing program 1 (fault-call:14 fault-nth:0): r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1368.123638][T25484] R13: 000000000000021c R14: 00000000004c4462 R15: 0000000000000000 [ 1368.137370][T25493] FAULT_INJECTION: forcing a failure. [ 1368.137370][T25493] name failslab, interval 1, probability 0, space 0, times 0 [ 1368.167944][ T27] audit: type=1800 audit(1586576041.134:642): pid=25485 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=810 res=0 [ 1368.196133][T25493] CPU: 0 PID: 25493 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 1368.204856][T25493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1368.214902][T25493] Call Trace: [ 1368.218417][T25493] dump_stack+0x11d/0x187 [ 1368.222917][T25493] should_fail.cold+0x5/0xf [ 1368.227615][T25493] __should_failslab+0x82/0xb0 [ 1368.232445][T25493] should_failslab+0x5/0xf [ 1368.236884][T25493] __kmalloc+0x54/0x640 [ 1368.241115][T25493] ? tomoyo_realpath_from_path+0x85/0x3d0 [ 1368.246859][T25493] tomoyo_realpath_from_path+0x85/0x3d0 [ 1368.252412][T25493] tomoyo_path_number_perm+0xff/0x360 [ 1368.257806][T25493] ? _parse_integer+0x12f/0x150 [ 1368.262797][T25493] ? __fget_files+0xa2/0x1c0 [ 1368.267778][T25493] tomoyo_file_ioctl+0x28/0x40 [ 1368.272738][T25493] security_file_ioctl+0x69/0xa0 [ 1368.277954][T25493] ksys_ioctl+0x5a/0x150 [ 1368.282371][T25493] __x64_sys_ioctl+0x47/0x60 [ 1368.286981][T25493] do_syscall_64+0xc7/0x390 [ 1368.291492][T25493] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1368.297393][T25493] RIP: 0033:0x45c889 [ 1368.301360][T25493] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:34:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x4000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1368.321055][T25493] RSP: 002b:00007fe1b1dd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1368.329854][T25493] RAX: ffffffffffffffda RBX: 00007fe1b1dd76d4 RCX: 000000000045c889 [ 1368.337914][T25493] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000006 [ 1368.345903][T25493] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1368.355143][T25493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1368.363105][T25493] R13: 00000000000004a5 R14: 00000000004c76d3 R15: 0000000000000000 [ 1368.372825][T25493] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1368.373458][T25484] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1368.380618][T25493] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1368.442228][T25493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:34:01 executing program 2 (fault-call:2 fault-nth:1): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:34:01 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x2000) connect$tipc(r0, &(0x7f00000000c0)=@id={0x1e, 0x3, 0x3, {0x4e20}}, 0x10) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:34:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x5db1, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:01 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1368.690587][T25708] FAULT_INJECTION: forcing a failure. [ 1368.690587][T25708] name failslab, interval 1, probability 0, space 0, times 0 [ 1368.789984][ T27] audit: type=1800 audit(1586576041.754:643): pid=25712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=811 res=0 [ 1368.840408][T25708] CPU: 1 PID: 25708 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1368.849133][T25708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1368.859210][T25708] Call Trace: [ 1368.862565][T25708] dump_stack+0x11d/0x187 [ 1368.867034][T25708] should_fail.cold+0x5/0xf [ 1368.871565][T25708] __should_failslab+0x82/0xb0 [ 1368.876449][T25708] should_failslab+0x5/0xf [ 1368.880895][T25708] __kmalloc+0x54/0x640 [ 1368.885064][T25708] ? tomoyo_encode2.part.0+0xd0/0x240 [ 1368.890453][T25708] tomoyo_encode2.part.0+0xd0/0x240 [ 1368.895694][T25708] tomoyo_encode+0x32/0x50 [ 1368.900164][T25708] tomoyo_realpath_from_path+0x11e/0x3d0 [ 1368.905806][T25708] tomoyo_path_number_perm+0xff/0x360 [ 1368.911293][T25708] ? _parse_integer+0x12f/0x150 [ 1368.911679][T25857] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1368.916183][T25708] ? __fget_files+0xa2/0x1c0 [ 1368.916210][T25708] tomoyo_file_ioctl+0x28/0x40 [ 1368.916243][T25708] security_file_ioctl+0x69/0xa0 [ 1368.940806][T25708] ksys_ioctl+0x5a/0x150 [ 1368.943562][T25857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1368.945111][T25708] __x64_sys_ioctl+0x47/0x60 [ 1368.956822][T25708] do_syscall_64+0xc7/0x390 [ 1368.961336][T25708] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1368.967248][T25708] RIP: 0033:0x45c889 [ 1368.971141][T25708] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1368.990744][T25708] RSP: 002b:00007f4a39453c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1368.999163][T25708] RAX: ffffffffffffffda RBX: 00007f4a394546d4 RCX: 000000000045c889 [ 1369.007178][T25708] RDX: 0000000020000040 RSI: 0000000000001279 RDI: 0000000000000003 [ 1369.015158][T25708] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1369.023211][T25708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1369.031182][T25708] R13: 000000000000021c R14: 00000000004c4462 R15: 0000000000000001 03:34:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x6000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:02 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0xc0045878, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1369.052197][T25708] ERROR: Out of memory at