0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x110, 0x8080fffffffe) 21:30:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xc7d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:30:55 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xc, 0x8080fffffffe) 21:30:55 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x231, 0x8080fffffffe) 21:30:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:30:55 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xc00, 0x8080fffffffe) [ 751.909579][ T394] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 751.932268][ T394] FAT-fs (loop4): Filesystem has been set read-only 21:30:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xc81, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:30:56 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x121, 0x8080fffffffe) [ 752.256424][ T414] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 21:30:56 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xbb, 0x8080fffffffe) [ 752.318894][ T414] FAT-fs (loop0): Filesystem has been set read-only [ 752.355283][ T519] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 752.369992][ T519] FAT-fs (loop3): Filesystem has been set read-only 21:30:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xc85, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:30:56 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x242, 0x8080fffffffe) 21:30:56 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xf00, 0x8080fffffffe) 21:30:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xc89, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 752.787109][ T25] kauditd_printk_skb: 6 callbacks suppressed [ 752.787130][ T25] audit: type=1804 audit(1573421456.568:116): pid=662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/421/file0/file0" dev="sda1" ino=16973 res=1 21:30:56 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xbb, 0x8080fffffffe) 21:30:56 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x132, 0x8080fffffffe) 21:30:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xc8d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 753.013193][ T666] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 21:30:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x21, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 753.053732][ T666] FAT-fs (loop0): Filesystem has been set read-only [ 753.174117][ T25] audit: type=1804 audit(1573421456.968:117): pid=688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/465/file0/file0" dev="sda1" ino=16705 res=1 21:30:57 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x253, 0x8080fffffffe) 21:30:57 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xff6, 0x8080fffffffe) 21:30:57 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xbb, 0x8080fffffffe) 21:30:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xc91, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:30:57 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x143, 0x8080fffffffe) [ 753.838015][ T25] audit: type=1804 audit(1573421457.628:118): pid=816 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/386/file0/file0" dev="sda1" ino=16978 res=1 [ 753.877581][ T820] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 21:30:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xc95, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 753.895809][ T820] FAT-fs (loop3): Filesystem has been set read-only 21:30:57 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x242, 0x8080fffffffe) 21:30:57 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x264, 0x8080fffffffe) 21:30:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x22, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:30:58 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1302, 0x8080fffffffe) 21:30:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xc99, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 754.399049][ T25] audit: type=1804 audit(1573421458.188:119): pid=1074 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/423/file0/file0" dev="sda1" ino=16689 res=1 21:30:58 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x242, 0x8080fffffffe) 21:30:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xc9d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 754.501523][ T1028] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 754.531853][ T1028] FAT-fs (loop0): Filesystem has been set read-only 21:30:58 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x154, 0x8080fffffffe) 21:30:58 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x275, 0x8080fffffffe) 21:30:58 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x242, 0x8080fffffffe) [ 754.840182][ T25] audit: type=1804 audit(1573421458.628:120): pid=1096 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/467/file0/file0" dev="sda1" ino=17041 res=1 21:30:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xca1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:30:58 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2000, 0x8080fffffffe) 21:30:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xca5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 755.176624][ T25] audit: type=1804 audit(1573421458.968:121): pid=1315 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/424/file0/file0" dev="sda1" ino=17025 res=1 21:30:59 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b, 0x8080fffffffe) [ 755.348402][ T1219] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 21:30:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x23, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 755.412411][ T1219] FAT-fs (loop0): Filesystem has been set read-only 21:30:59 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x165, 0x8080fffffffe) 21:30:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xca9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 755.641680][ T25] audit: type=1804 audit(1573421459.428:122): pid=1365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/468/file0/file0" dev="sda1" ino=16956 res=1 21:30:59 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x286, 0x8080fffffffe) 21:30:59 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2701, 0x8080fffffffe) [ 755.863457][ T1356] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 21:30:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xcad, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 755.979191][ T1356] FAT-fs (loop2): Filesystem has been set read-only 21:30:59 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x10, 0x8080fffffffe) 21:31:00 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x176, 0x8080fffffffe) 21:31:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xcb1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 756.219094][ T25] audit: type=1804 audit(1573421460.008:123): pid=1385 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/389/file0/file0" dev="sda1" ino=17105 res=1 21:31:00 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x297, 0x8080fffffffe) [ 756.332246][ T25] audit: type=1804 audit(1573421460.108:124): pid=1400 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/469/file0/file0" dev="sda1" ino=17121 res=1 21:31:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xcb9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:00 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b00, 0x8080fffffffe) 21:31:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x24, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:31:00 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x10, 0x8080fffffffe) [ 756.683192][ T1420] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 756.702065][ T1420] FAT-fs (loop4): Filesystem has been set read-only [ 756.807083][ T1478] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 756.820113][ T1478] FAT-fs (loop0): Filesystem has been set read-only 21:31:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xcc1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:00 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x187, 0x8080fffffffe) 21:31:00 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2a8, 0x8080fffffffe) [ 757.153546][ T25] audit: type=1804 audit(1573421460.928:125): pid=1675 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/470/file0/file0" dev="sda1" ino=16999 res=1 21:31:01 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x10, 0x8080fffffffe) 21:31:01 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4000, 0x8080fffffffe) 21:31:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xcc9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 757.369135][ T1676] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 757.399730][ T1676] FAT-fs (loop4): Filesystem has been set read-only [ 757.538407][ T1685] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 757.590581][ T1685] FAT-fs (loop0): Filesystem has been set read-only 21:31:01 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x198, 0x8080fffffffe) 21:31:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x66, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 757.727793][ T1703] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 21:31:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xccd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 757.799900][ T1696] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 757.805007][ T1703] FAT-fs (loop3): Filesystem has been set read-only [ 757.868063][ T1696] FAT-fs (loop2): Filesystem has been set read-only [ 757.904359][ T1696] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 21:31:01 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2b9, 0x8080fffffffe) 21:31:01 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4800, 0x8080fffffffe) 21:31:01 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x297, 0x8080fffffffe) 21:31:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xcd1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 758.114168][ T25] audit: type=1804 audit(1573421461.908:126): pid=1737 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/428/file0/file0" dev="sda1" ino=16593 res=1 21:31:02 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1a9, 0x8080fffffffe) 21:31:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xce9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 758.517870][ T25] audit: type=1804 audit(1573421462.308:127): pid=1745 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/392/file0/file0" dev="sda1" ino=16987 res=1 [ 758.687743][ T25] audit: type=1804 audit(1573421462.468:128): pid=1789 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/472/file0/file0" dev="sda1" ino=16994 res=1 21:31:02 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2ca, 0x8080fffffffe) 21:31:02 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4c00, 0x8080fffffffe) [ 758.799828][ T1755] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 21:31:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xcfd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 758.841779][ T25] audit: type=1804 audit(1573421462.628:129): pid=1795 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/429/file0/file0" dev="sda1" ino=17297 res=1 21:31:02 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1ba, 0x8080fffffffe) 21:31:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6c, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 758.894344][ T1755] FAT-fs (loop2): Filesystem has been set read-only 21:31:02 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4800, 0x8080fffffffe) 21:31:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xe25, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 759.400092][ T25] audit: type=1804 audit(1573421463.188:130): pid=1833 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/473/file0/file0" dev="sda1" ino=16516 res=1 21:31:03 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6000, 0x8080fffffffe) 21:31:03 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2db, 0x8080fffffffe) [ 759.497551][ T25] audit: type=1804 audit(1573421463.248:131): pid=1838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/430/file0/file0" dev="sda1" ino=16947 res=1 21:31:03 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1cb, 0x8080fffffffe) 21:31:03 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4800, 0x8080fffffffe) 21:31:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xe51, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 759.859793][ T1953] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 759.894752][ T1953] FAT-fs (loop3): Filesystem has been set read-only [ 759.929879][ T25] audit: type=1804 audit(1573421463.718:132): pid=1946 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/394/file0/file0" dev="sda1" ino=16986 res=1 21:31:03 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4800, 0x8080fffffffe) 21:31:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xe65, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6f, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:31:03 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2ec, 0x8080fffffffe) 21:31:04 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6201, 0x8080fffffffe) [ 760.251540][ T25] audit: type=1804 audit(1573421464.038:133): pid=2071 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/431/file0/file0" dev="sda1" ino=16784 res=1 [ 760.374301][ T25] audit: type=1804 audit(1573421464.038:134): pid=2085 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/431/file0/file0" dev="sda1" ino=16784 res=1 21:31:04 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2ca, 0x8080fffffffe) 21:31:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xe85, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:04 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1dc, 0x8080fffffffe) [ 760.658246][ T25] audit: type=1804 audit(1573421464.448:135): pid=2198 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/395/file0/file0" dev="sda1" ino=16755 res=1 21:31:04 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2fd, 0x8080fffffffe) 21:31:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xeb5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:04 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6800, 0x8080fffffffe) 21:31:04 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2ca, 0x8080fffffffe) 21:31:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xebd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:04 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1ed, 0x8080fffffffe) 21:31:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x70, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:31:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xed5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:05 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2ca, 0x8080fffffffe) 21:31:05 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x30e, 0x8080fffffffe) 21:31:05 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6c00, 0x8080fffffffe) 21:31:05 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1fe, 0x8080fffffffe) 21:31:05 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6800, 0x8080fffffffe) 21:31:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xee9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xef1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 762.144529][ T2615] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 762.153231][ T2615] FAT-fs (loop4): Filesystem has been set read-only [ 762.178563][ T2605] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 21:31:06 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7400, 0x8080fffffffe) [ 762.247132][ T2614] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 762.262199][ T2605] FAT-fs (loop2): Filesystem has been set read-only [ 762.316457][ T2614] FAT-fs (loop0): Filesystem has been set read-only 21:31:06 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x20f, 0x8080fffffffe) 21:31:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x71, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:31:06 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xc, 0x8080fffffffe) 21:31:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xef9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:06 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x31f, 0x8080fffffffe) 21:31:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xefd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 762.921422][ T2662] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) 21:31:06 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7600, 0x8080fffffffe) [ 762.979152][ T2662] FAT-fs (loop4): Filesystem has been set read-only 21:31:06 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xc, 0x8080fffffffe) 21:31:06 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x330, 0x8080fffffffe) 21:31:07 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x220, 0x8080fffffffe) 21:31:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf01, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 763.528612][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 763.528680][ T25] audit: type=1804 audit(1573421467.318:140): pid=2836 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/479/file0" dev="sda1" ino=16689 res=1 21:31:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x72, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:31:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf05, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 763.713184][ T2816] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 763.772513][ T25] audit: type=1804 audit(1573421467.558:141): pid=2847 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/436/file0/file0" dev="sda1" ino=16965 res=1 [ 763.779167][ T2816] FAT-fs (loop2): Filesystem has been set read-only 21:31:07 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7a00, 0x8080fffffffe) [ 763.862417][ T2816] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 763.927779][ T25] audit: type=1804 audit(1573421467.618:142): pid=2827 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/399/file0/file0" dev="sda1" ino=16956 res=1 21:31:07 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x231, 0x8080fffffffe) 21:31:07 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x341, 0x8080fffffffe) 21:31:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf09, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:07 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x66, 0x8080fffffffe) 21:31:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf0d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 764.336352][ T25] audit: type=1804 audit(1573421468.128:143): pid=2885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/480/file0" dev="sda1" ino=16784 res=1 21:31:08 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x66, 0x8080fffffffe) 21:31:08 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x9d01, 0x8080fffffffe) [ 764.727950][ T25] audit: type=1804 audit(1573421468.518:144): pid=2881 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/400/file0" dev="sda1" ino=17537 res=1 21:31:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf11, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:08 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x242, 0x8080fffffffe) 21:31:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x73, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:31:08 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x352, 0x8080fffffffe) 21:31:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf15, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 765.267857][ T25] audit: type=1804 audit(1573421469.058:145): pid=3108 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/481/file0" dev="sda1" ino=16944 res=1 [ 765.280770][ T3023] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 765.308498][ T3014] blk_update_request: I/O error, dev loop3, sector 72 op 0x0:(READ) flags 0x80700 phys_seg 17 prio class 0 [ 765.332837][ T3023] FAT-fs (loop0): Filesystem has been set read-only 21:31:09 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x66, 0x8080fffffffe) 21:31:09 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xb100, 0x8080fffffffe) 21:31:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf19, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:09 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x363, 0x8080fffffffe) [ 765.623066][ T25] audit: type=1804 audit(1573421469.418:146): pid=3184 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/438/file0/file0" dev="sda1" ino=17745 res=1 21:31:09 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x253, 0x8080fffffffe) 21:31:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf1d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x74, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 766.021347][ T25] audit: type=1804 audit(1573421469.808:147): pid=3353 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/482/file0/file0" dev="sda1" ino=17729 res=1 21:31:09 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x242, 0x8080fffffffe) [ 766.161449][ T3262] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 766.188908][ T3262] FAT-fs (loop0): Filesystem has been set read-only 21:31:10 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xd607, 0x8080fffffffe) [ 766.356102][ T3354] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 766.422019][ T3354] FAT-fs (loop4): Filesystem has been set read-only 21:31:10 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x374, 0x8080fffffffe) 21:31:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf21, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:10 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x242, 0x8080fffffffe) 21:31:10 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x264, 0x8080fffffffe) 21:31:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf25, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 766.851397][ T25] audit: type=1804 audit(1573421470.638:148): pid=3542 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/483/file0/file0" dev="sda1" ino=17425 res=1 21:31:10 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x242, 0x8080fffffffe) 21:31:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x75, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 767.074953][ T25] audit: type=1804 audit(1573421470.868:149): pid=3611 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/403/file0/file0" dev="sda1" ino=17028 res=1 21:31:10 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xd801, 0x8080fffffffe) 21:31:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf29, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:11 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x385, 0x8080fffffffe) 21:31:11 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x275, 0x8080fffffffe) 21:31:11 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7, 0x8080fffffffe) 21:31:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf2d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 767.669933][ T3748] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 767.722020][ T3748] FAT-fs (loop3): Filesystem has been set read-only 21:31:11 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xec00, 0x8080fffffffe) 21:31:11 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7, 0x8080fffffffe) 21:31:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf31, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:11 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x396, 0x8080fffffffe) 21:31:11 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x286, 0x8080fffffffe) 21:31:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x76, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:31:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf35, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:12 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7, 0x8080fffffffe) [ 768.543141][ T4024] blk_update_request: I/O error, dev loop3, sector 112 op 0x0:(READ) flags 0x80700 phys_seg 17 prio class 0 21:31:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf39, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:12 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xf60f, 0x8080fffffffe) [ 768.793257][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 768.793336][ T25] audit: type=1804 audit(1573421472.588:154): pid=4020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/405/file0/file0" dev="sda1" ino=17393 res=1 [ 768.914792][ T25] audit: type=1804 audit(1573421472.688:155): pid=4048 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/442/file0/file0" dev="sda1" ino=17881 res=1 21:31:12 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3a7, 0x8080fffffffe) 21:31:12 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x297, 0x8080fffffffe) 21:31:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf3d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 769.106573][ T4045] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 769.116305][ T4045] FAT-fs (loop2): Filesystem has been set read-only [ 769.135794][ T4045] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 21:31:13 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x286, 0x8080fffffffe) 21:31:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf41, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x7a, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 769.549762][ T25] audit: type=1804 audit(1573421473.338:156): pid=4071 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/406/file0/file0" dev="loop0" ino=382 res=1 [ 769.569336][ T4076] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) 21:31:13 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x50000, 0x8080fffffffe) [ 769.700284][ T4076] FAT-fs (loop4): Filesystem has been set read-only 21:31:13 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b8, 0x8080fffffffe) 21:31:13 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x286, 0x8080fffffffe) 21:31:13 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2a8, 0x8080fffffffe) 21:31:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf45, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 770.138579][ T25] audit: type=1804 audit(1573421473.908:157): pid=4324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/487/file0/file0" dev="sda1" ino=16755 res=1 21:31:14 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1fffff, 0x8080fffffffe) 