tomoyo_realpath_from_path. 03:34:02 executing program 0 (fault-call:12 fault-nth:1): r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:02 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0x282c2, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r4, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, r6, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4001) getresgid(0x0, 0x0, &(0x7f00000000c0)) 03:34:02 executing program 2 (fault-call:2 fault-nth:2): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:34:02 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x2, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xa000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1369.329328][T25945] FAULT_INJECTION: forcing a failure. [ 1369.329328][T25945] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1369.372549][T25945] CPU: 1 PID: 25945 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1369.381334][T25945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1369.391391][T25945] Call Trace: [ 1369.394706][T25945] dump_stack+0x11d/0x187 [ 1369.399045][T25945] should_fail.cold+0x5/0xf [ 1369.403561][T25945] __alloc_pages_nodemask+0xcf/0x310 [ 1369.408941][T25945] alloc_pages_current+0xca/0x170 [ 1369.413980][T25945] pte_alloc_one+0x14/0x50 [ 1369.418401][T25945] __do_fault+0x120/0x1e0 [ 1369.422778][T25945] __handle_mm_fault+0x1d2d/0x2cf0 [ 1369.427921][T25945] handle_mm_fault+0x21c/0x540 [ 1369.432706][T25945] do_page_fault+0x4a4/0xa52 [ 1369.437307][T25945] page_fault+0x34/0x40 [ 1369.441477][T25945] RIP: 0010:__put_user_4+0x1c/0x30 [ 1369.446648][T25945] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 8c 01 00 48 8b 9b 50 0b 00 00 48 83 eb 03 48 39 d9 73 4a 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 1369.466258][T25945] RSP: 0018:ffffc9000870bdd8 EFLAGS: 00010293 [ 1369.472487][T25945] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 1369.480691][T25945] RDX: 0000000000000000 RSI: ffffffff8247f35c RDI: ffff888129d7c84c [ 1369.489281][T25945] RBP: ffff8881252b99c0 R08: 0000000000000000 R09: 0000888129d7c84c [ 1369.497254][T25945] R10: 0000c9000870bd44 R11: 0000888129d7c84f R12: 0000000000001279 [ 1369.505299][T25945] R13: 00000000fffffdfd R14: 0000000020000040 R15: 0000000020000040 [ 1369.513297][T25945] ? blkdev_common_ioctl+0x9fc/0xea0 [ 1369.518603][T25945] blkdev_common_ioctl+0xa3c/0xea0 [ 1369.523930][T25945] blkdev_ioctl+0x130/0x420 [ 1369.528459][T25945] block_ioctl+0x91/0xb0 [ 1369.532794][T25945] ? blkdev_fallocate+0x2e0/0x2e0 [ 1369.537926][T25945] ksys_ioctl+0x101/0x150 [ 1369.542553][T25945] __x64_sys_ioctl+0x47/0x60 [ 1369.547260][T25945] do_syscall_64+0xc7/0x390 [ 1369.551779][T25945] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1369.557694][T25945] RIP: 0033:0x45c889 [ 1369.561710][T25945] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1369.581320][T25945] RSP: 002b:00007f4a39453c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1369.589805][T25945] RAX: ffffffffffffffda RBX: 00007f4a394546d4 RCX: 000000000045c889 [ 1369.597790][T25945] RDX: 0000000020000040 RSI: 0000000000001279 RDI: 0000000000000003 [ 1369.605801][T25945] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1369.613800][T25945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 03:34:02 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xb15d, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:02 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) r4 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r4, 0xc1004111, &(0x7f0000000380)={0x10000, [0xc0000000, 0x401, 0x81], [{0x9, 0x4, 0x1, 0x1, 0x0, 0x1}, {0x5, 0xfffffff8}, {0x0, 0x80000001, 0x0, 0x0, 0x1}, {0x7, 0x7fffffff, 0x1, 0x1}, {0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {0x100, 0x7}, {0x6, 0xfffffffb, 0x1, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x3, 0x3, 0x1, 0x1, 0x1, 0x1}, {0x3, 0x40, 0x1, 0x1, 0x1}, {0xd0f5, 0x3, 0x1, 0x1}, {0x7, 0xfffffffd, 0x0, 0x1, 0x1}], 0x7}) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r5) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r6 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r6, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1369.621932][T25945] R13: 000000000000021c R14: 00000000004c4462 R15: 0000000000000002 03:34:02 executing program 2 (fault-call:2 fault-nth:3): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:34:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x1000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:02 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x10, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1369.929921][T26265] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1369.973939][T26265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1370.019689][ T27] audit: type=1800 audit(1586576042.984:644): pid=26264 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=813 res=0 [ 1370.066420][T26371] FAULT_INJECTION: forcing a failure. [ 1370.066420][T26371] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1370.080113][T26371] CPU: 0 PID: 26371 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1370.089060][T26371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1370.099132][T26371] Call Trace: [ 1370.102433][T26371] dump_stack+0x11d/0x187 [ 1370.107125][T26371] should_fail.cold+0x5/0xf [ 1370.111753][T26371] __alloc_pages_nodemask+0xcf/0x310 [ 1370.117066][T26371] alloc_pages_current+0xca/0x170 [ 1370.122189][T26371] __page_cache_alloc+0x17f/0x1a0 [ 1370.127226][T26371] __do_page_cache_readahead+0x13a/0x380 [ 1370.132902][T26371] filemap_fault+0xeeb/0x1120 [ 1370.137602][T26371] __do_fault+0xa8/0x1e0 [ 1370.141887][T26371] __handle_mm_fault+0x1d2d/0x2cf0 [ 1370.147490][T26371] handle_mm_fault+0x21c/0x540 [ 1370.152516][T26371] do_page_fault+0x4a4/0xa52 [ 1370.157319][T26371] page_fault+0x34/0x40 [ 1370.161534][T26371] RIP: 0010:__put_user_4+0x1c/0x30 [ 1370.166745][T26371] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 8c 01 00 48 8b 9b 50 0b 00 00 48 83 eb 03 48 39 d9 73 4a 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 1370.186631][T26371] RSP: 0018:ffffc9000878fdd8 EFLAGS: 00010293 [ 1370.192794][T26371] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 1370.200783][T26371] RDX: 0000000000000000 RSI: ffffffff8247f35c RDI: ffff888129d7c84c [ 1370.208950][T26371] RBP: ffff8881252b99c0 R08: 0000000000000000 R09: 0000888129d7c84c [ 1370.216936][T26371] R10: 0000c9000878fd44 R11: 0000888129d7c84f R12: 0000000000001279 [ 1370.224913][T26371] R13: 00000000fffffdfd R14: 0000000020000040 R15: 0000000020000040 [ 1370.232914][T26371] ? blkdev_common_ioctl+0x9fc/0xea0 [ 1370.238208][T26371] blkdev_common_ioctl+0xa3c/0xea0 [ 1370.243333][T26371] blkdev_ioctl+0x130/0x420 [ 1370.247846][T26371] block_ioctl+0x91/0xb0 [ 1370.252099][T26371] ? blkdev_fallocate+0x2e0/0x2e0 [ 1370.257331][T26371] ksys_ioctl+0x101/0x150 [ 1370.261693][T26371] __x64_sys_ioctl+0x47/0x60 [ 1370.267622][T26371] do_syscall_64+0xc7/0x390 [ 1370.275276][T26371] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1370.281178][T26371] RIP: 0033:0x45c889 [ 1370.285086][T26371] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1370.304762][T26371] RSP: 002b:00007f4a39453c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:34:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x2000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:03 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0xc0189436, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1370.313191][T26371] RAX: ffffffffffffffda RBX: 00007f4a394546d4 RCX: 000000000045c889 [ 1370.321192][T26371] RDX: 0000000020000040 RSI: 0000000000001279 RDI: 0000000000000003 [ 1370.329270][T26371] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1370.337433][T26371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1370.345494][T26371] R13: 000000000000021c R14: 00000000004c4462 R15: 0000000000000003 03:34:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x3000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:03 executing program 2 (fault-call:2 fault-nth:4): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:34:03 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x2405, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:03 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x2, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x4000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:03 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1370.783866][T26597] FAULT_INJECTION: forcing a failure. [ 1370.783866][T26597] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:34:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x5000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1370.852576][T26597] CPU: 0 PID: 26597 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1370.861295][T26597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1370.871377][T26597] Call Trace: [ 1370.875381][T26597] dump_stack+0x11d/0x187 [ 1370.879796][T26597] should_fail.cold+0x5/0xf [ 1370.884331][T26597] __alloc_pages_nodemask+0xcf/0x310 [ 1370.889647][T26597] alloc_pages_current+0xca/0x170 [ 1370.894823][T26597] __page_cache_alloc+0x17f/0x1a0 [ 1370.899877][T26597] __do_page_cache_readahead+0x13a/0x380 [ 1370.905585][T26597] filemap_fault+0xeeb/0x1120 [ 1370.910659][T26597] __do_fault+0xa8/0x1e0 [ 1370.915033][T26597] __handle_mm_fault+0x1d2d/0x2cf0 [ 1370.920344][T26597] handle_mm_fault+0x21c/0x540 [ 1370.925128][T26597] do_page_fault+0x4a4/0xa52 [ 1370.929736][T26597] page_fault+0x34/0x40 [ 1370.933958][T26597] RIP: 0010:__put_user_4+0x1c/0x30 [ 1370.939083][T26597] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 8c 01 00 48 8b 9b 50 0b 00 00 48 83 eb 03 48 39 d9 73 4a 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 1370.958830][T26597] RSP: 0018:ffffc900148e3dd8 EFLAGS: 00010293 [ 1370.965111][T26597] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 1370.973764][T26597] RDX: 0000000000000000 RSI: ffffffff8247f35c RDI: ffff888129d7c84c [ 1370.981734][T26597] RBP: ffff8881252b99c0 R08: 0000000000000000 R09: 0000888129d7c84c [ 1370.989796][T26597] R10: 0000c900148e3d44 R11: 0000888129d7c84f R12: 0000000000001279 [ 1370.998510][T26597] R13: 00000000fffffdfd R14: 0000000020000040 R15: 0000000020000040 [ 1371.009077][T26597] ? blkdev_common_ioctl+0x9fc/0xea0 [ 1371.016311][T26597] blkdev_common_ioctl+0xa3c/0xea0 [ 1371.021745][T26597] blkdev_ioctl+0x130/0x420 [ 1371.026605][T26597] block_ioctl+0x91/0xb0 [ 1371.030852][T26597] ? blkdev_fallocate+0x2e0/0x2e0 [ 1371.037456][T26597] ksys_ioctl+0x101/0x150 [ 1371.041966][T26597] __x64_sys_ioctl+0x47/0x60 [ 1371.047572][T26597] do_syscall_64+0xc7/0x390 [ 1371.052313][T26597] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1371.058342][T26597] RIP: 0033:0x45c889 [ 1371.062236][T26597] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1371.081950][T26597] RSP: 