21:31:14 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x286, 0x8080fffffffe) 21:31:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf49, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 770.351498][ T25] audit: type=1804 audit(1573421474.138:158): pid=4221 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/407/file0/file0" dev="sda1" ino=17377 res=1 21:31:14 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3c9, 0x8080fffffffe) [ 770.625667][ T25] audit: type=1804 audit(1573421474.418:159): pid=4456 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/444/file0/file0" dev="sda1" ino=17841 res=1 21:31:14 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x44, 0x8080fffffffe) [ 770.669562][ T4350] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 21:31:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x7b, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 770.767072][ T4350] FAT-fs (loop3): Filesystem has been set read-only 21:31:14 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2b9, 0x8080fffffffe) 21:31:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf4d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:14 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x400000, 0x8080fffffffe) 21:31:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf51, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:14 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x44, 0x8080fffffffe) [ 771.186204][ T25] audit: type=1804 audit(1573421474.978:160): pid=4594 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/408/file0/file0" dev="sda1" ino=17425 res=1 21:31:15 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3da, 0x8080fffffffe) 21:31:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf55, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 771.515217][ T25] audit: type=1804 audit(1573421475.308:161): pid=4621 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/489/file0/file0" dev="sda1" ino=17893 res=1 21:31:15 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1000000, 0x8080fffffffe) 21:31:15 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2ca, 0x8080fffffffe) 21:31:15 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x44, 0x8080fffffffe) 21:31:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf59, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x7c, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 771.947785][ T4657] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 772.036121][ T4657] FAT-fs (loop0): Filesystem has been set read-only [ 772.119002][ T4741] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 772.132134][ T4741] FAT-fs (loop3): Filesystem has been set read-only 21:31:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf5d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:16 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3eb, 0x8080fffffffe) 21:31:16 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2000000, 0x8080fffffffe) [ 772.345001][ T4751] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 772.379494][ T4751] FAT-fs (loop4): Filesystem has been set read-only 21:31:16 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x400000, 0x8080fffffffe) 21:31:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf61, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:16 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2db, 0x8080fffffffe) 21:31:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf65, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:16 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x400000, 0x8080fffffffe) 21:31:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x7d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 772.980406][ T25] audit: type=1804 audit(1573421476.768:162): pid=4881 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/410/file0/file0" dev="sda1" ino=17887 res=1 [ 773.102524][ T25] audit: type=1804 audit(1573421476.768:163): pid=5008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/491/file0/file0" dev="sda1" ino=16689 res=1 21:31:16 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3fc, 0x8080fffffffe) 21:31:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf69, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:17 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3000000, 0x8080fffffffe) 21:31:17 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x400000, 0x8080fffffffe) 21:31:17 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2ec, 0x8080fffffffe) 21:31:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf71, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:17 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2db, 0x8080fffffffe) [ 773.857952][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 773.858019][ T25] audit: type=1804 audit(1573421477.648:165): pid=5267 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/492/file0" dev="sda1" ino=17026 res=1 21:31:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf79, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:17 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x40d, 0x8080fffffffe) 21:31:17 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4000000, 0x8080fffffffe) 21:31:17 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2db, 0x8080fffffffe) [ 774.115740][ T25] audit: type=1804 audit(1573421477.908:166): pid=5366 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/448/file0/file0" dev="sda1" ino=17033 res=1 21:31:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x82, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:31:18 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2fd, 0x8080fffffffe) 21:31:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf81, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 774.694510][ T25] audit: type=1804 audit(1573421478.488:167): pid=5516 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/493/file0/file0" dev="sda1" ino=17033 res=1 21:31:18 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2db, 0x8080fffffffe) 21:31:18 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5000000, 0x8080fffffffe) [ 774.838701][ T5474] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 774.874308][ T5474] FAT-fs (loop4): Filesystem has been set read-only 21:31:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf85, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:18 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x41e, 0x8080fffffffe) 21:31:18 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x30e, 0x8080fffffffe) 21:31:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf89, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 775.366268][ T5547] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 21:31:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:31:19 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4000000, 0x8080fffffffe) [ 775.415135][ T25] audit: type=1804 audit(1573421479.208:168): pid=5660 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/494/file0/file0" dev="sda1" ino=17056 res=1 [ 775.489597][ T5547] FAT-fs (loop0): Filesystem has been set read-only 21:31:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf91, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:19 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6000000, 0x8080fffffffe) [ 775.729415][ T25] audit: type=1804 audit(1573421479.518:169): pid=5680 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/450/file0/file0" dev="sda1" ino=16689 res=1 21:31:19 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x42f, 0x8080fffffffe) 21:31:19 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x31f, 0x8080fffffffe) 21:31:19 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4000000, 0x8080fffffffe) 21:31:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf95, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 776.158769][ T25] audit: type=1804 audit(1573421479.948:170): pid=5896 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/495/file0/file0" dev="sda1" ino=16674 res=1 21:31:20 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4000000, 0x8080fffffffe) [ 776.296466][ T5798] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 776.329049][ T5798] FAT-fs (loop0): Filesystem has been set read-only 21:31:20 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7000000, 0x8080fffffffe) 21:31:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xf9d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:20 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x330, 0x8080fffffffe) 21:31:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x2}, &(0x7f0000000180)=0xfe27) 21:31:20 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x440, 0x8080fffffffe) 21:31:20 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x42f, 0x8080fffffffe) 21:31:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xfa5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 776.850120][ T25] audit: type=1804 audit(1573421480.638:171): pid=6055 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/496/file0/file0" dev="sda1" ino=16609 res=1 [ 777.000376][ T25] audit: type=1804 audit(1573421480.788:172): pid=6073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/452/file0/file0" dev="sda1" ino=16849 res=1 21:31:20 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xc000000, 0x8080fffffffe) 21:31:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xfa9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:20 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x42f, 0x8080fffffffe) 21:31:20 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x341, 0x8080fffffffe) [ 777.196502][ T6063] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 777.210981][ T6063] FAT-fs (loop0): Filesystem has been set read-only 21:31:21 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x451, 0x8080fffffffe) 21:31:21 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x42f, 0x8080fffffffe) 21:31:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xfad, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 777.628661][ T25] audit: type=1804 audit(1573421481.418:173): pid=6306 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/497/file0/file0" dev="sda1" ino=16641 res=1 21:31:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:31:21 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xf000000, 0x8080fffffffe) [ 777.862604][ T25] audit: type=1804 audit(1573421481.658:174): pid=6330 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/453/file0" dev="sda1" ino=16802 res=1 21:31:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xfb5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 777.920819][ T6302] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 777.929161][ T6302] FAT-fs (loop0): Filesystem has been set read-only 21:31:21 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x352, 0x8080fffffffe) 21:31:21 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x30e, 0x8080fffffffe) 21:31:22 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x462, 0x8080fffffffe) 21:31:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xfc5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 778.412711][ T6448] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) 21:31:22 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xfffffff, 0x8080fffffffe) [ 778.457271][ T6448] FAT-fs (loop4): Filesystem has been set read-only 21:31:22 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x30e, 0x8080fffffffe) 21:31:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xfc9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xfd5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:22 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x363, 0x8080fffffffe) 21:31:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x0, 0x2}, &(0x7f0000000180)=0xfe27) 21:31:22 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x30e, 0x8080fffffffe) 21:31:22 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xd04, 0x8080fffffffe) 21:31:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xfdd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 779.109339][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 779.109361][ T25] audit: type=1804 audit(1573421482.898:176): pid=6695 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/499/file0/file0" dev="sda1" ino=16561 res=1 21:31:23 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x10000000, 0x8080fffffffe) 21:31:23 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x400000, 0x8080fffffffe) [ 779.412051][ T25] audit: type=1804 audit(1573421483.198:177): pid=6832 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/455/file0/file0" dev="sda1" ino=17062 res=1 21:31:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xfe1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:23 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x374, 0x8080fffffffe) 21:31:23 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xe03, 0x8080fffffffe) 21:31:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xfe5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 779.770290][ T6841] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 779.804326][ T6841] FAT-fs (loop3): Filesystem has been set read-only 21:31:23 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x400000, 0x8080fffffffe) 21:31:23 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x13020000, 0x8080fffffffe) 21:31:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:31:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xff1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:24 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x400000, 0x8080fffffffe) [ 780.290008][ T25] audit: type=1804 audit(1573421484.078:178): pid=7045 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/419/file0/file0" dev="sda1" ino=16609 res=1 21:31:24 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x385, 0x8080fffffffe) [ 780.449056][ T7080] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 780.461118][ T25] audit: type=1804 audit(1573421484.128:179): pid=7089 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/456/file0/file0" dev="sda1" ino=17066 res=1 21:31:24 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xf00, 0x8080fffffffe) [ 780.524063][ T7080] FAT-fs (loop3): Filesystem has been set read-only 21:31:24 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2a8, 0x8080fffffffe) 21:31:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xff9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:24 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x20000000, 0x8080fffffffe) 21:31:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0xffd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:24 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2a8, 0x8080fffffffe) [ 781.200607][ T25] audit: type=1804 audit(1573421484.988:180): pid=7325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/420/file0/file0" dev="sda1" ino=17075 res=1 21:31:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1005, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:25 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x396, 0x8080fffffffe) [ 781.308425][ T25] audit: type=1804 audit(1573421485.058:181): pid=7455 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/502/file0/file0" dev="sda1" ino=17086 res=1 21:31:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000000180)=0xfe27) 21:31:25 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2a8, 0x8080fffffffe) 21:31:25 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xf02, 0x8080fffffffe) 21:31:25 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x27010000, 0x8080fffffffe) 21:31:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1045, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:25 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x13020000, 0x8080fffffffe) 21:31:25 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3a7, 0x8080fffffffe) 21:31:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x104d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 781.950060][ T25] audit: type=1804 audit(1573421485.738:182): pid=7591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/421/file0/file0" dev="sda1" ino=17080 res=1 [ 782.080992][ T25] audit: type=1804 audit(1573421485.868:183): pid=7598 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/503/file0/file0" dev="sda1" ino=16530 res=1 21:31:25 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1001, 0x8080fffffffe) 21:31:26 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b000000, 0x8080fffffffe) 21:31:26 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x13020000, 0x8080fffffffe) 21:31:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1055, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 782.276456][ T7717] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 782.295802][ T7717] FAT-fs (loop4): Filesystem has been set read-only 21:31:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000000180)=0xfe27) 21:31:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x105d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:26 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b8, 0x8080fffffffe) [ 782.750806][ T7734] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 782.760804][ T7740] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 782.772369][ T7740] FAT-fs (loop3): Filesystem has been set read-only 21:31:26 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x13020000, 0x8080fffffffe) [ 782.813452][ T7734] FAT-fs (loop0): Filesystem has been set read-only 21:31:26 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x48000000, 0x8080fffffffe) 21:31:26 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1100, 0x8080fffffffe) 21:31:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1071, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:26 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1001, 0x8080fffffffe) [ 783.093605][ T7860] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 783.106161][ T7860] FAT-fs (loop4): Filesystem has been set read-only 21:31:27 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3c9, 0x8080fffffffe) 21:31:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1079, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000000180)=0xfe27) [ 783.600426][ T7990] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 783.653200][ T7990] FAT-fs (loop3): Filesystem has been set read-only [ 783.669566][ T7985] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 783.697820][ T7985] FAT-fs (loop2): Filesystem has been set read-only [ 783.738194][ T25] audit: type=1804 audit(1573421487.528:184): pid=7998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/423/file0/file0" dev="sda1" ino=16738 res=1 21:31:27 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1e04, 0x8080fffffffe) 21:31:27 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b8, 0x8080fffffffe) 21:31:27 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4c000000, 0x8080fffffffe) 21:31:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1081, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 783.939104][ T25] audit: type=1804 audit(1573421487.728:185): pid=8032 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/461/file0/file0" dev="loop4" ino=428 res=1 21:31:27 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3da, 0x8080fffffffe) [ 784.469696][ T8045] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) 21:31:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1089, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 784.523508][ T25] audit: type=1804 audit(1573421488.318:186): pid=8050 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/424/file0/file0" dev="sda1" ino=17313 res=1 [ 784.527406][ T8049] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 21:31:28 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b8, 0x8080fffffffe) [ 784.583612][ T8045] FAT-fs (loop4): Filesystem has been set read-only [ 784.652018][ T8049] FAT-fs (loop3): Filesystem has been set read-only 21:31:28 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1f03, 0x8080fffffffe) 21:31:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:31:28 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x60000000, 0x8080fffffffe) 21:31:28 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3eb, 0x8080fffffffe) 21:31:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1091, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:29 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b8, 0x8080fffffffe) 21:31:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1099, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 785.255900][ T8333] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 785.340748][ T8333] FAT-fs (loop3): Filesystem has been set read-only [ 785.432117][ T25] audit: type=1804 audit(1573421489.228:187): pid=8369 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/463/file0/file0" dev="sda1" ino=17103 res=1 21:31:29 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2002, 0x8080fffffffe) 21:31:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x10a1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:29 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x62010000, 0x8080fffffffe) 21:31:29 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x60000000, 0x8080fffffffe) 21:31:29 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3fc, 0x8080fffffffe) 21:31:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x10a9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000180)=0xfe27) 21:31:29 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x60000000, 0x8080fffffffe) [ 786.129664][ T8486] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 786.210421][ T8486] FAT-fs (loop0): Filesystem has been set read-only [ 786.237056][ T25] audit: type=1804 audit(1573421490.028:188): pid=8616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/508/file0/file0" dev="sda1" ino=17249 res=1 21:31:30 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x68000000, 0x8080fffffffe) 21:31:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x10b1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 786.354691][ T25] audit: type=1804 audit(1573421490.088:189): pid=8621 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/464/file0/file0" dev="sda1" ino=16738 res=1 21:31:30 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2101, 0x8080fffffffe) 21:31:30 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x40d, 0x8080fffffffe) 21:31:30 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x60000000, 0x8080fffffffe) 21:31:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x10b9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 786.959551][ T25] audit: type=1804 audit(1573421490.748:190): pid=8770 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/509/file0" dev="sda1" ino=16657 res=1 21:31:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x10c1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 787.138827][ T25] audit: type=1804 audit(1573421490.928:191): pid=8758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/427/file0/file0" dev="sda1" ino=17153 res=1 21:31:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000000180)=0xfe27) 21:31:31 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6c000000, 0x8080fffffffe) 21:31:31 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3da, 0x8080fffffffe) 21:31:31 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2200, 0x8080fffffffe) 21:31:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x10c9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:31 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x41e, 0x8080fffffffe) 21:31:31 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3da, 0x8080fffffffe) 21:31:31 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x74000000, 0x8080fffffffe) 21:31:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x10cd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 787.851982][ T25] audit: type=1804 audit(1573421491.638:192): pid=9016 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/428/file0/file0" dev="sda1" ino=17137 res=1 21:31:31 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2f04, 0x8080fffffffe) [ 788.061471][ T25] audit: type=1804 audit(1573421491.848:193): pid=9144 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/466/file0" dev="sda1" ino=17072 res=1 21:31:31 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3da, 0x8080fffffffe) 21:31:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x10d1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000000180)=0xfe27) 21:31:32 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x42f, 0x8080fffffffe) [ 788.419575][ T25] audit: type=1804 audit(1573421492.208:194): pid=9148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/511/file0" dev="sda1" ino=16515 res=1 21:31:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x10d5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:32 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b000000, 0x8080fffffffe) 21:31:32 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x76000000, 0x8080fffffffe) [ 788.679548][ T25] audit: type=1804 audit(1573421492.468:195): pid=9287 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/429/file0" dev="sda1" ino=17100 res=1 21:31:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x10dd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:32 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3003, 0x8080fffffffe) 21:31:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x10e5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:32 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b000000, 0x8080fffffffe) [ 789.054469][ T9298] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 789.084282][ T9298] FAT-fs (loop3): Filesystem has been set read-only 21:31:33 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x43c, 0x8080fffffffe) 21:31:33 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7a000000, 0x8080fffffffe) 21:31:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x10f5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 789.563075][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 789.563100][ T25] audit: type=1804 audit(1573421493.358:197): pid=9426 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/430/file0/file0" dev="sda1" ino=17537 res=1 21:31:33 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b000000, 