002b:00007f4a39453c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1371.090371][T26597] RAX: ffffffffffffffda RBX: 00007f4a394546d4 RCX: 000000000045c889 [ 1371.098330][T26597] RDX: 0000000020000040 RSI: 0000000000001279 RDI: 0000000000000003 [ 1371.106289][T26597] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1371.114299][T26597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1371.122269][T26597] R13: 000000000000021c R14: 00000000004c4462 R15: 0000000000000004 03:34:04 executing program 2 (fault-call:2 fault-nth:5): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:34:04 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x4c00, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x6000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1371.279881][ T27] audit: type=1800 audit(1586576044.244:645): pid=26711 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=814 res=0 [ 1371.386254][T26876] FAULT_INJECTION: forcing a failure. [ 1371.386254][T26876] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:34:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x8000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1371.505631][T26876] CPU: 1 PID: 26876 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1371.514432][T26876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1371.524488][T26876] Call Trace: [ 1371.527842][T26876] dump_stack+0x11d/0x187 [ 1371.532260][T26876] should_fail.cold+0x5/0xf [ 1371.536790][T26876] __alloc_pages_nodemask+0xcf/0x310 [ 1371.542278][T26876] alloc_pages_current+0xca/0x170 [ 1371.547479][T26876] __page_cache_alloc+0x17f/0x1a0 [ 1371.552571][T26876] __do_page_cache_readahead+0x13a/0x380 [ 1371.558258][T26876] filemap_fault+0xeeb/0x1120 [ 1371.562990][T26876] __do_fault+0xa8/0x1e0 [ 1371.567404][T26876] __handle_mm_fault+0x1d2d/0x2cf0 [ 1371.572557][T26876] handle_mm_fault+0x21c/0x540 [ 1371.577341][T26876] do_page_fault+0x4a4/0xa52 [ 1371.581947][T26876] page_fault+0x34/0x40 [ 1371.586108][T26876] RIP: 0010:__put_user_4+0x1c/0x30 [ 1371.591244][T26876] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 8c 01 00 48 8b 9b 50 0b 00 00 48 83 eb 03 48 39 d9 73 4a 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 1371.611077][T26876] RSP: 0018:ffffc900149dbdd8 EFLAGS: 00010293 [ 1371.617183][T26876] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 1371.625251][T26876] RDX: 0000000000000000 RSI: ffffffff8247f35c RDI: ffff888129d7c84c [ 1371.633275][T26876] RBP: ffff8881252b99c0 R08: 0000000000000000 R09: 0000888129d7c84c [ 1371.641253][T26876] R10: 0000c900149dbd44 R11: 0000888129d7c84f R12: 0000000000001279 [ 1371.649344][T26876] R13: 00000000fffffdfd R14: 0000000020000040 R15: 0000000020000040 [ 1371.657528][T26876] ? blkdev_common_ioctl+0x9fc/0xea0 [ 1371.662802][T26876] blkdev_common_ioctl+0xa3c/0xea0 [ 1371.668202][T26876] blkdev_ioctl+0x130/0x420 [ 1371.672695][T26876] block_ioctl+0x91/0xb0 [ 1371.676977][T26876] ? blkdev_fallocate+0x2e0/0x2e0 [ 1371.681987][T26876] ksys_ioctl+0x101/0x150 [ 1371.686317][T26876] __x64_sys_ioctl+0x47/0x60 [ 1371.690905][T26876] do_syscall_64+0xc7/0x390 [ 1371.695395][T26876] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1371.701271][T26876] RIP: 0033:0x45c889 [ 1371.705153][T26876] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1371.724739][T26876] RSP: 002b:00007f4a39453c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1371.733162][T26876] RAX: ffffffffffffffda RBX: 00007f4a394546d4 RCX: 000000000045c889 [ 1371.741123][T26876] RDX: 0000000020000040 RSI: 0000000000001279 RDI: 0000000000000003 [ 1371.749107][T26876] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1371.757102][T26876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1371.765079][T26876] R13: 000000000000021c R14: 00000000004c4462 R15: 0000000000000005 03:34:04 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0xc020660b, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:04 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x4c01, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x9000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xa000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:05 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x10, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:05 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x5, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000001c0)={[0x5, 0x4, 0x5, 0x3, 0x2, 0x4, 0x0, 0xd4, 0x0, 0x6, 0x4, 0x8, 0x80000001, 0x81, 0x3, 0x6], 0x6000, 0x230300}) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB="ee0a0000551815d979ac480280f17dfaf24fb2be58f02237f73252465712de1879c593d100c97e4262643edf0decdb5accaf3ce6c98c63c995e49a5c23adbd966f8c000018cebf40bda0ab247b8554a0ee8aaced4f916db5583c798203a266cd0fc37fbb8c743fad2e9fdb4e6502b4b05b0205e9511f630a9d2103c9614fefe3b1105ddf4e8d99db5920fd343cfce999e11fbfb1e8f0b232a793ee7d36badb096a5b4d0439570ae1dd4aa1da7400f10fab88029c120aeb1333a6948fe56853ae60896f7e6233a127cbe76c71f1057737c31d34482bd991", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$VIDIOC_G_FBUF(r4, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)="5c9820a4bc8975c2c2b78e211cc5d8129860b87ef253b895fb4c5380b605cc4e4003bd19a64f256e0645db25fb88a876eb0467f2b180061ed8aabef6d393afe326efa053847bff2589ff5855408f5f7f2cb64e51d1c035de071ce84f53c1a9873a90d61bf09f6472150bfb32af393ada5c7a69820bc8f42cff1b5eff5e73f1131fa6a9df181aa42398fca505566222b9562dbc665f681a421d94b8eef30f61159248157e0a1ca378147edc1e449c79820218c876c60b413c87327645727624e07ba3378860ebbef0a8c0da6d7ac22eb9fde059a4952990a66f386ea0fa1e893472fea8189214735a9cf935a0eccdbaf192d36dcc0c89", {0x9, 0x7913, 0x49323159, 0x4, 0x2, 0x2, 0xc, 0x7}}) 03:34:05 executing program 2 (fault-call:2 fault-nth:6): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:34:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xb000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:05 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 03:34:05 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x4c04, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1372.207326][T27264] FAT-fs (loop5): bogus number of reserved sectors [ 1372.221816][T27264] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1372.277962][ T27] audit: type=1800 audit(1586576045.244:646): pid=27264 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16612 res=0 03:34:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xe000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:05 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200440, 0x0) write$9p(r2, &(0x7f00000001c0)="acc940744e53119adc2a9d7cbcb5b48942dcb4bcc80819c96d3a958b6be3992a36c0d5b51dd3da59405c11d27c8a27cd497c6fe50908636889e291f83576eb1d36b1f13ea7", 0x45) [ 1372.556871][ T27] audit: type=1800 audit(1586576045.524:647): pid=27384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=815 res=0 03:34:05 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0xc028660f, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:05 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x2, &(0x7f0000000040)) 03:34:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xf000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:05 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SNDRV_PCM_IOCTL_LINK(r3, 0x40044160, &(0x7f0000000040)=0x80000000) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r5, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r5, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1373.059115][ T27] audit: type=1800 audit(1586576046.024:648): pid=27705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=816 res=0 03:34:06 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x1276, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:06 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x4c05, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x10000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:06 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x10, &(0x7f0000000040)) 03:34:06 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000200)={0xfff, 0x8, 0x2, 0x5, 0x3560, 0x7}) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x6, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) ioctl$KVM_GET_DEVICE_ATTR(r5, 0x4018aee2, &(0x7f00000000c0)={0x0, 0x1, 0x9, &(0x7f0000000040)=0x7}) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:34:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x11000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:06 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x301, &(0x7f0000000040)) [ 1373.383728][ T27] audit: type=1800 audit(1586576046.354:649): pid=27934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=817 res=0 03:34:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x12000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:06 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0xc02c5638, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:06 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x5411, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:06 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x125d, &(0x7f0000000040)) 03:34:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x13000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:07 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x2203, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:07 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r4, 0x800455d1, &(0x7f00000000c0)) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000040)) getresgid(0x0, 0x0, &(0x7f0000000140)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) 03:34:07 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x125e, &(0x7f0000000040)) 03:34:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x14000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:07 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x541b, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1374.288922][ T27] audit: type=1800 audit(1586576047.254:650): pid=28478 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=818 res=0 03:34:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x40000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:07 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x125f, &(0x7f0000000040)) 03:34:07 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r2) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1374.686903][ T27] audit: type=1800 audit(1586576047.654:651): pid=28700 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=819 res=0 03:34:07 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0xc058560f, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x60000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:07 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x5421, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:07 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1260, &(0x7f0000000040)) 03:34:08 