0x8080fffffffe) 21:31:33 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3102, 0x8080fffffffe) [ 789.790652][ T25] audit: type=1804 audit(1573421493.518:198): pid=9558 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/468/file0/file0" dev="sda1" ino=17425 res=1 21:31:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x10f9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:33 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x440, 0x8080fffffffe) [ 789.921941][ T25] audit: type=1804 audit(1573421493.708:199): pid=9553 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/513/file0/file0" dev="sda1" ino=17601 res=1 21:31:33 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x9d010000, 0x8080fffffffe) [ 790.088287][ T9564] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 790.096791][ T9564] FAT-fs (loop2): Filesystem has been set read-only 21:31:34 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:31:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x10fd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 790.479808][ T25] audit: type=1804 audit(1573421494.268:200): pid=9602 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/469/file0/file0" dev="sda1" ino=16865 res=1 21:31:34 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x451, 0x8080fffffffe) 21:31:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1101, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000180)=0xfe27) 21:31:34 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3201, 0x8080fffffffe) 21:31:34 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xb1000000, 0x8080fffffffe) 21:31:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1105, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:35 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 791.264227][ T25] audit: type=1804 audit(1573421495.058:201): pid=9751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/470/file0/file0" dev="sda1" ino=17081 res=1 [ 791.317384][ T9732] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 791.402114][ T9732] FAT-fs (loop0): Filesystem has been set read-only 21:31:35 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x462, 0x8080fffffffe) [ 791.450385][ T25] audit: type=1804 audit(1573421495.238:202): pid=9744 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/515/file0/file0" dev="sda1" ino=17745 res=1 21:31:35 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3300, 0x8080fffffffe) 21:31:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1109, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 791.552019][ T25] audit: type=1804 audit(1573421495.238:203): pid=9759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/515/file0/file0" dev="sda1" ino=17745 res=1 21:31:35 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xd6070000, 0x8080fffffffe) 21:31:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000000180)=0xfe27) 21:31:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x110d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 792.067146][ T25] audit: type=1804 audit(1573421495.858:204): pid=9897 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/471/file0/file0" dev="sda1" ino=17825 res=1 [ 792.110422][ T9871] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 792.179348][ T9871] FAT-fs (loop0): Filesystem has been set read-only 21:31:36 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x473, 0x8080fffffffe) 21:31:36 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4000, 0x8080fffffffe) [ 792.341741][ T25] audit: type=1804 audit(1573421496.128:205): pid=9905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/516/file0/file0" dev="sda1" ino=17112 res=1 21:31:36 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:31:36 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xd8010000, 0x8080fffffffe) 21:31:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1111, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 792.858207][ T9953] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 21:31:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1119, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 792.906868][ T9953] FAT-fs (loop3): Filesystem has been set read-only 21:31:36 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xec000000, 0x8080fffffffe) 21:31:36 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x484, 0x8080fffffffe) 21:31:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000000180)=0xfe27) 21:31:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x111d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 793.216138][ T25] audit: type=1804 audit(1573421497.008:206): pid=10024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/434/file0/file0" dev="sda1" ino=17927 res=1 21:31:37 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3300, 0x8080fffffffe) 21:31:37 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4004, 0x8080fffffffe) [ 793.470230][T10064] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 793.490747][T10064] FAT-fs (loop3): Filesystem has been set read-only 21:31:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1121, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:37 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xf60f0000, 0x8080fffffffe) 21:31:37 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3300, 0x8080fffffffe) 21:31:37 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x495, 0x8080fffffffe) 21:31:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1125, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 794.052050][T10161] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 794.084633][T10161] FAT-fs (loop0): Filesystem has been set read-only 21:31:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1129, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 794.221097][T10222] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 794.255677][T10222] FAT-fs (loop4): Filesystem has been set read-only 21:31:38 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4103, 0x8080fffffffe) 21:31:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0x7) 21:31:38 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3300, 0x8080fffffffe) 21:31:38 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xffff1f00, 0x8080fffffffe) 21:31:38 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x600, 0x8080fffffffe) 21:31:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x112d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:38 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xec000000, 0x8080fffffffe) 21:31:38 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4202, 0x8080fffffffe) 21:31:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1131, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 795.039208][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 795.039238][ T25] audit: type=1804 audit(1573421498.828:209): pid=10492 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/475/file0/file0" dev="sda1" ino=16865 res=1 [ 795.090541][ T25] audit: type=1804 audit(1573421498.848:210): pid=10494 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/520/file0/file0" dev="sda1" ino=16850 res=1 21:31:39 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xffffff0f, 0x8080fffffffe) 21:31:39 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xc00, 0x8080fffffffe) 21:31:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x15b3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x3, @mcast1, 0xd6a4}, 0x1c) 21:31:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1135, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:39 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xec000000, 0x8080fffffffe) [ 795.549508][T10595] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 21:31:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1139, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 795.621118][T10595] FAT-fs (loop0): Filesystem has been set read-only 21:31:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) delete_module(&(0x7f0000000000)=']selinux%posix_acl_access]\x00', 0x800) 21:31:39 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4301, 0x8080fffffffe) [ 795.771067][ T25] audit: type=1804 audit(1573421499.558:211): pid=10641 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/521/file0/file0" dev="sda1" ino=17101 res=1 21:31:39 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5000000000000, 0x8080fffffffe) 21:31:39 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xec000000, 0x8080fffffffe) 21:31:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x113d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 795.986738][ T25] audit: type=1804 audit(1573421499.778:212): pid=10753 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/476/file0/file0" dev="sda1" ino=16642 res=1 21:31:40 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xd04, 0x8080fffffffe) [ 796.218815][T10765] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 796.252847][T10765] FAT-fs (loop3): Filesystem has been set read-only 21:31:40 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4103, 0x8080fffffffe) [ 796.286221][ T25] audit: type=1804 audit(1573421500.078:213): pid=10762 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/438/file0/file0" dev="sda1" ino=17345 res=1 21:31:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1141, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:40 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x40000000000000, 0x8080fffffffe) 21:31:40 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4400, 0x8080fffffffe) 21:31:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1145, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:40 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4103, 0x8080fffffffe) [ 796.866916][ T25] audit: type=1804 audit(1573421500.658:214): pid=11030 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/477/file0" dev="sda1" ino=16579 res=1 21:31:40 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x3, 0x8, 0x4, 0x0, 0x7, 0x200, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x3, @perf_config_ext={0x5, 0x8}, 0x4000, 0x1, 0x0, 0x7, 0x6, 0x854f, 0x6d2}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:31:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1149, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 797.105067][ T25] audit: type=1804 audit(1573421500.898:215): pid=11022 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/439/file0/file0" dev="sda1" ino=16642 res=1 21:31:41 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x100000000000000, 0x8080fffffffe) 21:31:41 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5104, 0x8080fffffffe) 21:31:41 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4103, 0x8080fffffffe) 21:31:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x114d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:41 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xe03, 0x8080fffffffe) 21:31:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1151, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:41 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4301, 0x8080fffffffe) [ 797.901901][ T25] audit: type=1804 audit(1573421501.688:216): pid=11295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/524/file0" dev="sda1" ino=17113 res=1 21:31:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000000), &(0x7f0000000180)=0x14) 21:31:41 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x200000000000000, 0x8080fffffffe) [ 798.088077][ T25] audit: type=1804 audit(1573421501.778:217): pid=11304 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/440/file0/file0" dev="sda1" ino=17118 res=1 21:31:41 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xf00, 0x8080fffffffe) 21:31:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1155, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:42 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5203, 0x8080fffffffe) 21:31:42 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4301, 0x8080fffffffe) [ 798.454794][T11315] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 798.512212][T11315] FAT-fs (loop3): Filesystem has been set read-only 21:31:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1159, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:42 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x300000000000000, 0x8080fffffffe) [ 798.750648][ T25] audit: type=1804 audit(1573421502.538:218): pid=11528 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/479/file0/file0" dev="sda1" ino=17937 res=1 21:31:42 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4301, 0x8080fffffffe) 21:31:42 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xf02, 0x8080fffffffe) 21:31:42 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5302, 0x8080fffffffe) 21:31:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0xe77) 21:31:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x115d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000000), &(0x7f0000000180)=0x14) 21:31:43 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1001, 0x8080fffffffe) 21:31:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1161, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:43 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x400000000000000, 0x8080fffffffe) 21:31:43 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5401, 0x8080fffffffe) 21:31:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1165, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000000), &(0x7f0000000180)=0x14) [ 800.138732][T11833] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 800.221652][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 800.221677][ T25] audit: type=1804 audit(1573421504.008:223): pid=11853 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/481/file0/file0" dev="sda1" ino=17940 res=1 [ 800.265172][T11833] FAT-fs (loop0): Filesystem has been set read-only 21:31:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040)={0x1, 0x1, 0x1, 0xb13, 0x1}, 0x14) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 800.364274][ T25] audit: type=1804 audit(1573421504.048:224): pid=11855 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/527/file0/file0" dev="sda1" ino=16530 res=1 21:31:44 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1100, 0x8080fffffffe) 21:31:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1169, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:44 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x500000000000000, 0x8080fffffffe) 21:31:44 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5500, 0x8080fffffffe) 21:31:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000000), &(0x7f0000000180)=0x14) 21:31:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x116d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:44 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xec000000, 0x8080fffffffe) [ 801.153213][ T25] audit: type=1804 audit(1573421504.948:225): pid=12114 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/482/file0/file0" dev="sda1" ino=17120 res=1 21:31:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1171, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 801.294343][ T25] audit: type=1804 audit(1573421504.968:226): pid=12078 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/444/file0/file0" dev="sda1" ino=16579 res=1 21:31:45 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1200, 0x8080fffffffe) 21:31:45 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x600000000000000, 0x8080fffffffe) 21:31:45 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6204, 0x8080fffffffe) 21:31:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r2 = open_tree(r1, &(0x7f0000000140)='./file0\x00', 0x80000) write$binfmt_script(r2, &(0x7f00000001c0)={'#! ', './file0', [{0x20, 'system.[eth0lo'}, {0x20, '\xde'}, {0x20, 'veth1_to_hsr\x00'}], 0xa, "2e3739d77efcf14c5db831b99886539a9009aab3c4f77ba7acf663c43c567f82d3db3fcac40d3cf6050c187455d0160d6b287fa78cac8efb3553f27152c86365392eee0395873f7b9c395a4408082e49c4fbfb55e7edf5de7ec365186f52b91e17ec9f1bb989b61c07e70bcb65651a1572e146666e6bc4d78601ca11cb5904f9afcf29f2d13963fd184f4c5b35b5d50f26b6c3eae7"}, 0xbf) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r4, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000000)={'veth1_to_hsr\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}}) [ 801.482796][ T25] audit: type=1804 audit(1573421504.988:227): pid=12119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/528/file0/file0" dev="sda1" ino=17939 res=1 21:31:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1175, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:45 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xec000000, 0x8080fffffffe) [ 801.940213][ T25] audit: type=1804 audit(1573421505.728:228): pid=12261 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/483/file0/file0" dev="sda1" ino=17116 res=1 21:31:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000001600)=0x1b, 0x4) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x2000, @multicast2}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xd8eb, 0x100) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000040)) 21:31:45 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1e04, 0x8080fffffffe) [ 802.123311][ T25] audit: type=1804 audit(1573421505.918:229): pid=12247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/445/file0/file0" dev="sda1" ino=17132 res=1 21:31:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1179, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:46 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xec000000, 0x8080fffffffe) 21:31:46 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x700000000000000, 0x8080fffffffe) 21:31:46 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6303, 0x8080fffffffe) 21:31:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x117d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCAX25DELFWD(0xffffffffffffffff, 0x89eb, &(0x7f0000000600)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null}) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000005c0)=0xffffff7b) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000000180)=0x14) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000080)='wlan0\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)='GPLlo\x10\xd6\x16a0\x00', &(0x7f00000001c0)='ppp1]-\'#wlan1\x00', &(0x7f0000000200)='vboxnet1\x00', &(0x7f0000000240)='+\x00', &(0x7f0000000280)='ppp0em1\x00', &(0x7f00000002c0)='ppp1eth1vboxnet0user\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='\'%posix_acl_access\x00'], &(0x7f0000000540)=[&(0x7f0000000400)='system\xc8cpuset*wlan0\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\x00', &(0x7f0000000500)='cpuset-keyring\x00']) 21:31:46 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x600000000000000, 0x8080fffffffe) [ 802.871619][ T25] audit: type=1804 audit(1573421506.658:230): pid=12519 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/530/file0/file0" dev="sda1" ino=17122 res=1 21:31:46 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1f03, 0x8080fffffffe) 21:31:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1181, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:46 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xc00000000000000, 0x8080fffffffe) [ 803.118384][ T25] audit: type=1804 audit(1573421506.908:231): pid=12510 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/446/file0/file0" dev="sda1" ino=17126 res=1 21:31:47 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x600000000000000, 0x8080fffffffe) 21:31:47 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6402, 0x8080fffffffe) 21:31:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1185, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 803.515488][ T25] audit: type=1804 audit(1573421507.308:232): pid=12650 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/485/file0/file0" dev="sda1" ino=17117 res=1 [ 803.670837][T12641] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 21:31:47 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2002, 0x8080fffffffe) [ 803.733465][T12641] FAT-fs (loop3): Filesystem has been set read-only 21:31:47 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x600000000000000, 0x8080fffffffe) 21:31:47 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xf00000000000000, 0x8080fffffffe) 21:31:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1189, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r2, 0x52005) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000002c0)={r2, 0x0, 0xe2}, &(0x7f0000000540)=ANY=[@ANYBLOB="656e633d6f61657020686173683c6e68706f6c79313330352d6e656f6e0000000000000000000000000000000000000000000000000e00"/78], &(0x7f0000000380), &(0x7f00000005c0)=""/226) request_key(&(0x7f0000000840)='big_key\x00', &(0x7f0000000880)={'syz', 0x3}, &(0x7f00000008c0)='memory.events\x00', r2) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x8000, 0x0) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000004c0)) r6 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r6, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r7, 0x0) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000500)=0x0) write$P9_RGETLOCK(r6, &(0x7f00000007c0)={0x22, 0x37, 0x1, {0x2, 0x2f6, 0x2, r8, 0x4, '(\\-!'}}, 0x22) r9 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000005c0)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5bbb89452fd9bb6708ae89ba29", 0xde, 0xfffffffffffffffe) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r9, r10, r11) fchown(r4, r5, r11) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) sendmsg$inet_sctp(r3, &(0x7f0000000400)={&(0x7f0000000140)=@in={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000000280)=[{&(0x7f00000001c0)="9bc1898842cf3fe49ac0fd10a95580891d90b64d9828dbb8ea523d96deccbe75cad868777102c07af3a75437725161ecc3e3df23cc1c22821caadac3bece4757cbce37e30f275adddf31793deb8ae251092c959781099c53824fb56e4d5402c892014f8bdd9b9d5c21509a242766e3e001836b7d6ee81041c2aee270dbae8e17d852911e79fb2eac7585ed74a08b77beb4faa30109aa9915ac606c0c6f39be4da6a6e7cd52af0219dc6f6f92ea8fbf6f218e4c84", 0xb4}, {&(0x7f00000006c0)="39cb726bc9f055c9e589339d5e2f248cb2983c329dc399a2f38969a87c42874e9f9b6eae5dd1e1fb60c9f9910f2bbae434a32c7d4a33134264b21d8ba962070aae485f971758471d67e0000ce7d5bba2f19dea05af48de7acebb117deb0553b1e6277a7cfa0e79d6f2c63e766ccd7cd4d757b37559362b2791b1d0365f93f654ce6c0814e97972781a96e978b9cf066b0729c2e85f488cdb0d6667aa3390f2cb68a85bf2617320b4a3c86452baf588e324f98921e4172830", 0xb8}], 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000a3d9994041e60000000000008400000005000000420000000500000022a6bc092f17e4bdda8c19394c52c2c8589ff5c79354853e1c5bb24cd3ed53c8098f299f42dce58d5e56f430116a3b2fe99354846cdee78105b939ec27ffb26691abfa266fc25077c2722f75ebe64df64a389f1fb67b9078750755059426dee29d29112f59b45c07508c3d6ca6391aa4cab544cec90300bf4eb4d2b7"], 0x30, 0x40}, 0x4000) r12 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r12, 0x52005) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000002c0)={r12, 0x0, 0xe2}, &(0x7f0000000540)=ANY=[@ANYBLOB="656e633d6f61657020686173683d6e68706f6c79313330352d6e656f6e0000000000000000000000000000000000000000000000000e00"/78], &(0x7f0000000380), &(0x7f00000005c0)=""/226) request_key(&(0x7f0000000840)='big_key\x00', &(0x7f0000000880)={'syz', 0x3}, &(0x7f0000000080)='syz', r12) keyctl$KEYCTL_MOVE(0x1e, 0x0, r2, r12, 0x1) r13 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r13, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) setsockopt$inet_opts(r13, 0x0, 0xd, &(0x7f0000000440)="9f81947f4af97d777f5ee59edc5284251a92553bd7b09f39cb7df0bf08eef89f110e8d97ec02d7a551c2b6b461ad4f4c8887b287fd35adffd4a1a50fe29a128b879518b20de8c6742c99cd307393d20dd1f3c6b0bef509e2dbd15e55227dc1352d2cd28c", 0x64) 21:31:47 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6501, 0x8080fffffffe) 21:31:48 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2101, 0x8080fffffffe) 21:31:48 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1f03, 0x8080fffffffe) 21:31:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x118d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:48 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6600, 0x8080fffffffe) 21:31:48 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1000000000000000, 0x8080fffffffe) 21:31:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1191, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 804.933111][T12921] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 804.941043][T12921] FAT-fs (loop4): Filesystem has been set read-only 21:31:48 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1f03, 0x8080fffffffe) 21:31:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1195, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:49 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2200, 0x8080fffffffe) [ 805.318967][T13059] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 805.338040][T13059] FAT-fs (loop3): Filesystem has been set read-only [ 805.505874][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 805.505899][ T25] audit: type=1804 audit(1573421509.288:237): pid=13057 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/449/file0/file0" dev="sda1" ino=17959 res=1 21:31:49 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1302000000000000, 0x8080fffffffe) 21:31:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1199, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:49 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7403, 0x8080fffffffe) 21:31:49 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1f03, 0x8080fffffffe) 21:31:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x119d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 805.999994][ T25] audit: type=1804 audit(1573421509.788:238): pid=13210 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/488/file0" dev="sda1" ino=16577 res=1 21:31:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11a1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 806.188390][ T25] audit: type=1804 audit(1573421509.978:239): pid=13274 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/534/file0" dev="sda1" ino=16518 res=1 21:31:50 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2f04, 0x8080fffffffe) 21:31:50 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2000000000000000, 0x8080fffffffe) [ 806.379204][ T25] audit: type=1804 audit(1573421510.158:240): pid=13333 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/450/file0" dev="sda1" ino=17958 res=1 21:31:50 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5500, 0x8080fffffffe) 21:31:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11a5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:50 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7502, 0x8080fffffffe) [ 806.723829][T13336] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 806.780026][T13336] FAT-fs (loop4): Filesystem has been set read-only 21:31:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11a9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:50 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5500, 0x8080fffffffe) [ 806.981439][ T25] audit: type=1804 audit(1573421510.768:241): pid=13467 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/535/file0/file0" dev="sda1" ino=16802 res=1 21:31:50 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3003, 0x8080fffffffe) 21:31:51 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2701000000000000, 0x8080fffffffe) [ 807.173540][T13455] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 807.181403][T13455] FAT-fs (loop0): Filesystem has been set read-only 21:31:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11ad, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:51 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7601, 0x8080fffffffe) [ 807.515264][ T25] audit: type=1804 audit(1573421511.288:242): pid=13598 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/490/file0/file0" dev="sda1" ino=16625 res=1 21:31:51 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5500, 0x8080fffffffe) 21:31:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11b1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:51 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3102, 0x8080fffffffe) [ 807.760543][ T25] audit: type=1804 audit(1573421511.548:243): pid=13609 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/536/file0/file0" dev="sda1" ino=16531 res=1 [ 807.979059][ T25] audit: type=1804 audit(1573421511.768:244): pid=13723 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/452/file0/file0" dev="sda1" ino=16961 res=1 21:31:51 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b00000000000000, 0x8080fffffffe) 21:31:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11b5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:51 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7700, 0x8080fffffffe) 21:31:51 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7403, 0x8080fffffffe) 21:31:52 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7403, 0x8080fffffffe) 21:31:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11b9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:52 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3201, 0x8080fffffffe) [ 808.565369][ T25] audit: type=1804 audit(1573421512.358:245): pid=13863 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/537/file0/file0" dev="sda1" ino=16611 res=1 [ 808.605724][T13795] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 808.648575][T13795] FAT-fs (loop0): Filesystem has been set read-only 21:31:52 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4800000000000000, 0x8080fffffffe) 21:31:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11bd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:52 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7403, 0x8080fffffffe) 21:31:52 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x8503, 0x8080fffffffe) [ 809.097066][ T25] audit: type=1804 audit(1573421512.888:246): pid=14056 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/492/file0" dev="sda1" ino=16579 res=1 21:31:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11c1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:53 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b00000000000000, 0x8080fffffffe) 21:31:53 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3300, 0x8080fffffffe) 21:31:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11c5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:53 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4c00000000000000, 0x8080fffffffe) 21:31:53 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x8602, 0x8080fffffffe) 21:31:53 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b00000000000000, 0x8080fffffffe) 21:31:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11c9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 810.109569][T14244] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 810.143741][T14245] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 21:31:54 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3c04, 0x8080fffffffe) [ 810.153263][T14244] FAT-fs (loop0): Filesystem has been set read-only [ 810.217627][T14245] FAT-fs (loop3): Filesystem has been set read-only 21:31:54 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3b00000000000000, 0x8080fffffffe) 21:31:54 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x8701, 0x8080fffffffe) 21:31:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11cd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:54 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6000000000000000, 0x8080fffffffe) [ 810.689289][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 810.689319][ T25] audit: type=1804 audit(1573421514.478:251): pid=14484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/494/file0/file0" dev="sda1" ino=16545 res=1 21:31:54 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4000, 0x8080fffffffe) 21:31:54 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x3f00, 0x8080fffffffe) 21:31:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11d1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 811.072906][ T25] audit: type=1804 audit(1573421514.868:252): pid=14576 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/456/file0/file0" dev="sda1" ino=17140 res=1 [ 811.221789][ T25] audit: type=1804 audit(1573421514.868:253): pid=14577 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/540/file0/file0" dev="sda1" ino=17141 res=1 21:31:55 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6201000000000000, 0x8080fffffffe) 21:31:55 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x8800, 0x8080fffffffe) 21:31:55 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4000, 0x8080fffffffe) [ 811.476738][ T25] audit: type=1804 audit(1573421515.268:254): pid=14629 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/495/file0/file0" dev="sda1" ino=17128 res=1 21:31:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11d5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:55 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4000, 0x8080fffffffe) 21:31:55 executing program 2: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4000, 0x8080fffffffe) [ 811.856160][ T25] audit: type=1804 audit(1573421515.648:255): pid=14752 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/541/file0/file0" dev="sda1" ino=17141 res=1 21:31:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11d9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 812.024962][ T25] audit: type=1804 audit(1573421515.818:256): pid=14750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/457/file0/file0" dev="sda1" ino=16580 res=1 21:31:55 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6800000000000000, 0x8080fffffffe) 21:31:56 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x9603, 0x8080fffffffe) 21:31:56 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x440, 0x8080fffffffe) 21:31:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11dd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 812.417427][ T25] audit: type=1804 audit(1573421516.208:257): pid=14879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/496/file0/file0" dev="sda1" ino=17148 res=1 21:31:56 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4004, 0x8080fffffffe) 21:31:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11e1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 812.818715][ T25] audit: type=1804 audit(1573421516.588:258): pid=14884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/542/file0" dev="sda1" ino=16611 res=1 [ 812.868069][T14887] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 812.887770][T14887] FAT-fs (loop0): Filesystem has been set read-only 21:31:56 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x440, 0x8080fffffffe) 21:31:56 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x9702, 0x8080fffffffe) 21:31:56 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6c00000000000000, 0x8080fffffffe) 21:31:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11e5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 813.220142][ T25] audit: type=1804 audit(1573421517.008:259): pid=15026 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/497/file0/file0" dev="sda1" ino=17151 res=1 21:31:57 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4103, 0x8080fffffffe) 21:31:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11e9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:57 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x440, 0x8080fffffffe) [ 813.652870][ T25] audit: type=1804 audit(1573421517.448:260): pid=15150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/543/file0/file0" dev="sda1" ino=17151 res=1 [ 813.658502][T15033] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 813.772168][T15033] FAT-fs (loop0): Filesystem has been set read-only [ 813.827240][T15152] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) 21:31:57 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7400000000000000, 0x8080fffffffe) 21:31:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11ed, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 813.872052][T15152] FAT-fs (loop4): Filesystem has been set read-only 21:31:57 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4202, 0x8080fffffffe) 21:31:57 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x9801, 0x8080fffffffe) 21:31:57 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x440, 0x8080fffffffe) 21:31:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11f1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:58 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x440, 0x8080fffffffe) 21:31:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11f5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:58 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7600000000000000, 0x8080fffffffe) 21:31:58 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x9900, 0x8080fffffffe) 21:31:58 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4301, 0x8080fffffffe) 21:31:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x11f9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:58 executing program 2: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x440, 0x8080fffffffe) [ 815.094839][T15425] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 815.219076][T15425] FAT-fs (loop3): Filesystem has been set read-only 21:31:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1201, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:31:59 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7a00000000000000, 0x8080fffffffe) 21:31:59 executing program 2 (fault-call:11 fault-nth:0): getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:31:59 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xa703, 0x8080fffffffe) 21:31:59 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4400, 0x8080fffffffe) 21:31:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x120d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 816.121502][ T25] kauditd_printk_skb: 5 callbacks suppressed [ 816.121525][ T25] audit: type=1804 audit(1573421519.908:266): pid=15710 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/462/file0/file0" dev="sda1" ino=17473 res=1 21:32:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1215, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 816.277349][ T25] audit: type=1804 audit(1573421520.028:267): pid=15809 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/501/file0/file0" dev="sda1" ino=17505 res=1 21:32:00 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xa802, 0x8080fffffffe) 21:32:00 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x8000000000000000, 0x8080fffffffe) 21:32:00 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5104, 0x8080fffffffe) 21:32:00 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x122d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 816.829483][ T25] audit: type=1804 audit(1573421520.618:268): pid=15824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/463/file0/file0" dev="sda1" ino=16611 res=1 21:32:00 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xa901, 0x8080fffffffe) [ 817.112139][ T25] audit: type=1804 audit(1573421520.908:269): pid=15953 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/502/file0/file0" dev="sda1" ino=17425 res=1 21:32:00 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x9d01000000000000, 0x8080fffffffe) 21:32:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1231, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:01 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5203, 0x8080fffffffe) [ 817.736503][ T25] audit: type=1804 audit(1573421521.528:270): pid=15963 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/464/file0/file0" dev="sda1" ino=17158 res=1 21:32:01 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x800000000, 0xffffffffffffffff, 0x9) uselib(&(0x7f0000000140)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 817.914062][ T25] audit: type=1804 audit(1573421521.708:271): pid=15989 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/548/file0/file0" dev="sda1" ino=17233 res=1 21:32:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1235, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:01 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xaa00, 0x8080fffffffe) [ 818.042779][ T25] audit: type=1804 audit(1573421521.778:272): pid=15993 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/503/file0/file0" dev="sda1" ino=17265 res=1 21:32:02 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xb100000000000000, 0x8080fffffffe) 21:32:02 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5302, 0x8080fffffffe) 21:32:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x136d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:02 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 818.557924][ T25] audit: type=1804 audit(1573421522.348:273): pid=16095 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/465/file0/file0" dev="sda1" ino=16516 res=1 21:32:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x13e5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 818.763639][ T25] audit: type=1804 audit(1573421522.558:274): pid=16205 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/504/file0/file0" dev="sda1" ino=17265 res=1 21:32:02 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xb803, 0x8080fffffffe) 21:32:02 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xd607000000000000, 0x8080fffffffe) 21:32:02 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27d, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:02 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5401, 0x8080fffffffe) 21:32:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x13ed, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 819.454598][T16260] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) 21:32:03 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000140)=0x9, 0x4) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1405, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 819.500683][T16260] FAT-fs (loop4): Filesystem has been set read-only [ 819.567442][ T25] audit: type=1804 audit(1573421523.358:275): pid=16374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/550/file0/file0" dev="sda1" ino=17697 res=1 21:32:03 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xd801000000000000, 0x8080fffffffe) 21:32:03 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xb902, 0x8080fffffffe) 21:32:03 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x5500, 0x8080fffffffe) 21:32:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x140d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:03 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)={@rand_addr, 0x0}, &(0x7f0000000140)=0x14) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f0000000180)={r1, 0x5, 0x44, 0xe9, 0x6, 0xf5, 0x8}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000500)={@can={0x1d, r1}, {&(0x7f0000000400)=""/173, 0xad}, &(0x7f00000004c0), 0x40}, 0xa0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x80, r3, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x14, 0x11}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffddde}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9c}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1ff}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4e}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x4080}, 0x2004070) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 820.139781][T16494] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 820.189573][T16494] FAT-fs (loop3): Filesystem has been set read-only [ 820.213297][T16496] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 820.234542][T16496] FAT-fs (loop4): Filesystem has been set read-only 21:32:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x7f, 0x0, 0x10000, 0x6}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000040)={0x0, r3, 0x10001, 0xe341}) 21:32:04 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6204, 0x8080fffffffe) 21:32:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1419, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:04 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xec00000000000000, 0x8080fffffffe) 21:32:04 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xba01, 0x8080fffffffe) 21:32:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1431, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 820.742356][T16637] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 820.761730][T16637] FAT-fs (loop4): Filesystem has been set read-only [ 820.891074][T16643] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 820.940805][T16643] FAT-fs (loop3): Filesystem has been set read-only 21:32:04 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6303, 0x8080fffffffe) 21:32:04 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0xa) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x0, 0x8001, 0x26c, 0x2, 0x7, 0x4, 0x9, {0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x6, 0x44, 0x3, 0x1, 0x1ff}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000280)={r3, 0xe, "925fc674f681470ee953628a6e1f"}, &(0x7f00000003c0)=0x16) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1439, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:05 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xbb00, 0x8080fffffffe) 21:32:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1441, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:05 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xf60f000000000000, 0x8080fffffffe) 21:32:05 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x800, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000140)={0x40, 0x1c, 0xca, 0x3, "d6ddb4072e80a5a4e59589b866fd3bab9040df1a9bf51ac6b14e49f472266d61"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000080)) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) socketpair(0x10, 0x5, 0x7, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20080, 0x0) write$FUSE_STATFS(r5, &(0x7f00000002c0)={0x60, 0x0, 0x3, {{0x5, 0x4, 0x12000000000, 0x0, 0x0, 0x24, 0x20, 0x10001}}}, 0x60) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000280)=0x7, 0x4) r6 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r6, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x2, 0x5, 0x7, &(0x7f0000000140)="f0e36ea6c6849e"}) r7 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$VIDIOC_QUERYSTD(r7, 0x8008563f, &(0x7f0000000340)) [ 821.591008][ T25] kauditd_printk_skb: 3 callbacks suppressed [ 821.591031][ T25] audit: type=1804 audit(1573421525.378:279): pid=16800 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/508/file0/file0" dev="sda1" ino=16579 res=1 21:32:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1445, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:05 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6402, 0x8080fffffffe) 21:32:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80200, 0x0) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000040)=0x5) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 821.882420][ T25] audit: type=1804 audit(1573421525.678:280): pid=16820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/469/file0/file0" dev="sda1" ino=17793 res=1 21:32:05 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000140)) 21:32:05 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xc903, 0x8080fffffffe) 21:32:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1449, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:05 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xffff1f0000000000, 0x8080fffffffe) [ 822.282399][T16929] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 822.296654][T16929] FAT-fs (loop4): Filesystem has been set read-only 21:32:06 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000140)={0x5, 0x5, 0x9e, @random="f2fe3df68434", 'syz_tun\x00'}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) r3 = accept4$alg(r2, 0x0, 0x0, 0x800) fallocate(r3, 0x9, 0x9d, 0x1) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000280)=0x0) perf_event_open(0x0, r4, 0x1, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) writev(r0, &(0x7f0000003700)=[{&(0x7f00000003c0)="4400385bb7c891711fd5c11385be42910294545518bae857eb15dce0f56c4b019458ecfeb309e95274195f127ce970cd8855277b8186487118735c5ee3d7885e2e06c09c55651463eb95", 0x4a}, {&(0x7f0000000440)="4d673b5cd6390ae5770c91d8874da7390a61041fb079333dbf4149861114fcd0c2aaf2578ff92ec65a9f2d581548aba25195180ccd1498b281aa04d9f4cf033e44375cbd137974a39a0840ba7321185eb15b0b6ea1a5b19d9e47ecd49356e97e35702636c1cdda3d2d7cf10494a935c7079261aebac5003fa99e5250d227b1aa182f4346090dd32a4df1b8a19e0eba7da3515699b27811a7df9ede1f3c92e08b3aa6f6508a7333123288ad1153920cf3d0a3682126ce52421eacdfb3288d1d1b567aeb0128c8a55b14e652ca93506f9699f5872e6faceb282a8a6e8acab60f5beac202c3cd5fa26ecfe855ece28e666a27c70c5558414da8216704b44781a819298eb71871cf530df56121e25eb2da8b50a4aa11ffa52f0bbb8ccfea4e6884789fb3e0802ba616252bea51b87dfbec45bd9eaa895c9094b022c709a255740b9d4025e3de09c17118658991999982b9e12d6329739217532d1af379de92677b07a5c7ee4a3fd0febc0fd9916ceb191af253ca0fa11c22599d030465aad207b92dece57fd03fd71ab1d6ee94bd6c8e11aa3a69819beda4be279a698a2a24194f8e590eaade498647b534ac634c0ad6cdd209ebe25951043a84b8c894b61b087916363541da35c71025c0c27c7f4024100f1993716f36e1015b5eae43c67224e063f7fd6615ae01d715a9fd0539fefbfa1d662814b4bb0b77ceb39afa53e18041f973bfb6d571b9c00d77f205f92c8764943173d2b850cd861c9e6781f6a4713798cee1a63f6554bde9f31277e5c62e5df0c4a047396d2a5a1f0f7d5f6a188f77d5b68b27ffb0d8111bf994e07cfeb457e2269e54e99ea617d72dc87526449619064969c000ad9cfcca3aabcb012c39a08569aae79ec3720ebefe5960a380e7eadc9d45219f9a4be9b43d315d7bf37daa0ac205f24ce4d78a9b5cdbc8888d70cd55e1962794146248592fda23fe4b3d7800e9647d4b84fa24e6fd2181f6a3f45402422f21a4262c416800aacd296050cf80a898e4fca03606b9c312134ea6f1cf293f5dda7a7d0a0c4f4d1650e1d52ca183b54d96198ebfa9b7b3871d42cbde8735c45d799e28ee1daa5760ac4de5ee74119cdce1dda3c4fcdfba57a52e8749a3ba0f1c75fb80f6299b02f13114471308d18e560f16eb517de774629d419cd68a47b3c664159810992a08646a41f87ffa9f9cc2e07f41fe803383fd4827fea7cd8170deb7c5b9f1b40c394eabd3d91e2169abf37ac0a5dca8b8570a961a69b0b140384a2b1345da9839a84f11dd9e6c2ca87b47ce7d2f2ffc0b7b46d3b2effe1beb30a5e3fb0e56efef25ed75620b4652fab90b0ab9ab6790634ca8b9b565c6441ec8d7afbd1c83b733bf8f8d6c10bde6a7cd52d03ec780c9456c66549f311a7ebc66276823d4bbe7dda857d07fddb89b0992c0f8c71e3b31a7b8d74074fb24bbfb925f2ce0a0d575dd6417d4271899b19020a6b7cba36373d672ec17c7565f04ab47deb617a4b4e9bca236d6e5539758bc4e808cacdc8252874946b7a4392776ffcef46cbe17c36726e57a9b9b3d96f3f170c77b1f2010df4cc402b84bc23a786d5e53975239020cf82589f774ae623cfff443960892400e5274ba454f4511b6f04b5232e01563c69bcacfef5d49c6a176e07f83983e9ffaa8b707ba296c1642e333a2477f55414bf5a05bc2d26747e0418a848f82a2262d1cb89a14b9f8254c9b63790bb756a832ca0f18a9e6ee064baec8b07672302b41b68c1f330d54fb9a83edeef16b8ab0340676cae1471ddc2440c258744cfa5e5644b870e05ef0ab0e7d9fba540c2a67956082dcd68bb17325a45f10abb0dbc4bc73ffe50d771b6c9cf4c0424adef7e5cb73804015771826e0ac432bdb574daa6eadcfb5857dd722c0981a28fb09b6e9d29f9d9a278dd1daab2b4d640efa7dc17a1aae02bc677ac5cbb74fea65a30d3eba37ad71509e3a364c14493f303b1735e1c64fcab77ebd521d4b1b693e17febcdb1143a6cf8c624de245465b681e32924b3bfe68118c33d30e543c44951ca9d7c9030d2249b3a966b5dea51422887ed674cef3e882c17934c8511f414a48745633666b636eeed81a8ef88fde3ab094fe6089d4a5331397a04683f8f3c3bb4cc965e9069efcd27a80a315cabc6b219b86bcb04c4a7cd04538c755e6a65483a3ea4e7c312ed2eba542a6c788a9730074bacae2093c913c52f692ee7c0ecdc73492f87b038c521e34011469469080115ec02a37dad4df479196e347d4ab4eaf1235881704a0356335732b535812f01945e7908b77dd0e23b18cd63d8b7945aed0f39fdf31822ad4002b55ec5e06b5090780152c23c538a6fe3ee194f30056d4f000f283fd25b00a15160e6bcca8151b9950432557fb4a08b3d94db03ab21980e299b931b59a044e2227c57f1bb763b52c88248e05c56e0bee21d413313d665b8a8ace9957ea5d3123b534bc95b64add8882a9a721b0b2b4ff8f0ada4ac2bf4f145b9a2b59c4037cda381627037b8c015b46711df1c0c869e8bc63d6b8123bc162e77c5c0b0f1ce418267951da7528f7a9d007071746e7cb10f1dd0a419361c9a8a685d9fab32280439da45a9ef281fef37549849b3699a619cf85015738fc0bc293c6a102bc1cfc23b6d7a5a049f8490e69794187e4fe250f43f0cb0dad1f1a81db4812674e69c097d631364d362a20738c679ec43ff945419c20152ea9e4aceed2f4956c393c51cddeeb24bfce58a47f5faec23883a3872dd6ae2994c7b2cb056bf0e0bf7f881ce35e049a1548ac97415db3683471017f13eedf1569815b71f4e6bfd1ff5663a8413b361e5362797d916c511d640f681b8341014f26d4cd49996393ed4ef03c1502e1d45036b2e1f1e2609699936a503750e88c536c989736d925497e3f3a7471d09d9b09eada9ab998d7b56f458ed09518e078999325be9c4ddc37726a8634c0e59fea6de97c44f6c80930597f2ec6b92089219d4e62aecec7585f4f2398081427bce550bdc35a98917e4313eb7f8c6235ea0cbe4bf4cd9b335de6ab6f5ad0a367b50b797581ad93d54cbd514ef88abbb729c4ad441bfe5eb36b086a2a175d2e47560566a6afbb436d190acf6a4c81cee8b025bfd00e7d6ada0776b3626ee7d8fa582a073c85e1f8b395f668becea23aa8b99c8f145af77c8be03ce5ea5e4601aa69db3d1c1f8a62f20912e39738fd61e623cf291eaa36697e83ef4e43141a7e3292adcef83bef679adc88ebe898f9f0ee4f910e034f33c38b9c914b3397b9735e1668a80ad04ec3befdb34f44ad466292a4b1cc465136254366700d5aa2c0f44b4c9d0d50dd02461ff68458231d3a334fef79342fa8cb59516334891e83aaa0f237b12518db64091439755010eb02f1d08b929d62f985bc7f0eda4f220863a589af3ce63474eb776c3b64fdf25725e09545c04d0dd74b563a5a25b7057178cd595c8363a0c61af1d4fcf0a3a1c4be76fdcc585c9fa3ba7dd733bb0c8b8749a485c055c609c9578cd45348fe976193f61ceb2438b55b9f62d3fba85db6288f3910d9efeac63e7b6a09f27f0124e4a3879eca7f09e701cb7934e69f7f1dd38aca40d1488ef7764eb5c92c4528d2e69c4755e0bc4195aa07f5d28abd476a71b5dd4ff3eaa756afe774213e04c5bd3416cd623d2bd229664242a97ecfb3a6a856889dc8c3052fc0cec8919484d51cc2be44354d9cc3e11d279ca9b3e3d24960333c152340afe71199aeb9e8fcc7f46fbafa897e8a1dbeb0113d2e5eb8b58b845cd28f6b957d78fdb31d93357e1fdef29e7c850149cf0cf2103954a3aecf8426170a7f80b3a9c952cd145f6ab4a5e5cc2b99577af9d2c54e94e14a334c133ca9d8e633e31c1520f93b4cfc1b47a68b18e97e8e917fa1bbd6658be9baffb7586805fbac28659aba62ef75ae904df75640e34662d5873406c49d2ed5115da9198213ebdea33125b9a24438923fb609cc9ea2737a6691189c75e129bd3fdfa896b9bf97a080e8f8c677a2ba8bc9f27c160cab5d96eb83ff014e2c73555d24ef230436c1363d7b47f1b4c8344cbc6266eca30a3dab6cf1e1b065294d4c81e3c7ea3741f0d7e21b95ffd185c179329ecc6b4350218ca73243ff1ad5244a4a342f5fade21811f22795ee0c73d03be2aefd63d1e7ef774038dbceaf22f7830442d8c29fe6e9c9220f99ad0e38302fd8fcd1edbe5a66faf9b4e35195ac1f7793f4d228906d1dd1089f12ae2a57a91bbf845cfe3e9aa871c5817f0fa5b6bb5bd66b69afeebd722eca78b315a64dd1c64eb8f10e7e499b406c76737105b929cfd4485369cf0d3ca3e63927fa20b5712bc6b5fe6ed7f811b73600d1c974201c6c4d4b419115422733d02c9ae2f402b57c053d770a2aafdc83c4b89d5366da76b63427a8a4a546bc3786d6493d7cb83666d55f49d4c78bd48cb5476248bd2dfd1beb3c803a766e4b0ef3fbe958ff1bf37a92aab5ae867e96d09324b03f06c6574c367a083d2020a015774e89f3e78ef6634f10f164767a44563cc450fc304f1d4f0a9655a5b95a85b73a46679b9d77b48c07da5f9b80e31c3665e6f0b7d4abe2e313ab453120fb708a3aa99bf4eb436507735be842e28bf69c5c265dc2bf688608d3750fe15b1029140743f97cc2c24af0d9f6495c4d6a4274779a84a526e0a175741e3c182589c91bf4163fc53e191893847a2e1f946964b79cb9ff758f02ffa477d9f1a846bd2bf4d44c20ca04c11c37b4f4d6597a94d1b9b371e771477fec6f7cbd96e00f255c04e85e720042dc8906032c7ee988eba892bebbdc0ddaab8e47c37e78cbe7b26a78bedb00058df6c03cd1f5091edde9e9b1a00c985f3928d8325a3a416f6d1e1e16b98beb28e2c152213fb29015e97eb78b98764fd7205ae454883e34f59a38b181d183b505c5649bdab17182f8b0f605f2a91cf6ccc5eac3356fcfc496dc70bafe52fbe5c23c96241582df168982428817bc7ea9b5c9108db03ba3bb9625fb9ce8c3f1146a3690a369b6d1d8e1c94a886a4de212a99eba464e32b1b9e84336336583104793de56107a71460bfb738c83c2cfd768d4715d91ac8757a2be8cb13a6d57af6729cd381dbf28d4d82f43ef2ff175545bc681bf1cf3a21da3c516edc29c3266878ebe19453a286dcc1429ab66c97a5bd078b96bac5d4e56954df6c58e8fcce5b6fcc34cd654fcc2ed50c4f86aa0788fa47526a9630d8812861f61051dbadd3bef8d61efa4dd6fd1446b1e49a1e3cf56df510259778648e857355ba6b53e62e2b4cc8f56c0b9b3d113fb816ec467c934cc7332c27f871731abf867fb05f9ed9374f5e8b86455df257d4b1473414d22033aeb8894e25b8f8b1d37a92257ff6545719044bf73dcc02d0731106951d8ad14ed44ba54dfaeff0b76913c4e02c3b1b47eaf2152464d28914d39cc5f6d994b73c81c3ec03a2325b7782bf6e316be6c6bcb5317d76505086f998549834d9793b57127915440f13438b633406d0436356fd01e88cbaff5eaec7af02f59613a36b60cad6e608eba586486f29df2c65adfba210f92d2ff30d77c7629b75b7c2b48cb5b45fec3f04e2eee6a330df0ed3fec995aa93642e017025e6c01b333bed02bc5ac360c4d5e219b05b154917b4e89424257212e8b5f7bb2c6d1df21043874f93ef08f781e9d83382c9dfaadebe68343c93a5969f2ff517c205089e250aca60686f2ae1dc0ebbe902194ea69338afad80d2b1daddab5210d20a007b560aef076b51c92ea2914fc1bf423a169c2eb225c6319b2a9552f911f820426884140abdfa881", 