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x4c00, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:08 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040)=0x2, 0x4) fcntl$setstatus(r2, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r2, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x210882, 0x0) getpeername$ax25(r3, &(0x7f00000001c0)={{0x3, @rose}, [@netrom, @remote, @remote, @rose, @default, @remote, @null, @rose]}, &(0x7f0000000240)=0x48) r4 = socket$xdp(0x2c, 0x3, 0x0) fadvise64(r4, 0x7, 0x4, 0x1) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:34:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x9effffff, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:08 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1261, &(0x7f0000000040)) 03:34:08 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x5450, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xa0000000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1375.338795][ T27] audit: type=1800 audit(1586576048.304:652): pid=29133 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=820 res=0 03:34:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xb15d0000, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:08 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1262, &(0x7f0000000040)) 03:34:09 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0xc06864a2, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xf0ffffff, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:09 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1263, &(0x7f0000000040)) 03:34:09 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x5451, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:09 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x4c01, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:09 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) socket$inet6(0xa, 0x2, 0xfffffff9) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r0}, &(0x7f000034f000)=0x2059b000) r1 = syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, r1, 0x0, 0x0, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x200020d0}, 0x40000) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r1, 0x600, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x4000) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r3 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101400, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r3, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f00000000c0)) 03:34:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xfcffffff, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:09 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x5452, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1376.475504][ T27] audit: type=1800 audit(1586576049.444:653): pid=29678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=821 res=0 03:34:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xffffff7f, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xffffff9e, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:09 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x5460, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:09 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020488a7e9aec60bbce7", 0x16}], 0x1, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1377.090076][T29975] FAT-fs (loop5): invalid media value (0xe7) [ 1377.102978][T29975] FAT-fs (loop5): Can't find a valid FAT filesystem 03:34:10 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x2}) 03:34:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xfffffff0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:31 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1264, &(0x7f0000000040)) 03:34:31 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x6364, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:31 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x0, &(0x7f0000000180), 0x800042, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f00000001c0)="f4390909be1b4ffff3fafd8f785b8882d0cff5da01b272eed8b0cbff6418d8034f1153a9c6c00e75c41dc85dac998ff97cdc3245a8971fe0057977f2bed89d2be95eb67212bd43fdce1d6f0958d149edc379689487e41013a3da97404d004d5e458e002c38ba03017d78fc180d44688d1065f6d98395436243eb9495fdbd364ceecf40dccac647c911ce7d33355579fdd2a8bb238180476b630c9627", 0x9c, 0xfffffffffffffffa) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) r4 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) r5 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r5, 0x4, 0x42000) r6 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x42000) poll(&(0x7f00000002c0)=[{r3, 0xa0}, {r4, 0x8140}, {r2, 0x482}, {r5, 0xa8}, {r6, 0x4000}, {r1, 0x4008}], 0x6, 0x9) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:34:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0xfffffffc, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:31 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x540e, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:34:31 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x3}) 03:34:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1399.152551][T30429] FAT-fs (loop5): bogus number of reserved sectors [ 1399.200998][T30471] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1399.248355][T30429] FAT-fs (loop5): Can't find a valid FAT filesystem 03:34:32 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x8901, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1399.299274][T30471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:34:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0x2, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:32 