0x1000}, {&(0x7f0000001540)="88b61dec2829aa865dbf94313504b262d5bc033c40fa6e7efad23c15219463a588a0a8c306be80e66c1188a81fa8b735bdf7c20d1a7f7dc9d8511947186fd8ce19e2a7a3d5bd2763bfe44b7d4aea037eda0000645ff97e21b49631478e936d237f86877a3b02dbf1c8d4daaff5287d1c831923061dad233de262934860db6952368335a52383ee76cff037b3546a505288878e671adbfff844c8e512bb118ddae9aed14714c7a4b0940459af3bb3db4e739a45257c61f3188c5f13e73e6002cd008764033fb28e000a8ae1f513549dc29e5b90d58cb3340a175a51b75f2d762461fe0a6556", 0xe5}, {&(0x7f0000001440)="9e11d22a82ace8abe2c7cd2ef0a5102e2ab45728d64c7529dd46c3cb7b6b228e3b2e3f549d69fdff3b68db9a373c9debd480c3cf1dbe9995bd65472073ea1dc57e6018aea56554d78149ceb0f51728d1be192576edd9fc97e3bd02399e56cd808c890698f73ac21e1c42", 0x6a}, {&(0x7f0000001640)="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", 0x1000}, {&(0x7f0000002640)="e9952d4375ded3e78c3e16e41e1c69308b546ec4f448e2cffdf55b5c107a11af80e48f7ef2bd8611459afdf663cc87121a794341127e213cad1ce49e44d2aff109c70982d6ade308825ce506128dcf5ff4e4e8941fa1f9ebf3dd4cbb7d8ab52f5c46b4dad35f442f43d78270488cb21f1e5ab4445c0eb952b7ab633670bc0b6aedf49fd41acd01eaa6949cc100be59918fb39f4f4037eb5616", 0x99}, {&(0x7f0000002700)="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", 0x1000}], 0x7) 21:32:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1451, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:06 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6501, 0x8080fffffffe) [ 822.556934][T17029] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 822.589511][T17029] FAT-fs (loop0): Filesystem has been set read-only [ 822.734930][ T25] audit: type=1804 audit(1573421526.528:281): pid=17150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/554/file0/file0" dev="sda1" ino=16579 res=1 21:32:06 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xca02, 0x8080fffffffe) 21:32:06 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xffffff0f00000000, 0x8080fffffffe) 21:32:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1459, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000000)) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x2, &(0x7f0000000140)=[{&(0x7f00000001c0)="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", 0x1000, 0x7fffffff}, {&(0x7f00000011c0)="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", 0x1000, 0x10001}], 0x4, &(0x7f00000021c0)='trusted]\x00') getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:07 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x140400, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x105201, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f0000000180)=0xad) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, [], [{0x2, 0x7f800000, 0x2e4, 0x7, 0x0, 0x3}, {0x61, 0x0, 0xfffc, 0x3, 0x9, 0xc000000}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1461, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 823.276417][ T25] audit: type=1804 audit(1573421527.068:282): pid=17204 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/510/file0" dev="sda1" ino=16531 res=1 [ 823.474596][ T25] audit: type=1804 audit(1573421527.128:283): pid=17188 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/471/file0/file0" dev="sda1" ino=17180 res=1 21:32:07 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6600, 0x8080fffffffe) 21:32:07 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xcb01, 0x8080fffffffe) 21:32:07 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xffffffff00000000, 0x8080fffffffe) 21:32:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1469, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 823.638340][ T25] audit: type=1804 audit(1573421527.368:284): pid=17220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/555/file0/file0" dev="sda1" ino=17192 res=1 21:32:07 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/mixer\x00', 0x2000, 0x0) r6 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r6, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r7 = syz_open_dev$dmmidi(&(0x7f0000000c00)='/dev/dmmidi#\x00', 0x0, 0x480) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x32020000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000c40)={0x8c, r2, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r4}, {0x8}, {0x8, 0x1, r0}, {0x8, 0x1, r5}, {0x8, 0x1, r0}, {0x8, 0x1, r1}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x10001}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r6}, {0x8, 0x1, r7}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xffffffffffff8000}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8000}]}, 0x8c}, 0x1, 0x0, 0x0, 0xdce45907cb31cac7}, 0x1f5cb8a90475bf2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 824.034988][T17328] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 824.051584][T17328] FAT-fs (loop4): Filesystem has been set read-only 21:32:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x146d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000001c0)={[0x2, 0x0, 0x3713, 0x100, 0x8, 0x1227, 0x9, 0x1, 0x82, 0x80000000, 0x4, 0x3, 0xffffffff80000000, 0x3f75, 0x3, 0x200], 0xd000, 0x41250}) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 824.401609][ T25] audit: type=1804 audit(1573421528.188:285): pid=17380 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/556/file0/file0" dev="sda1" ino=16977 res=1 21:32:08 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7304, 0x8080fffffffe) 21:32:08 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xcc00, 0x8080fffffffe) [ 824.498928][ T25] audit: type=1804 audit(1573421528.188:286): pid=17343 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/472/file0/file0" dev="sda1" ino=16785 res=1 21:32:08 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xffffffffffffffff, 0x8080fffffffe) 21:32:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1471, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:08 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000440)={0x0, 0x1, 0x7, 'queue2\x00\x00\x00\x00\x00\x00\x00\x00\x00=\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\xcb\xff\xff\xff\x00', 0x208}) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000000)={0x3, r2}) r3 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r3, 0x81785501, &(0x7f00000003c0)=""/67) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x40800, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1475, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 824.960452][T17480] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 824.989845][T17479] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 825.022727][T17480] FAT-fs (loop4): Filesystem has been set read-only [ 825.030969][T17479] FAT-fs (loop0): Filesystem has been set read-only 21:32:09 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7403, 0x8080fffffffe) 21:32:09 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xda03, 0x8080fffffffe) [ 825.235224][ T25] audit: type=1804 audit(1573421529.028:287): pid=17499 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/557/file0/file0" dev="sda1" ino=17181 res=1 21:32:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1479, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) bind$bt_sco(r1, &(0x7f0000000000)={0x1f, {0x2, 0x9, 0x6, 0x80, 0x2, 0x7}}, 0x8) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:09 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000780)=""/8) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000007c0)) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16, 0x3}], 0x100010, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af366369f1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7dc56bb7c5aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r5 = fanotify_init(0x200, 0x0) r6 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r6, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f0000000340)='dont_measure', &(0x7f00000003c0)='em1$$]\x00', 0x0) r7 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000005c0)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5bbb89452fd9bb6708ae89ba29", 0xde, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r7, r8, r9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x200000, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno'}, 0x2c, {[{@access_user='access=user'}, {@aname={'aname', 0x3d, 'user'}}, {@cache_loose='cache=loose'}, {@privport='privport'}, {@cache_fscache='cache=fscache'}, {@access_any='access=any'}, {@dfltgid={'dfltgid', 0x3d, r9}}], [{@fowner_lt={'fowner<', r10}}, {@dont_measure='dont_measure'}, {@obj_role={'obj_role'}}, {@euid_eq={'euid', 0x3d, r11}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}}) fanotify_mark(r5, 0x1, 0x4800003e, r4, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) 21:32:09 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='\xdcdev/dlm-contwol\x00', 0x101000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000140)=""/104, 0x68) r2 = semget(0x3, 0xf, 0x1) semctl$SEM_INFO(r2, 0x1, 0x13, &(0x7f0000000340)=""/108) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0x7f, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) membarrier(0x1, 0x0) 21:32:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x147d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 825.750141][T17623] 9pnet: Insufficient options for proto=fd [ 825.879694][ T25] audit: type=1804 audit(1573421529.668:288): pid=17643 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/474/file0/file0" dev="sda1" ino=17156 res=1 21:32:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1481, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:09 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xdb02, 0x8080fffffffe) 21:32:09 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7502, 0x8080fffffffe) 21:32:10 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1485, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 826.498286][T17775] 9pnet: Insufficient options for proto=fd 21:32:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 826.685135][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 826.685217][ T25] audit: type=1804 audit(1573421530.478:291): pid=17866 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/514/file0/file0" dev="sda1" ino=17187 res=1 21:32:10 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x4822, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x8b1b5d2f3ead6cf1, 0x0, 0x0, 0x9, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:10 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7601, 0x8080fffffffe) 21:32:10 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x82200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x50, r4, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xcd}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x80}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 21:32:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x148d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 826.894635][ T25] audit: type=1804 audit(1573421530.688:292): pid=17791 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/475/file0/file0" dev="sda1" ino=17180 res=1 21:32:10 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xdc01, 0x8080fffffffe) 21:32:10 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000140)=""/172) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1491, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 827.300535][ T25] audit: type=1804 audit(1573421531.088:293): pid=18040 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/515/file0/file0" dev="sda1" ino=17177 res=1 21:32:11 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x109001) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:11 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x7700, 0x8080fffffffe) 21:32:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1495, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 827.611675][ T25] audit: type=1804 audit(1573421531.398:294): pid=18054 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/476/file0/file0" dev="sda1" ino=17181 res=1 21:32:11 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x1, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 21:32:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:11 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xdd00, 0x8080fffffffe) 21:32:11 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000280)={0x2, &(0x7f0000000140)=[{}, {0x0}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f00000003c0)={r1, 0x4}) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x149d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 828.062298][ T25] audit: type=1804 audit(1573421531.858:295): pid=18286 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/516/file0/file0" dev="sda1" ino=16785 res=1 21:32:12 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x8404, 0x8080fffffffe) 21:32:12 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000280)='./file1\x00', 0x800, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000300)="47506b6e9c110529a562766f8979160b08e66475", 0x14, 0x7}, {&(0x7f0000000440)="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", 0xfa, 0x1}, {&(0x7f0000000340)="f589fa4f46cf2dc02fb353349c257ca95a65c64c1924b12ddb762ba18cb528c8ce36baa28797f8b7e8e2", 0x2a, 0x3}, {&(0x7f0000000540)="20acc27b93d481ebf0168fca1f893d5a913a9f5a0437d0b1f4b7329ab19b9a3e77682fdb6d593579de283c14cf1ee681202a7bf1128ab4505107cc570671451fb3f941bc7d16002311eab693c6beb1481a4ff3c47aa0391e332ab0", 0x5b, 0x7}], 0x8080, &(0x7f00000003c0)='vfat\x00') r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) r4 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) setsockopt$bt_hci_HCI_DATA_DIR(r4, 0x0, 0x1, &(0x7f0000000200), 0x4) [ 828.336255][ T25] audit: type=1804 audit(1573421532.128:296): pid=18287 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/477/file0/file0" dev="sda1" ino=17184 res=1 21:32:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14a1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:12 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xeb03, 0x8080fffffffe) 21:32:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:12 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0xfffffffa, 0x4) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 828.878412][ T25] audit: type=1804 audit(1573421532.668:297): pid=18417 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/517/file0/file0" dev="sda1" ino=17212 res=1 21:32:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14a5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 828.992924][T18433] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 829.059914][T18433] FAT-fs (loop0): Filesystem has been set read-only 21:32:12 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x8503, 0x8080fffffffe) 21:32:13 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xec02, 0x8080fffffffe) 21:32:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14a9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:13 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000180)={{0x6, 0x4}, 'port1\x00', 0xa2, 0x2, 0x9, 0xffffffff, 0x3, 0x7, 0xff, 0x0, 0x2, 0xc4}) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) prctl$PR_SET_FPEXC(0xc, 0x40000) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000140)="d353ff072d6881ef7925e53cd488e374a249d25a43de099c9e892d3ca997c8") ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 829.596566][ T25] audit: type=1804 audit(1573421533.388:298): pid=18570 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/518/file0/file0" dev="sda1" ino=17177 res=1 [ 829.715344][ T25] audit: type=1804 audit(1573421533.458:299): pid=18426 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/561/file0/file0" dev="sda1" ino=17210 res=1 21:32:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14ad, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:13 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x8602, 0x8080fffffffe) 21:32:13 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bf6102b5f023ca2b5e34e5af36636df1bc054f491871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) fanotify_init(0x200, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) [ 829.897469][ T25] audit: type=1804 audit(1573421533.688:300): pid=18575 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/479/file0/file0" dev="sda1" ino=16785 res=1 21:32:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14b1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:13 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xed01, 0x8080fffffffe) [ 830.218503][T18610] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 830.237407][T18610] FAT-fs (loop4): Filesystem has been set read-only [ 830.260850][T18702] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 830.291224][T18702] FAT-fs (loop3): Filesystem has been set read-only [ 830.326504][T18702] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 21:32:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14b5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:14 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x8701, 0x8080fffffffe) 21:32:14 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0xaaaaaaaaaaaabd0, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 21:32:14 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0xfffffffffffffffd, 0x40) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) r2 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x8, 0x200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000180)={0x1, 0x2}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) syz_mount_image$nfs4(&(0x7f0000000480)='nfs4\x00', &(0x7f00000004c0)='./file0\x00', 0x1, 0x5, &(0x7f0000000800)=[{&(0x7f0000000500)="66681704cdd4a5787633cbf5b3a132d8214c7cba6d1bc6370461ae9bc259fd8c1d608c7f3c7ccebf3119ded026ec3e8e09103c67803f178493e49772b9a09615caa818a46c713d8de9dfba9eccdd9eefb0f221d978a17ffa65b0ed5b6cf7777f1c428df08a06b41b29278b5ebaed9ea5bfbef3b5f7d735ca5ea7cc75be1c7fb187554b9f3a2265a9f48def7331b1e23d032f741b05dba7c0ce6b836d692be8724e7fd71367a84999208b4c0dff2c118bcaba3f5e0787a1f75c65d2c9ee5506cd7fd19ed9e5e8a9e61361f3e17ab47542da1f89d41c5925dfdbe18962ceae314c84d064ede12ca48b08086d035f", 0xed, 0x3ff}, {&(0x7f0000000600)="929e8701aa38e45b3393bd42c0007fe4a70ab14f000698bdf641b972ef4621701c7a75cedf4d4ee918ebc40f2f4ccd7d5d0a07676bbd546ce54cdaee55dfd32c22f63fc762449ca822", 0x49, 0xe7}, {&(0x7f0000000680), 0x0, 0x4}, {&(0x7f00000006c0)="ae8edad6844ece117af3d91cc978718f0a8c92a030f38ccac7f766d6aa8bf2b601a7680ec5ef27301565c6c123675e731f0f21bab194052790d285ad9da89d9371cad347a1c3da474bbf504945ffc8fb04bd403da9ef", 0x56, 0x6}, {&(0x7f0000000740)="161e924ab0cc1c8b577e3388a2702771d538b05fffcb1884fe7d95a6ce302dfc23f695c6dae30eea36a657961ffbb827caf4b2375eda7212e0e503649a9b6add333d93ac9d0f40dedf9d635e563f91414f007465b0313408dec3747befe549560c32baba2a1f9d19d7b8532ae6a5be33ee2634cce43f59769b335a763a5800a8f34f77d2c415d414db4156ed18c5f8924957a6a63cc13e6deccb70b6eb7d6319f707ec", 0xa3, 0x9}], 0x2800, &(0x7f0000000880)='.X)vmnet0-eth1^\'keyringnodevtrustedlo^systemL.user=security*\x00') r4 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000680)={0x0, 0x1, 0x1f, 0x3, 0xc6, 0x80000000, &(0x7f00000008c0)="4a7b66ea301bb73c5e12b6aa305c6481fb19472d457b86f2945faeb8618bfab1b43afb8daccc69cd70b19cbc756bd3b72b8104f2b4da4106b21b9446a66d2aaa8d793b7b520b661379aab067b5dda3712e77ca051c7c59478c205e0022925d432898b69f1a398c803c2c7dc2e72db53fc1995722085aa491feee5ecad5ec87784705dff1f9043b92e222bcf0960ed370073317ae19079317fb7647097f4310974d41132fed60d071ca30eb48a3e544fc263f20d2a694208e267fce37f29ca9c0ed657c07d886"}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000440)=0x33) listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") r5 = accept4$tipc(r0, &(0x7f0000000280)=@id, &(0x7f00000003c0)=0x10, 0x800) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f0000000400)={{0x1, 0x0, @reserved="e711b52f79832d6ba686c1cd4b8c00100bdfdf00ddc68660e75517010cc89357"}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14b9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:14 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xee00, 0x8080fffffffe) [ 830.969167][T18737] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) 21:32:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) ioctl(r1, 0x10000, &(0x7f00000004c0)="9082d9c682e2c18ae729d242c454d34a686545ffc31aa5330238c13217a54a6412e18d87c4b974041b4d18bc92ceb14344c2d00996f50088f76fccd3b577ba6a00c3d569a8d97a592ec05b03b110954674b9707180650f3a16738af61ffcaf08180b9141d4b383998861069b3cd504388f0775f6cfc9885df0acacba4c4cbfc141c04c135e33a6dc8695a4763177e0d104c0a53b54cb1b45eb49235a3123288cc88cbea0bfc7838b331b6d4e51889b49bf7ff4d40795d15f6f5c6c865a0ac93fb9eb5db06a6462b5863db810242bea13abe3f6ba97232b08632d99cae8193c8344471f77") r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/89}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) sendmsg$nl_crypto(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42000800}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x40040) [ 831.018781][T18737] FAT-fs (loop4): Filesystem has been set read-only 21:32:14 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x9, 0x503042) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f00000001c0)={0x3, &(0x7f0000000180)=[0xa2f, 0x4000, 0x917b]}) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) signalfd4(r2, &(0x7f0000000280)={0xfffffffffffffffc}, 0x8, 0x1800) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) r4 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) bind$ax25(r4, &(0x7f00000004c0)={{0x3, @null, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) 21:32:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14bd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:15 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x8800, 0x8080fffffffe) [ 831.400830][T18860] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 831.435163][T18860] FAT-fs (loop0): Filesystem has been set read-only 21:32:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14c1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:15 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xfc03, 0x8080fffffffe) [ 831.817733][ T25] audit: type=1804 audit(1573421535.608:301): pid=19001 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/521/file0" dev="sda1" ino=16977 res=1 [ 831.933338][ T25] audit: type=1804 audit(1573421535.688:302): pid=19002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/563/file0" dev="sda1" ino=16579 res=1 21:32:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14c5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:15 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') quotactl(0x3ff, &(0x7f0000000140)='./file1/file0\x00', 0xffffffffffffffff, &(0x7f0000000180)="ca42598973e470a8252908ecb7452b24c71701a9f6fc9086510e724a57e9a0157a4d659394ccac67baec8793ba02266efe527319282a95866665fde7b17b5fa989703234c8096d608df5bd57240a8735544cf165166995e7af86b8a76c19e56f2fcb75583fbf46adb887dbbddad3176f361cdbc1f22c08509aca88b63863fee5103c35265882bdce245c9fd141dbb00536ef355b816896bd76086c288e266a74cd28274f6885145f739229a939dd7333ac13f877b0d1ca7084b9bee0") listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:15 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x9504, 0x8080fffffffe) 21:32:15 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e349c7628fcb168aa1e9e551871fa48270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x3263639c21b3f2cb, 0xaa) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 21:32:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$sock_int(r0, 0x1, 0xcbecaf76f0d0d225, &(0x7f0000000000)=0x8000, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) prctl$PR_SET_FP_MODE(0x2d, 0x1) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 832.231485][ T25] audit: type=1804 audit(1573421536.018:303): pid=19012 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/482/file0/file0" dev="sda1" ino=17212 res=1 21:32:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14c9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:16 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xfd02, 0x8080fffffffe) [ 832.533404][ T25] audit: type=1804 audit(1573421536.328:304): pid=19144 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/522/file0/file0" dev="sda1" ino=17254 res=1 21:32:16 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x9603, 0x8080fffffffe) 21:32:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14cd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:16 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000140)={0x77359400}, 0x10) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') r1 = creat(&(0x7f0000000200)='./file1/file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x77401098}, 0xc, &(0x7f00000004c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="affc4b87b10eab4fe5f01d902642d20780f922c26dc97c183b2119c7402c7681cb27138733857f71cf1f8b16ae4be2b1a24bee7142d8c306655f25b96bdf519d5eca412dbd90a04d42a130544940a809efdbf8744cd9d8bd60d2167cc043953fd9a2b94e0e20ad08fbb287531ea707d015b67c3a559365cefe78ad7d80fa31f8a0", @ANYRES16=r2, @ANYBLOB="000028bd7000fbdbdf25040000002c0004000c00010073797a300000000030fd07000000040007000000080001001800000008000300a1ea0000400004000c00010073797a30000000000c00010073797a31000000002400070008000200f7ffffff0800040001000000080202005800000008000400040000000c000100080003001f000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4004}, 0x40000) listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/99, 0x63) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r3, 0x52005) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000002c0)={r3, 0x0, 0xe2}, &(0x7f0000000740)=ANY=[@ANYBLOB="656e633d6f61657020686173683d6e68706f6c793133301a2d6e656f6e0000000000000000000000000000000000000000000000000e00000000000000000000000000000000d9c8000000000000b6263df4804e4a403bc6a04dda51debab773f9f8ab304d85c30296cb1ee4e7cf76b588a46fb19acd7ecd9e1a3cfe5d4ad1e93ca83611719ef6dfb1aad9aa56b5ae238a6d7d8de3b9d65595a00cd4de44b98d47dfeaff1cd07f0d4ce9a2eba4c89bbaf0a1f15a347ef2792f6258d53210d0bd576ae2dc16abe88d13"], &(0x7f0000000380), &(0x7f00000005c0)=""/226) request_key(&(0x7f0000000840)='big_key\x00', &(0x7f0000000880)={'syz', 0x3}, &(0x7f00000008c0)='memory.events\x00', r3) r4 = add_key(&(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)="c30b76b5dcdb27b8e42b9cf41821c3740548ef768895bea11a51cefa83186023b4b8d39d6022dc1d19298c5df679b50f05acdbfdd01037735374d7e6c13b898fa413e4ce1b0f148484c4266f2dcd076700140857f2a38eec2aaf1b8eec2eeb0fe470848ba17785fe071bb3b6764ccbb66a0e9dbec3bfc5e1d48d91cefcef4f3bc99e37b5cc9845e04697e65bf5dab3a3361e0b41a347e83fe6e1eeeff9665a9f921ff6e6321d7b87e0c7a35039bfc6c11daff9ab8164b486276fb3886ad39780a4e9266022e998e5a88ac22a8d81de743e6f7b606c7f0983f3e5bf775afd1b6d8ad3bec3aea19dd09abc8b591cc9fca408b3cb185bbff051a4", 0xf9, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000700)=0x8, 0x8) keyctl$get_persistent(0x16, 0x0, r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0xce22, 0x200, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) listen(r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000180)) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 832.942314][T19153] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 833.001743][T19153] FAT-fs (loop0): Filesystem has been set read-only [ 833.122315][T19160] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 833.143522][T19160] FAT-fs (loop4): Filesystem has been set read-only 21:32:17 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xfe01, 0x8080fffffffe) 21:32:17 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000180)={0x2, 'bridge0\x00', 0x1}, 0x18) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000140)=0x401, 0x8) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14d1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:17 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x9702, 0x8080fffffffe) [ 833.335994][ T25] audit: type=1804 audit(1573421537.128:305): pid=19282 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/564/file0/file0" dev="sda1" ino=16785 res=1 21:32:17 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe407d14601381aec2ef65aebcebed416368dbc4d2bb7f507791dd99b3c11d044d0614c5cab10bb4918522177925b2aa62a898d909d4d38e9cc878268be4ec0ced843bd3f2248f77488dd81a7e015a01091c64f58f39ea9dceacc6198fbca361ba668e5914430905b7d89456d30027cb08b4bcc65b8a3b0e00"/165], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 21:32:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f0000000000)) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x1f0b39b1dc5c5c3d, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000080)={0x1000, 0x10000}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000140), &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14d5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 833.969073][ T25] audit: type=1804 audit(1573421537.758:306): pid=19408 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/484/file0/file0" dev="sda1" ino=17247 res=1 [ 834.097488][ T25] audit: type=1804 audit(1573421537.828:307): pid=19430 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/524/file0/file0" dev="sda1" ino=17250 res=1 21:32:18 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xff00, 0x8080fffffffe) 21:32:18 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x9801, 0x8080fffffffe) 21:32:18 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast1}, 0xfe78) listen(r1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x600100, 0x0) splice(r1, &(0x7f0000000140)=0x2, r2, &(0x7f00000001c0)=0x40, 0x81, 0xc) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14d9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:18 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) r4 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_CROP(r4, 0xc014563b, &(0x7f0000000240)={0x7, {0xb5, 0x0, 0x800, 0x7}}) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) sendfile(r1, r5, &(0x7f00000001c0), 0x8080fffffffe) [ 834.255432][ T25] audit: type=1804 audit(1573421537.888:308): pid=19435 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/565/file0/file0" dev="sda1" ino=17257 res=1 21:32:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14dd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x840006, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f00000001c0)=""/4096) 21:32:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14e1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 834.884871][ T25] audit: type=1804 audit(1573421538.678:309): pid=19449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/485/file0/file0" dev="sda1" ino=17246 res=1 [ 835.098576][ T25] audit: type=1804 audit(1573421538.808:310): pid=19586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/525/file0/file0" dev="sda1" ino=17244 res=1 21:32:18 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xff0f, 0x8080fffffffe) 21:32:19 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x9900, 0x8080fffffffe) 21:32:19 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x80003, 0x95, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, 0x0, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2643}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x60080}, 0x24000052) clone(0x8ea81300, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)=0xade) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f00000003c0)=""/106, 0x6a) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:19 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) accept4$rose(r4, 0x0, &(0x7f0000000200), 0x80000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r5, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendfile(r1, r5, &(0x7f0000000240), 0x8080fffffffe) 21:32:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14e5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:19 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0xffffffffffffffe4, 0x3) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@loopback, @in6}}, {{@in6=@mcast2}}}, &(0x7f0000000680)=0xe8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x1d2, @ipv4={[], [], @multicast1}, 0x80000000}}}, 0x30) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000700)={0x7fff, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000006c0)) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') timer_create(0x6, &(0x7f0000000280)={0x0, 0x21, 0x2, @thr={&(0x7f00000003c0)="fda892a59f7ea383e602be8fd9c72d96d5036e55978867f125ec44aa2575116479bc6cec142aeab242addc642ba7c664fb064a5dd9badd43fbff330235ba31e3182a0300f50cf05e3fc2408053a63b8f07bd63dc6f0b3a59c419ce131f432a2cee03195573aa6486e5face6284625b8f99dd11b8f2f6ef09d1512a1b25d18e1dd65d73fb4f2d88aeb0b95d5a541467a540187e84d43e96de0012db99", &(0x7f0000000480)="f5cb9f1499f987dbaf09448e19ef149e3dfa6d16d2f56ac60ee38cc4cd947b4e76c2f89a4eb3a07aba1f51938ddc3d100f5c287ece0c1b6fb4bc239a33a62afa4ba0fe7f0db75e443e4773a8f583fc5eeaeb45336f733e83081712a69d5243c4597b69ff464f7ae93ce4e2c5fb722dc8566e72e2d7ad239437c29cfa7080f9f6021243b299deca6650176f8e51962534d4cea756bdbf8359aff2a2e67c6ba70738a32ed4768782fad6f5937b97"}}, &(0x7f0000000540)) listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10807) [ 835.548313][T19602] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 835.580469][T19602] FAT-fs (loop0): Filesystem has been set read-only [ 835.636830][T19670] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) 21:32:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14e9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 835.686434][T19670] FAT-fs (loop4): Filesystem has been set read-only 21:32:19 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1517f, 0x8080fffffffe) 21:32:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getpeername(r1, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000080)=0x80) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:19 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xa703, 0x8080fffffffe) 21:32:19 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000140)={0x1, 0xf2, [{0x2, 0x0, 0x1}]}) poll(0x0, 0x0, 0xffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14ed, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:19 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x23c}], 0x8200, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) [ 836.357749][T19850] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 836.400424][T19850] FAT-fs (loop0): Filesystem has been set read-only 21:32:20 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, 0x0, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffffffa}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xff, 0x9, 0x4, 0x6]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8b7}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x100}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x18000) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14f1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:20 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x400000, 0x8080fffffffe) 21:32:20 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xa802, 0x8080fffffffe) 21:32:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14f5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:20 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") lgetxattr(&(0x7f0000000140)='./file1/file0\x00', &(0x7f0000000180)=@known='trusted.overlay.opaque\x00', &(0x7f00000003c0)=""/163, 0xa3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000000)) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0x8, @ipv4={[], [], @rand_addr=0x1}, 0x5}], 0x1c) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14f9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 837.260008][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 837.260033][ T25] audit: type=1804 audit(1573421541.048:313): pid=20109 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/488/file0/file0" dev="sda1" ino=16754 res=1 21:32:21 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1000000, 0x8080fffffffe) 21:32:21 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000140), 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 837.426754][ T25] audit: type=1804 audit(1573421541.088:314): pid=20245 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/528/file0/file0" dev="sda1" ino=16817 res=1 21:32:21 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xa901, 0x8080fffffffe) [ 837.480038][ T25] audit: type=1804 audit(1573421541.158:315): pid=20248 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/568/file0/file0" dev="sda1" ino=16545 res=1 21:32:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x14fd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:21 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x80) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000180)=""/108, 0x34f95ebc1e662649) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") accept$alg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1501, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 837.936588][T20335] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 837.967696][T20313] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 837.970810][T20335] FAT-fs (loop0): Filesystem has been set read-only [ 838.008384][T20313] FAT-fs (loop4): Filesystem has been set read-only 21:32:21 executing program 3: sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff578, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x6000000, 0x0, 0x0, 0x600, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$adsp(0x0, 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r3, 0x114, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000500)={r4, &(0x7f0000000480)=""/69}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000300)={r4, 0x17}) r5 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r5, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r6 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r6, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r7 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r7, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x6000000, 0x0, 0x0, 0x600, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_dev$adsp(0x0, 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r9, 0x114, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r9, 0xc010641d, &(0x7f0000000500)={r10, &(0x7f0000000480)=""/69}) ioctl$DRM_IOCTL_LOCK(r7, 0x4008642a, &(0x7f0000000300)={r10, 0x17}) ioctl$DRM_IOCTL_RM_CTX(r6, 0xc0086421, &(0x7f0000000280)={r10, 0x2}) fchdir(r0) r11 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r11, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa3a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r12 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r13 = fanotify_init(0x200, 0x0) fanotify_mark(r13, 0x1, 0x4800003e, r12, 0x0) sendfile(r11, r11, &(0x7f00000001c0), 0x8080fffffffe) 21:32:21 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xaa00, 0x8080fffffffe) 21:32:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x4000, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r3, 0x10f, 0x85) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x20, 0x0, 0x0, 0x3}, &(0x7f0000000180)=0x14) 21:32:22 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2000000, 0x8080fffffffe) 21:32:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1505, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:22 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 838.619353][ T25] audit: type=1804 audit(1573421542.408:316): pid=20538 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/530/file0/file0" dev="sda1" ino=16929 res=1 [ 838.650918][T20523] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 21:32:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1509, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 838.703341][T20523] FAT-fs (loop0): Filesystem has been set read-only 21:32:22 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xb803, 0x8080fffffffe) 21:32:22 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4000000, 0x8080fffffffe) 21:32:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x150d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:22 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x22040, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socketpair(0xa, 0x5, 0x8, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0xa4502d88e9f8895f, 0x70bd29, 0x25dfdbfb}, 0x14}}, 0x4791d232f6806230) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000400)={&(0x7f0000000280)}) listen(r1, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000140)=@v1={0x0, @adiantum, 0x4, "6a0251f97878e3b5"}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 839.194129][T20397] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 839.211680][T20397] FAT-fs (loop3): Filesystem has been set read-only [ 839.218972][T20663] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 839.266081][T20663] FAT-fs (loop4): Filesystem has been set read-only 21:32:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1511, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000140)={r1, 0x0, 0x4, 0x39e, 0xcf}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$PIO_FONTX(r3, 0x4b6c, &(0x7f0000000300)="49d5cff0daf2a98cdfa3af5f4b17909a240e7a4c1eafc5e21990b75fbcc8a79f7edb3eb6b045db302d7a0bc9053acb23cfddf5ea697e4196fa12abb385165d276f4cd38ab7b815a8bcc500dd438a325308ebb205e877372f0c184d9ba10289077630c0d9e8a5051e8e78") setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x8001, @remote, 0x6}}, 0x0, 0x3a, 0x0, "eeded82ff3d2257d80b3a3f6366b12104b3ffcf8867720920e0ed42c547b11383b273b8d4b2b972a9d66649bc1426dacfea526775f6f2a3151be2d1b7761c2930a29f38c13367e8df72c86acd89fc856"}, 0xd8) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000080)) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000040)=0xfffffdbc) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:23 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x10000, 0x20402) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, &(0x7f0000000440)="d5bbd1cb00d79fee8f955fc38c9961e9313a7e1cba14a6f94feccbaf138d187418f6ad6d8665cb395062065b13a86f75f17f3e64dd62cfb3ba01381dff424e90db24322ef10a9b2b5b633d857c51b042cd89b09c526b6b3ec29f5d4d2400209990be2de14e085e9733b2a3391c7208c62ce731f19249c889373b059c47a7d7471f41e9b982dd86451c9a3489dc8d2a8aecf36c7a14dd031f6618a59be39ec482bfe092551e28cc4b54d3902f2fd20041ea2fda1a6d678958254ecf0e0bc0983bff38803c1b5b01e7139610c2329aa2ead00fd166fbc484aef79b4c6a0b9eed66356161a046d708b0a5ad2dce90", &(0x7f0000000540)=""/246}, 0x20) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r4 = fanotify_init(0x200, 0x0) fanotify_mark(r4, 0x1, 0x4800003e, r3, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 21:32:23 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xb902, 0x8080fffffffe) [ 839.538888][ T25] audit: type=1804 audit(1573421543.328:317): pid=20769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/491/file0/file0" dev="sda1" ino=16754 res=1 [ 839.600785][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:32:23 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000b00)='/dev/amidi#\x00', 0x3, 0x410440) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000b40)={0x21, @dev={0xac, 0x14, 0x14, 0x1f}, 0x4e20, 0x0, 'ovf\x00', 0xc, 0x6, 0x1b}, 0x2c) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f00000001c0)={0x32, @multicast2, 0x4e21, 0x1, 'fo\x00', 0xc, 0x7, 0x9}, 0x2c) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000001540)=""/4096, 0x1000) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000400)) listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) utime(&(0x7f0000000140)='./file1/file0\x00', &(0x7f0000000180)={0x8, 0x8}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r5 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r5, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000000440)={'veth1_to_hsr\x00', {0x2, 0x4e20, @loopback}}) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r4, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) ioctl$void(r4, 0x5451) 21:32:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1515, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:23 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xd040000, 0x8080fffffffe) 21:32:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1519, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:23 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000140)={0x3ff, 0x3432564e, 0x9, 0x3ff, 0x2, @stepwise={{0x8, 0x1000}, {0x3, 0x4}, {0x6, 0xa95}}}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:24 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xba01, 0x8080fffffffe) [ 840.245906][ T25] audit: type=1804 audit(1573421544.038:318): pid=20940 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/492/file0/file0" dev="sda1" ino=17073 res=1 [ 840.393099][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:32:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x151d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:24 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xe030000, 0x8080fffffffe) [ 840.650046][ T25] audit: type=1804 audit(1573421544.438:319): pid=21071 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/533/file0/file0" dev="sda1" ino=16657 res=1 21:32:24 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:24 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 840.782189][ T25] audit: type=1804 audit(1573421544.558:320): pid=21080 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/570/file0" dev="sda1" ino=16579 res=1 [ 840.864600][T21072] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 840.926039][T21072] FAT-fs (loop0): Filesystem has been set read-only 21:32:24 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000200)={0x1, 0x6, [@empty, @remote, @broadcast, @remote, @local, @broadcast]}) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYRESDEC=r3], 0x14) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r5 = fanotify_init(0x200, 0x0) fanotify_mark(r5, 0x1, 0x4800003e, r4, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 21:32:24 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xbb00, 0x8080fffffffe) 21:32:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1521, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:25 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xf000000, 0x8080fffffffe) 21:32:25 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x10009db) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 841.282902][T21210] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) 21:32:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1525, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 841.404315][T21210] FAT-fs (loop4): Filesystem has been set read-only 21:32:25 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xc903, 0x8080fffffffe) 21:32:25 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000200)=@hci, &(0x7f0000000280)=0x80) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x1, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r4 = fanotify_init(0x200, 0x40000) fanotify_mark(r4, 0x1, 0x4800003e, r3, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r5, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000340)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0x140, r6, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0x140}, 0x1, 0x0, 0x0, 0x20004001}, 0x11) sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) 21:32:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1529, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 841.816988][ T25] audit: type=1804 audit(1573421545.608:321): pid=21352 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/494/file0/file0" dev="sda1" ino=17274 res=1 21:32:25 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xf020000, 0x8080fffffffe) 21:32:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x152d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000000)="594586b8405fa64e735cc6777e3dac5d3144b902051316a83041ec94efd34978649926c8d50cf24854ce8fd9dbc0147471e63f1136d3265fcd9ea57e473f469d5cd897dbfbb2541699b42e427682", 0x4e}, {&(0x7f0000000080)="541fac619ca8538bdd507518260f6bed43cdf5da2673fd9d5f04ee6a639dfc8d33527bb19335bf8fb581e814ddc895dd819301d2b1966871f574", 0x3a}], 0x2, 0x3a) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:25 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f00000001c0)=""/116, 0x3b) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 842.134007][ T25] audit: type=1804 audit(1573421545.928:322): pid=21363 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/572/file0" dev="sda1" ino=17255 res=1 21:32:26 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f02eec2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000200)={0x3, [0xdb74, 0xb14, 0x6]}, 0xa) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) dup2(r4, r5) [ 842.346093][ T25] audit: type=1804 audit(1573421545.958:323): pid=21379 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/535/file0/file0" dev="sda1" ino=17275 