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8000aea, 0x5}, 0x450, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x6, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x20}) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:34:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0x3, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:34:32 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x8902, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1399.666882][ T27] audit: type=1800 audit(1586576072.634:654): pid=30752 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=822 res=0 03:35:06 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1265, &(0x7f0000000040)) 03:35:06 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x5411, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:35:06 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x8903, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:35:06 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x4}) 03:35:06 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x8, &(0x7f0000000040)='selinux\x00', 0xffffffffffffffff}, 0x30) r2 = gettid() tkill(r2, 0x1000000000016) r3 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1, 0x80283, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8001}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fcntl$setstatus(r3, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r3, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x34000, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x004', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:35:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0x4, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:35:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0x5, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1433.861489][ T27] audit: type=1800 audit(1586576106.824:655): pid=31180 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=823 res=0 03:35:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0x6, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:35:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0x8, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:35:07 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x8904, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:35:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0x9, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:35:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0xa, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:35:28 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1267, &(0x7f0000000040)) 03:35:28 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x541b, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:35:28 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x3a2bfb22333f30d5, 0x80) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:35:28 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x5}) 03:35:28 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x8906, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:35:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0xb, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1456.025960][ T27] audit: type=1800 audit(1586576128.994:656): pid=31517 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=824 res=0 03:35:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0xe, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1456.161390][T31631] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1456.199952][T31631] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:35:29 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x400, 0x250000) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x82000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x3}, 0x0, 0x1, 0x0, 0x2, 0x0, 0x20000000, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r1, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) 03:35:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0xf, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:35:29 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x8907, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1456.381476][ T27] audit: type=1800 audit(1586576129.344:657): pid=31738 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=825 res=0 03:35:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0x10, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:35:29 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x890b, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:35:50 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$BLKIOOPT(r0, 0x1268, &(0x7f0000000040)) 03:35:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0x11, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:35:50 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r1, 0x5421, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:35:50 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x890c, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:35:50 executing program 3: r0 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f000034f000)) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000080)={0x0, 0x8}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) exit(0x5000000) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f00000001c0)={'hsr0\x00', 0x9}) 03:35:50 