res=1 21:32:26 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xca02, 0x8080fffffffe) [ 842.503110][T21387] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 842.538073][T21387] FAT-fs (loop0): Filesystem has been set read-only 21:32:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1531, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000002c0)=@urb_type_iso={0x0, {0xb, 0x1}, 0x4, 0xe0, &(0x7f0000000000)="f3da4ecfcf365cf85763727560d57ead78ed3e67a05094ff084807bef0f713b59ff6d130e4cd10081df110a0cd7bf94a809b2d131a0fc9ebc215f22cae8131bda3bcf4bd2fbdefefb7181d00e31d74419391c95858dc19921dbbe80f24f0b058770521fdd3c596a486b5b445c1065a0e4a73ed0d98107efa95", 0x79, 0x7, 0x87, 0x56, 0x3, 0x7fffffff, &(0x7f0000000840)="f90a9b03cd2c4a5180700c6476b9b2a66de36968a24fa05bab65385f48be739de1651019369ce08799d6b06840f41b03a2d9171ccee88dc6ac202a90fe36c17440c5d18e94934d873435e9e4aecfd1855471cda056e2353820c8faf751eac8fb821ed58e5ace2bf987f650786a63922b1229dc93db0e60c9fddd894e60d2fdc919bfb784d0665f7dfdf8430fe51fc1bdc7982321c86cdd390a83abb5bc063a2a27eee1dfac0ab4da15058fcd25a5a34d66c7e3a0a04995f5dae6b99b6dea2662f0b332b556e907ca2b77521ebf", [{0x2, 0x2ac, 0x2}, {0x2, 0x0, 0x81}, {0x1000, 0x4, 0xfffffbff}, {0x7fffffff, 0x0, 0xb5a9}, {0x1f, 0x2, 0x5}, {0x6, 0xfff, 0x1}, {0xfffffff7, 0x20000, 0x7}, {0x7, 0x7, 0x80000001}, {0x0, 0x5, 0x20}, {0x7, 0x99, 0x20}, {0x9, 0x2, 0xdc}, {0x7ff, 0xffffffe0, 0x7}, {0x9, 0x8, 0x3f}, {0x6, 0x0, 0x7}, {0x8, 0x6}, {0x9, 0x100, 0x5}, {0x2, 0x4, 0x101}, {0x0, 0xff, 0x101}, {0x7fffffff, 0x40, 0x8}, {0xff, 0xfffffff8, 0x7}, {0x0, 0x1, 0x80000000}, {0xffffffff, 0x4}, {0x5, 0x81, 0x121e8000}, {0x81, 0xfffff801, 0x1e}, {0x80, 0x0, 0x5}, {0x1, 0x5, 0x4}, {0x8000, 0x333b, 0x1}, {0x40, 0xbf5}, {0x6, 0x5, 0x3f}, {0x7, 0x2, 0x80000000}, {0x57, 0x1, 0x3}, {0x5b5, 0x5, 0x1}, {0x200, 0x8, 0x40}, {0x2502, 0x2, 0x7}, {0xdd68, 0x3, 0x9}, {0x8, 0x0, 0x7c}, {0x81, 0x1, 0x8f72}, {0x87a, 0x6, 0x8}, {0xd8, 0x0, 0x3}, {0x2, 0xfff, 0x6c}, {0x7, 0x3, 0x4}, {0x6, 0xffffffff, 0x5}, {0x10000000, 0x7, 0x1}, {0x1, 0xff, 0x4a30}, {0xe2c9, 0x401, 0x9}, {0x6, 0xd9, 0x4}, {0xfffffff7, 0xbd, 0x4}, {0x100, 0x6, 0x43e1}, {0x7fffffff, 0xdc0000, 0xff}, {0x1, 0x4, 0x100}, {0x7, 0x2, 0x2}, {0x2, 0x3, 0x9}, {0x2, 0x1000, 0x5}, {0x61cd, 0x3, 0x5}, {0x4, 0x7, 0x1f}, {0xb469, 0x17cc0, 0x40}, {0xe0a, 0x6, 0x6}, {0x7, 0x6, 0x5}, {0xff, 0x0, 0x7}, {0x5, 0x6, 0x2}, {0x1, 0xff}, {0x20, 0x7, 0x3fc}, {0x1, 0x6, 0x7ff}, {0x9, 0x2c4e3df6, 0x6}, {0x7fffffff, 0x401, 0x3}, {0xca, 0xfffffffe, 0x3}, {0x2, 0x91b, 0x9}, {0x4, 0x0, 0x1ff}, {0xfffffc8b, 0x400, 0x4}, {0x1e1, 0x6}, {0x4, 0x4, 0x1}, {0x7fff, 0xee3, 0x401}, {0x9, 0x1ff, 0x2}, {0x10001, 0x2, 0x3}, {0x6, 0x8, 0x7f}, {0x9, 0x6, 0x3ff}, {0x400, 0x3ff}, {0xa672, 0x8, 0x7fff}, {0x1f, 0x7, 0x7fffffff}, {0x4, 0x1000000, 0x7fffffff}, {0x6, 0x3, 0x81}, {0x4fae, 0x7, 0x5}, {0x9, 0x10001, 0x1}, {0x0, 0xdd2, 0xf1e6}, {0x7, 0x0, 0x1}, {0x1, 0x7ff, 0xfff}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) write$ppp(r2, &(0x7f0000000080)="5fc0865ca8d61826d93cb1d567b1219f6dc736f89191aad772572642", 0x1c) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r3 = socket$inet(0x2, 0x2000080001, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000700)={r5, 0x62f}, &(0x7f0000000740)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000780)={r6, @in6={{0xa, 0x4e24, 0x221, @mcast2, 0x50cc}}}, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:26 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x9, 0x418100) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r2}}, 0x18) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000280)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in6={0xa, 0x0, 0x3, @rand_addr="3d9f77f99c9ccabbeefbf32f641c3e61"}}}, 0x90) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000003c0)={0x6, 0x118, 0xfa00, {{0x2, 0x4, "b28efd6af2778390335d18f8d1c1d15cb72dc0a5f3b3df7f86cf279fccdade7df109a2978328e1d6d88989111e4fff1592ece32f0f74ae040688752bdc115cfb2b284ace169c50a3d63237be4f94157659c24bd81aa3645530156e941d4b78a4dd388fb50bfb24210a5c7945cbe1027deab88ec9cbfac8797d284073aeb4e1d072823af08ce8422d60cbf9d9d4ae5c64054c297bb54e15e1e08d48f9d8b435e884e3d410e70567ebec800cf83e3473529298fcda864ae266db9f16eaf10e9559da856a22c4e289bbc97c2252f390aa78f98a86950d3038c6e559457c002a185eb2bf1121d455b2589121c796b6ac0450c15eb590feb46cabd339ea948e50c423", 0x7, 0x0, 0x7, 0x92, 0x6, 0x1, 0x1}, r2}}, 0x120) poll(0x0, 0x0, 0xffffffff) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:26 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x10000000, 0x8080fffffffe) [ 842.949916][ T25] audit: type=1804 audit(1573421546.738:324): pid=21533 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/536/file0/file0" dev="sda1" ino=17284 res=1 21:32:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1535, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 843.088022][ T25] audit: type=1804 audit(1573421546.788:325): pid=21517 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/573/file0/file0" dev="loop3" ino=549 res=1 21:32:27 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xcb01, 0x8080fffffffe) 21:32:27 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14671381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$USBDEVFS_CLAIMINTERFACE(r3, 0x8004550f, &(0x7f0000000300)=0x4) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000200)) ptrace(0x10, r4) ptrace$cont(0x20, r4, 0x0, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r6 = fanotify_init(0x200, 0x0) fanotify_mark(r6, 0x1, 0x4800003e, r5, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) ioctl$CAPI_NCCI_OPENCOUNT(r2, 0x80044326, &(0x7f0000000200)) 21:32:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x153d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 843.589591][ T25] audit: type=1804 audit(1573421547.378:326): pid=21644 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/496/file0/file0" dev="sda1" ino=16785 res=1 [ 843.671692][ T25] audit: type=1804 audit(1573421547.458:327): pid=21677 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/537/file0/file0" dev="sda1" ino=17288 res=1 21:32:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1541, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:27 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2504c0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000180)={'ipvs\x00'}, &(0x7f00000001c0)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:27 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x10010000, 0x8080fffffffe) 21:32:27 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xcc00, 0x8080fffffffe) 21:32:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1549, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:28 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) accept4$unix(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x6e, 0x80800) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:28 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 21:32:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1559, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 844.580383][ T25] audit: type=1804 audit(1573421548.368:328): pid=21802 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/497/file0/file0" dev="sda1" ino=17297 res=1 [ 844.679996][ T25] audit: type=1804 audit(1573421548.458:329): pid=21832 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/538/file0/file0" dev="sda1" ino=16785 res=1 21:32:28 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x11000000, 0x8080fffffffe) 21:32:28 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000003c0)=@isdn={0x22, 0x0, 0x3f, 0x51, 0x9}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000280)}, {&(0x7f0000000440)="72bf627f28f76163266ac7584c1358966d801b5cbaccce4ca975286b1f129ad69c7953939592e33b47fcc97d2457deeef26beb0a6337a935db2b6b4638919a2f553a7bced7016da8ec23ee036abb163f671ec4671a7f3504874c402e7aea0dfe541e7c7b859381fcf12ec49a80dec00859333d0be5484e8e9273cebf43fcccf42b8754f9ca572af0eb3968b76ac1fd929d4411fd48fa0527deb533432028355a83f4fae7c37cdb95664b29cc5d8e903f82", 0xb1}], 0x2}, 0x4000000) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) r2 = open(&(0x7f0000000140)='./file1/file0\x00', 0x9524df008498d800, 0x61e21e8360c7b604) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000180)={0x9}) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) ioctl$int_in(r1, 0x5421, &(0x7f00000001c0)=0x4) 21:32:28 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xda03, 0x8080fffffffe) 21:32:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x167d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x20, r4, 0xa05, 0x0, 0x0, {}, [{{0x8, 0x1, r5}, {0x4}}]}, 0x20}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)={@rand_addr, 0x0}, &(0x7f0000000140)=0x14) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f0000000180)={r6, 0x5, 0x44, 0xe9, 0x6, 0xf5, 0x8}) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000880)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000900)=""/228, 0xe4}, {&(0x7f0000000a00)=""/238, 0xee}, {&(0x7f0000000b00)=""/48, 0x30}], 0x3, &(0x7f0000000b80)=""/84, 0x54}, 0x100) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)={@rand_addr, 0x0}, &(0x7f0000000140)=0x14) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f0000000180)={r8, 0x5, 0x44, 0xe9, 0x6, 0xf5, 0x8}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004640)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f0000000400)=0xffffffffffffffb9) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)={@rand_addr, 0x0}, &(0x7f0000000140)=0x14) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f0000000180)={r10, 0x5, 0x44, 0xe9, 0x6, 0xf5, 0x8}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000004a00)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000049c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="40020000", @ANYRES16=r4, @ANYBLOB="000227bd7000ffdbdf250100000008000100cc77431843b650bc338f141a9d6dbfc27cbe0c0fad9fe2836720604c1fda0f95e300269f72a782bc036168daf063044a5ec351a2f7e6800caf59b12a9f9eb12f66196497df26042a5490f2a2ad216d625bed474610a59bf4", @ANYRES32=r6, @ANYBLOB="780002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r7, @ANYBLOB="3cbb67e65490048c467365725f6c696e6b75700000000000000000000000000000000000000000000800030006000000040004fbff000600", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="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", @ANYRES32=r10], 0x240}, 0x1, 0x0, 0x0, 0x84800}, 0x90997b996c50d9a2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') syz_init_net_socket$ax25(0x3, 0x7, 0xc4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) r11 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r11, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$USBDEVFS_DISCARDURB(r11, 0x550b, &(0x7f0000000000)=0x2) r12 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000006c0)) mq_timedreceive(r11, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000700)={0x0, 0x1c9c380}) r13 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000005c0)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5bbb89452fd9bb6708ae89ba29", 0xde, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000007c0), &(0x7f0000000480), &(0x7f0000000800)=0x0) keyctl$chown(0x4, r13, r14, r15) ioctl$SIOCAX25DELUID(r11, 0x89e2, &(0x7f0000000240)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r14}) getsockopt$inet_sctp6_SCTP_EVENTS(r11, 0x84, 0xb, &(0x7f00000003c0), &(0x7f0000000540)=0xb) r16 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r16, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$KVM_SET_DEBUGREGS(r16, 0x4080aea2, &(0x7f0000000740)={[0x2, 0xd000, 0x3000, 0xf000], 0x9, 0x5, 0x2}) getsockopt$inet_sctp6_SCTP_INITMSG(r11, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000380)=0x8) fcntl$setstatus(r12, 0x4, 0x42000) fsetxattr$security_selinux(r12, &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:etc_runtime_t:s0\x00', 0x23, 0x3) 21:32:29 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80, 0x20, 0x0, 0x7d, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4003, 0x0, @perf_config_ext={0x8, 0x5b3d}, 0x8b1b5d2f3ead6cf1}, 0x0, 0x6, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 845.355520][ T25] audit: type=1804 audit(1573421549.148:330): pid=22072 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/539/file0/file0" dev="sda1" ino=17302 res=1 21:32:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1685, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 845.492010][ T25] audit: type=1804 audit(1573421549.188:331): pid=22040 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/498/file0/file0" dev="sda1" ino=17299 res=1 21:32:29 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1e040000, 0x8080fffffffe) 21:32:29 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xdb02, 0x8080fffffffe) [ 845.731557][ T25] audit: type=1804 audit(1573421549.508:332): pid=22191 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/575/file0" dev="sda1" ino=17223 res=1 21:32:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16a1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:29 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000200)='./file0\x00', 0x4) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 21:32:29 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000140)=0x2cf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) r4 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) 21:32:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16a9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:30 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xdc01, 0x8080fffffffe) 21:32:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = geteuid() r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) io_setup(0x8, &(0x7f0000000280)=0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_submit(r5, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r6, 0x0}]) r7 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x8888, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB="3a67726f75705f69643d775a725697cab24ae9c097b0e367467e340eb382c621c1249de09ee3bf0254ab927137b02279ce5d84666d4003255e69a7e91026e8f72e5c3f59b37ab5f7224733f7d567858ff7341f6ad22af2918472b2cb4754b8759358260daa9f812737cd257a98c115c3b769a368384bad8845615eea541a046d05d47c5e7df8257ce90b920dd0dfa98a669348f642477f9b845c95d66043642c1aaa9ae00f6565ec43ecba4a49fa2ae85094a9063e77c7ea2efef300004ab2bcf77f80bcb7b87b5b86688b9802a320938264022713612fb455c64511a5b7a7ec418645000000000000000000", @ANYRESDEC=r8, @ANYBLOB=',allow_other,fu']) r9 = shmget(0x3, 0x4000, 0x1000, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_SET(r9, 0x1, &(0x7f00000001c0)={{0x6, 0x0, r8, r3, 0xee01, 0x80, 0x8}, 0x81, 0x7, 0x1, 0x20, 0x0, r4, 0x200}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = getpid() sched_setscheduler(r14, 0x5, &(0x7f0000000380)) r15 = gettid() shmctl$IPC_SET(r9, 0x1, &(0x7f0000000380)={{0x33, r10, r11, r12, r13, 0x138, 0x5}, 0x6, 0x60f4, 0x4, 0xfffffffeffffffff, r14, r15, 0x69}) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000000)={0x8, 0x1f, 0x7}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16ad, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:30 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1f030000, 0x8080fffffffe) 21:32:30 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) 21:32:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16b1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:30 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xdd00, 0x8080fffffffe) 21:32:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x6a6c960e3f727992, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/209) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16b5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:31 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4102f375e879aacc2d13247403e69e49fba86139a729d8e033f0c592d21e28ff9f18852b0ed5b5d195abd98916339e4213e1745abda995a06351a3b2dd604a5dba13bf63bc687b159dde13062cbb89d07746196b"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 21:32:31 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x20020000, 0x8080fffffffe) 21:32:31 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) accept(0xffffffffffffffff, &(0x7f0000000140)=@un=@abs, &(0x7f00000001c0)=0x80) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 847.458952][ T25] kauditd_printk_skb: 5 callbacks suppressed [ 847.459055][ T25] audit: type=1804 audit(1573421551.248:338): pid=22494 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/542/file0/file0" dev="sda1" ino=17290 res=1 21:32:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16b9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 847.590256][T22495] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 847.616320][T22495] FAT-fs (loop0): Filesystem has been set read-only 21:32:31 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xeb03, 0x8080fffffffe) 21:32:31 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x21010000, 0x8080fffffffe) 21:32:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16bd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffa, 0x800) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000080)=0x1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) bind$llc(r3, &(0x7f0000000000)={0x1a, 0x666ede4a5860223c, 0xdb, 0x2, 0x8, 0xff, @link_local}, 0x10) [ 848.215469][ T25] audit: type=1804 audit(1573421552.008:339): pid=22637 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/543/file0/file0" dev="sda1" ino=17305 res=1 21:32:32 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x8, 0x32ccce05529606da, 0x29) getpeername$ax25(r0, &(0x7f0000000140)={{0x3, @netrom}, [@netrom, @remote, @null, @netrom, @bcast, @bcast, @null, @bcast]}, &(0x7f00000001c0)=0x48) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0, 0x2a8}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000400)={r3, @in={{0x2, 0x4e20, @local}}}, 0x84) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, &(0x7f00000004c0)={'veth0_to_bond\x00', {0x2, 0x4e21, @multicast1}}) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, &(0x7f0000000200)=0x7f, 0x3, 0x2) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x2) 21:32:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16c1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:32 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xec02, 0x8080fffffffe) [ 848.415591][ T25] audit: type=1804 audit(1573421552.208:340): pid=22631 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/502/file0/file0" dev="sda1" ino=17316 res=1 21:32:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16c5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 848.570727][ T25] audit: type=1804 audit(1573421552.358:341): pid=22658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/577/file0" dev="sda1" ino=17311 res=1 21:32:32 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x22000000, 0x8080fffffffe) 21:32:32 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) setsockopt$CAIFSO_REQ_PARAM(r2, 0x116, 0x80, &(0x7f0000000440)="1d7c6ad7de9088c0b47b4c7c3b9c8c12c082223262390090cdba31c1efda3e34f69cc97f0964e25fd8980144dc8ae9a43b7d7afd27c550b7ec3d72a4a230510788734db4870674e012468a1aff0b323e296937eeb05d232150a5555f746b6da1f9259990510a02bf72135a11c7d921bf339ef89fd8ec454b184f31ab3b201a2ae09a94a00cde6696e5496115bb1e7984eaa20e26dbafdfe9a2cbb691a5e483a8ebcba620764e030ab5c1a3afcea950bf7baaae0a4df62814d8a4f1ca4df2e7d7d79c357960aa5f33a6b0318ecf2c5ebe750cd048085640a6bcfd33e50a67444b91425b", 0xe3) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) recvfrom$unix(r4, &(0x7f0000000540)=""/4096, 0x1000, 0x40010011, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e22}, 0x6e) r5 = fanotify_init(0x200, 0x0) fanotify_mark(r5, 0x1, 0x4800003e, r3, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 21:32:32 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x100, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f00000003c0)=""/158) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) poll(0x0, 0x0, 0xffffffff) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 848.846520][T22662] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 848.913117][T22662] FAT-fs (loop4): Filesystem has been set read-only 21:32:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16c9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:33 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xed01, 0x8080fffffffe) 21:32:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") open(&(0x7f0000000000)='./file0\x00', 0x2082c0, 0x110) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:33 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2f040000, 0x8080fffffffe) 21:32:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16cd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = syz_open_dev$vcsa(&(0x7f0000002940)='/dev/vcsa#\x00', 0x6, 0x82a00) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000029c0)={&(0x7f0000002980)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000002a00)={r2, r3}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvfrom$inet6(r4, &(0x7f0000000000)=""/124, 0x7c, 0x2, &(0x7f0000000080)={0xa, 0x4e21, 0xfff, @rand_addr="09d880e65a87405f4a45a55983588f53", 0x2}, 0x1c) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:33 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) truncate(&(0x7f0000000200)='./file1/file0\x00', 0x6) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r1, 0x52005) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000002c0)={r1, 0x0, 0xe2}, &(0x7f0000000540)=ANY=[@ANYBLOB='enc=oaep hash=nhpoly1305-neon\x00'/78], &(0x7f0000000380), &(0x7f00000005c0)=""/226) request_key(&(0x7f0000000840)='big_key\x00', &(0x7f0000000880)={'syz', 0x3}, &(0x7f00000008c0)='memory.events\x00', r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r1) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x6800) write$ppp(r3, &(0x7f00000006c0)="e709796a04b1d3", 0x7) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000001c0)={r2, 0x66, 0x54}, &(0x7f00000003c0)={'enc=', 'raw', ' hash=', {'crc32c\x00'}}, &(0x7f0000000440)="a09630393f272c57da6d25b2cc79e7f2687c4ba0fcf2b621776b23eab2230b3c42401f13128ddfd8c5f94453fcc6ad78117afad369dadc5210c07b721d8cf40afa358fb73d409a574c2979fb73f665acc67ad829ca2e9899b9f785f1d7cc481ec6a7d6b5f478", &(0x7f00000004c0)=""/84) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:33 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xee00, 0x8080fffffffe) 21:32:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16d5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 849.938466][ T25] audit: type=1804 audit(1573421553.728:342): pid=22928 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/504/file0/file0" dev="sda1" ino=17317 res=1 [ 850.063102][ T25] audit: type=1804 audit(1573421553.818:343): pid=22962 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/578/file0" dev="sda1" ino=17305 res=1 21:32:33 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x30030000, 0x8080fffffffe) 21:32:34 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffffff8, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="63bb6182b5f023ca2b5e34e5af36636df1b31c9e551871fa4a27e9ea8853ec8d12b5f8950bc2ef65aec8ebed410000000000800000000000000000a7ff685f72c814b7fd79570db73a4a97051bcfd0877cf42d864184c15f43aedd80a14217e14daa24ef89004edaaef8c076d4bb780b079bca762c4489edb8953819b788ceb152118daa7b7f11e0cbaf0d0be0fbe4708f33a94f62ee4fabbd1e2fbbdf60eea1c4a769828e5cf7911d0abf1575d821a7b0d962f2a10d4d7936356320938b42dcdd3f1608b4eed269e38fb45b234636d1da48a9d684f7f11c37b62de5083481da4c58a8609c1030086896a909d369d45a2ea0e88c246bd63183493678fd039adb0bd6b48624074252a14e9d496a278064254d45d659162f7e0f015720f577cf3317aeb5f730c5e5ff0fe91a700422ed295700b947d18a49ab3a271e70cda72dfce2665304835e9c82"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) write$P9_RREMOVE(r2, &(0x7f0000000200)={0x7, 0x7b, 0x2}, 0x7) creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r4 = fanotify_init(0x200, 0x0) fanotify_mark(r4, 0x1, 0x4800003e, r3, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 21:32:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16d9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:34 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 850.307905][T23049] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 850.345746][T23049] FAT-fs (loop4): Filesystem has been set read-only 21:32:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16dd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:34 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xfc03, 0x8080fffffffe) [ 850.662072][T23060] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 850.699339][T23060] FAT-fs (loop0): Filesystem has been set read-only 21:32:34 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x84000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0x9, 0x9}) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f00000001c0)="617b3c3b7872baa9133fae211a70f317b3b9c9fc321771a149d9c6dbac222b3f138208b93a1d73e255919dc857290f18a42d19b6b282f4f3d6f3e81e8ee0d874050cbee461416e738e72ba6b0939d3c097f380cdcab5f86bec20782658ae5c30e0bd190bc3cb979bc2c0b60e2e36d1fe33f27e87ac0678dcffe46176d38a295c093a501d1c83393cdd891ad3bbced7c2abd122f56280b8f080a6d42a4e662f93c18c03c048478cbeb65e16e115630e17d65a7a1729ccc9daf94cb315a48b281f2db050f310181ada447afd5a3380bff1e42c4bb1096e28616deb571fa0f7a9a4d23e") 21:32:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16e1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:34 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x31020000, 0x8080fffffffe) 21:32:34 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000180)=r2) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 851.132901][ T25] audit: type=1804 audit(1573421554.928:344): pid=23213 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/547/file0/file0" dev="sda1" ino=17315 res=1 21:32:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16e5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 851.402270][ T25] audit: type=1804 audit(1573421555.198:345): pid=23214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/506/file0/file0" dev="sda1" ino=17336 res=1 21:32:35 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xfd02, 0x8080fffffffe) 21:32:35 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x32010000, 0x8080fffffffe) 21:32:35 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/312], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0xd00242b368960137, 