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0xc0c0, 0x0) setuid(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = gettid() tkill(r3, 0x1000000000016) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x218170}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB='\b\x00\b\x00', @ANYRES32=0x0, @ANYBLOB="040080000004006300e603028008002e00", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="3d016a8008007e00", @ANYRES32=r2, @ANYBLOB="fcc3fbd764d3d31059c63ef5a446ab2c12af1e52fa08005900", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="8a0600bd1e54d78f468ea9ab3857560809f975187569309614ebc5f9ce6ee0fad0216b912a519c6b63a2d8c33fdf050e785b9733523ce94a81298117cfba703784b66f5095d52db928c3d692e70f62c47fde7f08f4dcaf89749f0a0917a1405962092789fbbe667bf5ee65b82f3cad922987d6c79c3f9830c8c990865a36f1171c7651c714fd7fa1c2cfcd04cf33be2d89d696d0c4dd3a8db23e925038b1cd5d31818fb5f26c8ecb42664d0d0aa3737768670dca57000000"], 0xf}, 0x1, 0x0, 0x0, 0x4004000}, 0x1) r6 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x42000) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10010, r6, 0x4cbc2000) unlink(&(0x7f0000000080)='./file0\x00') openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000140)) [ 1477.129073][T32277] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1477.193730][T32277] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:35:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0x12, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) [ 1477.224117][ T27] audit: type=1800 audit(1586576150.194:658): pid=32281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=826 res=0 03:35:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0x13, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:35:50 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x890d, &(0x7f00000001c0)={'hsr0\x00', 0x1}) 03:35:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0x14, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:35:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=@newsa={0x14c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr=0x60, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}, @XFRMA_SET_MARK_MASK={0x8}, @XFRMA_SET_MARK={0x8}]}, 0x14c}}, 0x0) 03:35:50 executing program 1: r0 = socket(0x11, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4040000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xf6) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r5, 0x8912, &(0x7f00000001c0)={'hsr0\x00', 0x1}) [ 1490.653542][ C1] ================================================================== [ 1490.661707][ C1] BUG: KCSAN: data-race in bio_endio / blk_update_request [ 1490.668888][ C1] [ 1490.671286][ C1] write to 0xffff8881241b7f14 of 2 bytes by interrupt on cpu 0: [ 1490.678910][ C1] blk_update_request+0x35a/0x7a0 [ 1490.683932][ C1] blk_mq_end_request+0x4e/0x2f0 [ 1490.688888][ C1] end_cmd+0xa4/0x190 [ 1490.692884][ C1] null_complete_rq+0x1f/0x30 [ 1490.697551][ C1] blk_done_softirq+0x1e6/0x250 [ 1490.702398][ C1] __do_softirq+0x118/0x34a [ 1490.707417][ C1] run_ksoftirqd+0x41/0x60 [ 1490.712199][ C1] smpboot_thread_fn+0x374/0x4a0 [ 1490.717150][ C1] kthread+0x1cb/0x1f0 [ 1490.721228][ C1] ret_from_fork+0x1f/0x30 [ 1490.725655][ C1] [ 1490.727987][ C1] read to 0xffff8881241b7f14 of 2 bytes by interrupt on cpu 1: [ 1490.735525][ C1] bio_endio+0x3c/0x3e0 [ 1490.739678][ C1] blk_update_request+0x418/0x7a0 [ 1490.744717][ C1] blk_mq_end_request+0x4e/0x2f0 [ 1490.749657][ C1] end_cmd+0xa4/0x190 [ 1490.753635][ C1] null_complete_rq+0x1f/0x30 [ 1490.758304][ C1] blk_done_softirq+0x1e6/0x250 [ 1490.763151][ C1] __do_softirq+0x118/0x34a [ 1490.767650][ C1] run_ksoftirqd+0x41/0x60 [ 1490.772062][ C1] smpboot_thread_fn+0x374/0x4a0 [ 1490.776993][ C1] kthread+0x1cb/0x1f0 [ 1490.781057][ C1] ret_from_fork+0x1f/0x30 [ 1490.785459][ C1] [ 1490.787779][ C1] Reported by Kernel Concurrency Sanitizer on: [ 1490.793928][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.6.0-rc1-syzkaller #0 [ 1490.802070][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1490.812114][ C1] ================================================================== [ 1490.820253][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 1490.826838][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.6.0-rc1-syzkaller #0 [ 1490.834984][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1490.845126][ C1] Call Trace: [ 1490.848449][ C1] dump_stack+0x11d/0x187 [ 1490.852800][ C1] panic+0x210/0x640 [ 1490.856702][ C1] ? __read_once_size+0x45/0xd0 [ 1490.861551][ C1] ? vprintk_func+0x89/0x13a [ 1490.866148][ C1] kcsan_report.cold+0xc/0xf [ 1490.870830][ C1] kcsan_setup_watchpoint+0x3fb/0x440 [ 1490.876201][ C1] bio_endio+0x3c/0x3e0 [ 1490.880347][ C1] ? bio_advance+0x1d2/0x250 [ 1490.884941][ C1] blk_update_request+0x418/0x7a0 [ 1490.889968][ C1] blk_mq_end_request+0x4e/0x2f0 [ 1490.894903][ C1] end_cmd+0xa4/0x190 [ 1490.898895][ C1] null_complete_rq+0x1f/0x30 [ 1490.903570][ C1] blk_done_softirq+0x1e6/0x250 [ 1490.908457][ C1] __do_softirq+0x118/0x34a [ 1490.913090][ C1] ? takeover_tasklets+0x240/0x240 [ 1490.918285][ C1] run_ksoftirqd+0x41/0x60 [ 1490.922700][ C1] smpboot_thread_fn+0x374/0x4a0 [ 1490.927639][ C1] ? constant_test_bit.constprop.0+0x30/0x30 [ 1490.933622][ C1] kthread+0x1cb/0x1f0 [ 1490.937690][ C1] ? kthread_unpark+0xd0/0xd0 [ 1490.942361][ C1] ret_from_fork+0x1f/0x30 [ 1490.948554][ C1] Kernel Offset: disabled [ 1490.952982][ C1] Rebooting in 86400 seconds..