0x4800003e, r2, 0x0) r4 = getpid() syz_open_procfs(r4, &(0x7f0000000200)='net/ip_tables_targets\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) 21:32:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16e9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:35 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8f, 0x2000) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{0x288b7d407b26073e}, "877fdad05a2b7f0b", "7dcbc2bea981a3c571795e22c9ab036bca09f239c2cd97119c0d052729cfda99", "8661eeb2", "c69365eb1097f8a4"}, 0x38) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16ed, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 852.064317][T23343] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 852.085832][T23343] FAT-fs (loop0): Filesystem has been set read-only 21:32:36 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xfe01, 0x8080fffffffe) 21:32:36 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x33000000, 0x8080fffffffe) 21:32:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16f1, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:36 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x2c5, 0x1) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 852.808983][ T25] audit: type=1804 audit(1573421556.598:346): pid=23506 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/549/file0/file0" dev="sda1" ino=17328 res=1 21:32:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16f5, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:36 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x40040000, 0x8080fffffffe) 21:32:36 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xff00, 0x8080fffffffe) [ 852.962274][ T25] audit: type=1804 audit(1573421556.608:347): pid=23498 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/580/file0" dev="sda1" ino=16561 res=1 21:32:36 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff574, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906dac00000000000083020401ed01000270fff8", 0x16}], 0x40008, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x8001, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df19a4c85dc1871fa4a270172112cfe40a7aa0c0a4e00a97cf7ea88bfcc7d14601381aec2ef65aebcebed41715f4ab1a581d4d93ad0a7ebbe5c5ff025a4db625c9942d771d79080f0e7f71dbac7d47ab6589cbf8d309224d4dce7be474eb464830b9d8aa4b4b50b20ea39a1529f05e483558ab0bfdb8309819b78b2b381184628562b1d4db4616b07fbb53a39c2d76b05bd62ea47012ede90db61c3356e6da9fda55270a446bf432a1c686dcdc737b08f37ad0b4e565f4a885b63de8159b13a16238a75867379cf7f4e6963f39793fb5e4ff83a8648d46a2a3b257d4fa716984f71ed341c28c9668946ffc7dfca1f2937c4bd743768692f56106ae4f3b5ea95757df868b26784bd0aa1ac3ac91214d830cdc638e716aece48dd72a6af1a4f"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') syz_mount_image$bfs(&(0x7f0000000200)='bfs\x00', &(0x7f0000000240)='./bus\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000300)=[{&(0x7f0000000280)="8580e05f6808159163c15c04e9cf07e0b5821bc2f4f5212c13e5d91737", 0x1d, 0x7}], 0x4000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./bus\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000100)={0x10, 0x0, 0x6}, 0x10) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) [ 853.014391][ T25] audit: type=1804 audit(1573421556.658:348): pid=23494 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/508/file0/file0" dev="sda1" ino=17337 res=1 21:32:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16f9, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:37 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40004000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r2, 0xb05, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x7fff, 0x8, 0x2, 0xf03}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000001}, 0x8002) r3 = syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") llistxattr(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)=""/4096, 0x1000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/cachefiles\x00', 0x880, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000400)={0x1, 0x98ac, 0xec, 0x0, 0x5}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001540)='/proc/self/net/pfkey\x00', 0x101003, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000001680)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000001740)={&(0x7f0000001640)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)={0x24, r6, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_TYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0xc004}, 0x40108e1) ioctl$EVIOCGBITKEY(r5, 0x80404521, &(0x7f0000001580)=""/168) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000480)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 853.360072][T23527] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 853.421967][T23527] FAT-fs (loop4): Filesystem has been set read-only [ 853.595862][ T25] audit: type=1804 audit(1573421557.388:349): pid=23643 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/509/file0/file0" dev="sda1" ino=16609 res=1 21:32:37 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xff0f, 0x8080fffffffe) 21:32:37 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x41030000, 0x8080fffffffe) 21:32:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x16fd, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:37 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x1, 0x0, 0x5, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$getregset(0x4204, 0xffffffffffffffff, 0x200, &(0x7f0000000280)={&(0x7f0000000140)=""/231, 0xe7}) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 854.018650][T23766] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 854.037900][T23766] FAT-fs (loop4): Filesystem has been set read-only 21:32:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1701, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 854.157276][ T25] audit: type=1804 audit(1573421557.948:350): pid=23637 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/581/file0" dev="sda1" ino=17350 res=1 21:32:38 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1517f, 0x8080fffffffe) [ 854.290248][ T25] audit: type=1804 audit(1573421558.038:351): pid=23774 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/510/file0/file0" dev="sda1" ino=16577 res=1 21:32:38 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue1\x00', 0x8}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) readv(r4, &(0x7f0000000000)=[{&(0x7f0000000280)=""/198, 0xc6}], 0x1) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) read$eventfd(r3, &(0x7f0000000080), 0x8) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x80, 0x0) ioctl$PPPIOCGFLAGS(r5, 0x8004745a, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) 21:32:38 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r4 = fanotify_init(0x200, 0x0) fanotify_mark(r4, 0x1, 0x4800003e, r3, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x21, 0x0) sendmsg$nl_netfilter(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x51020014}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)={0x188, 0x8, 0x1, 0xe16, 0x70bd27, 0x25dfdbfe, {0xc, 0x0, 0x3}, [@nested={0x160, 0x5c, [@generic="996d70d86b87528047f38eb257e55e559f62707197c7e88675f25406153c897b6ec41ab0826ff5ae76577bc9b022259ea5ebe440a49db6fd1003ae201d18fa892b384c9d476069eb6b6792a35a43a683c6772913c61dbd1c7b287fb294e006892af9efb4cfec79c794b7b8d15c8db355ec75aa8feaa943df82c934816edeafccbee89101debf1985fc71f13060931f4513c0d9177593387cb64bcd4a07b62e929f4e5255fa8bd00e1f1c4f84710dff95430ca1d36f", @generic="941d117f4cb8657e97e3e72dd66b62f535a7b249188619439c1b6101d2f950a4e56c581749394ede598e6245ebdc2cdd235f41919f9a97d5d6b19e30d5067a353c82ceb122037afbfd75cca274e2e3c19a5bb581c5555d901efd60086b66e5a178827ad786c10f997b1cb117882f165a73a90e7ccf7bc6cf7a35a4e4d0aca7ba6beb8fe333e07935098adf9a2b391234f578b615a5db239c3565065eb1209136b1a44fa851288b"]}, @typed={0x8, 0x60, @fd=r5}, @generic="d70d2b2cbd84aafe8552f1"]}, 0x188}, 0x1, 0x0, 0x0, 0x100c}, 0x4000) 21:32:38 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x42020000, 0x8080fffffffe) 21:32:38 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1705, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 854.888693][ T25] audit: type=1804 audit(1573421558.678:352): pid=23923 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/552/file0/file0" dev="sda1" ino=17347 res=1 21:32:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1709, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:38 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x400000, 0x8080fffffffe) 21:32:38 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x43010000, 0x8080fffffffe) 21:32:39 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x8) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x4040, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x170d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$evdev(r1, &(0x7f00000001c0)=[{{r2, r3/1000+30000}, 0x5, 0x401, 0x5a08000}], 0x18) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0xc8a, @dev={0xfe, 0x80, [], 0x29}, 0x1}], 0xebf0f94888bab9d3) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) [ 855.604678][ T25] audit: type=1804 audit(1573421559.398:353): pid=24074 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/553/file0/file0" dev="sda1" ino=17359 res=1 [ 855.749706][ T25] audit: type=1804 audit(1573421559.498:354): pid=24066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/512/file0/file0" dev="sda1" ino=17351 res=1 21:32:39 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xffff, 0x57, &(0x7f0000000200)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0xc0000) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000140)={&(0x7f0000ffb000/0x2000)=nil, 0x6, 0x4, 0xa3c1be6e4ce81b09, &(0x7f0000ffc000/0x1000)=nil, 0x3}) fchdir(r0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r5 = fanotify_init(0x200, 0x0) fanotify_mark(r5, 0x1, 0x4800003e, r4, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) 21:32:39 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x1000000, 0x8080fffffffe) 21:32:39 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x44000000, 0x8080fffffffe) 21:32:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1711, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x80}, 0x8) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f00000001c0), 0xfffffffffffffea9) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:40 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x2, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) write$binfmt_misc(r0, &(0x7f00000003c0)={'syz1', "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"}, 0x1004) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) getpeername$ax25(r1, &(0x7f0000000140)={{0x3, @bcast}, [@null, @remote, @remote, @null, @null, @remote, @netrom, @bcast]}, &(0x7f00000001c0)=0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1715, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 856.363189][ T25] audit: type=1804 audit(1573421560.158:355): pid=24215 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/554/file0/file0" dev="sda1" ino=17174 res=1 21:32:40 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x2000000, 0x8080fffffffe) 21:32:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x130, r3, 0x78c7d6277d9f99bb, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x38b1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x21}]}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x40044}, 0x20000004) write$P9_RLINK(r2, &(0x7f0000000300)={0x7, 0x47, 0x2}, 0x7) 21:32:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1719, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:40 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x51040000, 0x8080fffffffe) 21:32:40 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x880, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) utimes(&(0x7f0000001440)='./file1\x00', &(0x7f0000001500)={{0x77359400}}) syz_open_procfs(0x0, &(0x7f0000000e00)='fdinfo/4\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)={@rand_addr, 0x0}, &(0x7f0000000140)=0x14) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f0000000180)={r2, 0x5, 0x44, 0xe9, 0x6, 0xf5, 0x8}) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@local, r2}, 0x14) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) clock_gettime(0x0, &(0x7f0000004180)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)=""/204, 0xcc}, {&(0x7f00000003c0)=""/144, 0x90}, {&(0x7f0000000480)=""/133, 0x85}], 0x3}, 0x96e9}, {{&(0x7f0000000700)=@ipx, 0x80, &(0x7f0000000a40)=[{&(0x7f00000005c0)=""/198, 0xc6}, {&(0x7f0000004200)=""/249, 0xf9}, {&(0x7f00000007c0)=""/202, 0xca}, {&(0x7f00000008c0)=""/137, 0x89}, {&(0x7f0000000980)=""/173, 0xad}], 0x5, &(0x7f0000000ac0)=""/166, 0xa6}, 0xa8a}, {{&(0x7f0000000b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000c00)=""/116, 0x3a}], 0x1}, 0x9}, {{&(0x7f0000000cc0)=@caif=@dbg, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000d40)=""/134, 0x86}, {&(0x7f0000000e00)}, {&(0x7f0000000e40)=""/69, 0x45}, {&(0x7f0000000ec0)=""/109, 0x6d}], 0x4, &(0x7f0000001540)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000000f80)=@nfc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001000)=""/107, 0x6b}, {&(0x7f0000001080)=""/251, 0xfb}], 0x2, &(0x7f00000011c0)=""/10, 0xa}, 0x7}, {{&(0x7f0000001200)=@sco, 0x80, &(0x7f00000026c0)=[{&(0x7f000001d080)=""/102400, 0xb}, {&(0x7f00000012c0)=""/213, 0xd5}, {&(0x7f00000013c0)=""/80, 0xfffffeae}, {&(0x7f0000001440), 0x3aa}, {&(0x7f0000001480)=""/70, 0x4a}, {&(0x7f0000002540)=""/219, 0xdb}, {&(0x7f0000002640)=""/119, 0x77}], 0x7, &(0x7f0000002740)=""/212, 0xd4}, 0x5}, {{&(0x7f0000002840)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000003d80)=[{&(0x7f00000028c0)=""/34, 0x22}, {&(0x7f0000002900)=""/199, 0xc7}, {&(0x7f0000002a00)=""/133, 0xfdc1eaf7ea38b1ed}, {&(0x7f0000002ac0)=""/47, 0x2f}, {&(0x7f0000002b00)=""/203, 0xcb}, {&(0x7f0000002c00)=""/233, 0xe9}, {&(0x7f0000002d00)=""/4096, 0x1000}, {&(0x7f0000003d00)=""/109, 0x6d}], 0x8, 0x0, 0xde}, 0x8}, {{&(0x7f0000003e00)=@tipc=@name, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000003e80)=""/11, 0xb}], 0x1, &(0x7f0000003f00)=""/81, 0x51}, 0x2}], 0x8, 0x2120, &(0x7f00000041c0)={r3, r4+10000000}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x171d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:40 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, &(0x7f0000000140), 0x40, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mISDNtimer\x00', 0x802, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871faca270186252cfe40a7aa0c254e29a97ce9ea88bfcc7d31601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r2 = fanotify_init(0x200, 0x0) fanotify_mark(r2, 0x1, 0x4800003e, r1, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$KIOCSOUND(r3, 0x4b2f, 0x313) [ 857.146060][T24348] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 857.182066][T24348] FAT-fs (loop0): Filesystem has been set read-only 21:32:41 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x4000000, 0x8080fffffffe) 21:32:41 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) 21:32:41 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x52030000, 0x8080fffffffe) 21:32:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1721, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x0, 0x81}, &(0x7f0000000180)=0x14) 21:32:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1725, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 857.880950][ T25] kauditd_printk_skb: 3 callbacks suppressed [ 857.881037][ T25] audit: type=1804 audit(1573421561.668:359): pid=24601 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/556/file0/file0" dev="sda1" ino=17303 res=1 [ 858.051419][ T25] audit: type=1804 audit(1573421561.838:360): pid=24583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/515/file0/file0" dev="sda1" ino=17365 res=1 21:32:41 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x6000000, 0x8080fffffffe) 21:32:41 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x53020000, 0x8080fffffffe) 21:32:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1729, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 858.349281][ T25] audit: type=1804 audit(1573421562.138:361): pid=24471 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/584/file0" dev="sda1" ino=17272 res=1 21:32:42 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) linkat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x400) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socket(0x10, 0x4, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) [ 858.574960][T24620] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 858.619753][T24620] FAT-fs (loop4): Filesystem has been set read-only 21:32:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x172d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:42 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xc000000, 0x8080fffffffe) [ 858.871870][ T25] audit: type=1804 audit(1573421562.658:362): pid=24627 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/516/file0/file0" dev="sda1" ino=17356 res=1 21:32:42 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x2, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000180)={0x8, 0x80000000, 0x401, 0x8, 0xfffffffe, 0xb9}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f00000001c0)=0x10000, 0xffba) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) r2 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0xf89, 0x4001) clock_gettime(0x7, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000003c0)={0x8, 0xc, 0x4, 0x0, {r3, r4/1000+10000}, {0x1, 0x1, 0x38, 0x7, 0x2, 0x5b, "7d44cd09"}, 0x69fe, 0x1, @userptr=0x9, 0x4}) 21:32:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000180)={0x1}, 0x8, 0x0) msgsnd(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="d6"], 0x1, 0x0) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/28}, 0x24, 0x1, 0x2000) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000300)=""/122) msgrcv(r1, &(0x7f00000001c0)={0x0, ""/243}, 0xfb, 0x1, 0x1000) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0xfe27) 21:32:42 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x54010000, 0x8080fffffffe) 21:32:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1731, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 859.271141][ T25] audit: type=1804 audit(1573421563.058:363): pid=24775 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir406923867/syzkaller.EaAo5d/558/file0/file0" dev="sda1" ino=17369 res=1 21:32:43 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xb) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000740)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0xe068000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="14010000", @ANYRES16=r1, @ANYBLOB="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"], 0x114}, 0x1, 0x0, 0x0, 0x40000081}, 0x4000000) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) recvmsg$kcm(r3, &(0x7f0000000600)={&(0x7f0000000200)=@ax25={{0x3, @rose}, [@netrom, @netrom, @null, @rose, @netrom, @rose, @bcast]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/45, 0x2d}, {&(0x7f0000000300)=""/61, 0x3d}, {&(0x7f0000000340)=""/29, 0x1d}, {&(0x7f0000000440)=""/251, 0xfb}], 0x4, &(0x7f0000000540)=""/157, 0x9d}, 0x20) fchdir(r2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x12, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000000000006a0a00fe000000008500000026000000b7ace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f88"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r4, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r5}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r5}, 0xc) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)={r5}, 0xc) ioctl$FS_IOC_GETFSLABEL(r6, 0x81009431, &(0x7f00000007c0)) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r7, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r8 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer\x00', 0x400482, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r8, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) ioctl$TCSETS(r8, 0x5402, &(0x7f0000000640)={0x5, 0x6, 0x401, 0x3, 0x15, 0x1, 0x4, 0x9, 0x1, 0xffff, 0x8000, 0x6}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000006c0)={0x1, 0x3, 0xff, 0x2, 0x80000001}) r9 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r10 = fanotify_init(0x200, 0x0) fanotify_mark(r10, 0x1, 0x4800003e, r9, 0x0) 21:32:43 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xd040000, 0x8080fffffffe) 21:32:43 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x4000, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000180)=0x8000, 0x4) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000100)=0x10000, 0x4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) getsockopt$inet6_dccp_buf(r2, 0x21, 0xe, &(0x7f0000000600)=""/221, &(0x7f0000000700)=0xdd) syz_open_procfs(0x0, &(0x7f0000001500)='net/ip_tables_names\x00') listxattr(&(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000340)=""/100, 0x64) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000280)={0x70, 0x0, &(0x7f00000004c0)=[@request_death, @register_looper, @transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000440)={@ptr={0x70742a85, 0x0, &(0x7f00000003c0)=""/67, 0x43, 0x1, 0x40}, @fda={0x66646185, 0x6, 0x1, 0x29}, @fd={0x66642a85, 0x0, r0}}, &(0x7f0000000200)={0x0, 0x28, 0x48}}, 0x1000}, @acquire={0x40046305, 0x1}, @release={0x40046306, 0x1}], 0xba, 0x0, &(0x7f0000000540)="79c8065c254f2975f915deca054d026c01e9aacac59825306fa3acff73070795f4a21468e10f8a196325c111898c006627e54629cfe3f44126819e9df3fee1a290b789e270222ffd4956c7e5c6d427fae382ad7acb0b8e3325da3d77532e4e7250a9c370d9252822cd2c40a4caf857ebb162acbf0c080af7e282ed25c523a26ebe9f62869d4b176f193fd91df5c835e1d6e20dd91d68b5e13b7e89b02d7706b6402045588204b9125ad4eee5eb0315b6b765776a626e90232f3e"}) 21:32:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1735, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 859.708886][ T25] audit: type=1804 audit(1573421563.498:364): pid=24877 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir443878847/syzkaller.7FTuou/517/file0/file0" dev="sda1" ino=17292 res=1 [ 859.852685][ T25] audit: type=1804 audit(1573421563.608:365): pid=24895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir836149034/syzkaller.53xFLV/585/file0" dev="sda1" ino=17342 res=1 21:32:43 executing program 0: syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0x55000000, 0x8080fffffffe) 21:32:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x1739, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 21:32:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x6d, &(0x7f0000000100), &(0x7f0000000180)=0x143a) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x3, 0x3, 0x21, 0x4, 0x40, 0x7, 0x9, 0x6, 0xff, 0x80, 0x1}, 0xb) 21:32:44 executing program 3: syz_genetlink_get_family_id$SEG6(0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0xc0200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000180)={0x0, 0x4, 0x7, 'queue0\x00', 0x8}) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000200)=0x8, 0x4) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x800) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed41"], 0x3b) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r4 = fanotify_init(0x0, 0x8000) fanotify_mark(r4, 0x1, 0x4800003e, r3, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) 21:32:44 executing program 4: pipe(0x0) syz_genetlink_get_family_id$SEG6(0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="63bb6102b5f023ca2b5e34e5af36636df1b31c9e551871fa4a270172112cfe40a7aa0c254e29a97ce9ea88bfcc7d14601381aec2ef65aebcebed4118a2d581b6985f0c02d888a1a5c4ff1f934c82fa99d5786483aa367c55077d3d5a38cc0d0f6f3107700c2b699289b2f6b5181bd4fa93ab28e09077"], 0x11) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r3 = fanotify_init(0x200, 0x0) fanotify_mark(r3, 0x1, 0x4800003e, r2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xe030000, 0x8080fffffffe) 21:32:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x173d, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 860.438838][T25022] ================================================================== [ 860.447038][T25022] BUG: KCSAN: data-race in d_set_mounted / dput [ 860.453528][T25022] [ 860.456279][T25022] write to 0xffff888125a493c0 of 4 bytes by task 25024 on cpu 1: [ 860.464572][T25022] d_set_mounted+0x193/0x1c0 [ 860.469303][T25022] get_mountpoint+0x13d/0x2d0 [ 860.474292][T25022] lock_mount+0xa0/0x1a0 [ 860.478715][T25022] do_add_mount+0x30/0x1e0 [ 860.483579][T25022] do_mount+0x12e7/0x1560 [ 860.488389][T25022] ksys_mount+0xe8/0x160 [ 860.492826][T25022] __x64_sys_mount+0x70/0x90 [ 860.497455][T25022] do_syscall_64+0xcc/0x370 [ 860.501997][T25022] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 860.507892][T25022] [ 860.510236][T25022] read to 0xffff888125a493c0 of 4 bytes by task 25022 on cpu 0: [ 860.517894][T25022] dput+0x4d/0x750 [ 860.521719][T25022] path_openat+0x29aa/0x36e0 [ 860.526419][T25022] do_filp_open+0x11e/0x1b0 [ 860.530932][T25022] do_sys_open+0x3b3/0x4f0 [ 860.535362][T25022] __x64_sys_creat+0x45/0x60 [ 860.539974][T25022] do_syscall_64+0xcc/0x370 [ 860.544604][T25022] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 860.551624][T25022] [ 860.553986][T25022] Reported by Kernel Concurrency Sanitizer on: [ 860.560962][T25022] CPU: 0 PID: 25022 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 860.569385][T25022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.579551][T25022] ================================================================== [ 860.593812][T25022] Kernel panic - not syncing: panic_on_warn set ... [ 860.600604][T25022] CPU: 0 PID: 25022 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 860.608850][T25022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.620225][T25022] Call Trace: [ 860.623747][T25022] dump_stack+0xf5/0x159 [ 860.628209][T25022] panic+0x210/0x640 [ 860.632851][T25022] ? vprintk_func+0x8d/0x140 [ 860.637586][T25022] kcsan_report.cold+0xc/0xe [ 860.642225][T25022] kcsan_setup_watchpoint+0x3fe/0x410 [ 860.647908][T25022] __tsan_read4+0x145/0x1f0 [ 860.652439][T25022] dput+0x4d/0x750 [ 860.656537][T25022] path_openat+0x29aa/0x36e0 [ 860.662082][T25022] ? audit_remove_tree_rule+0x2c0/0x440 [ 860.668392][T25022] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 860.683611][T25022] do_filp_open+0x11e/0x1b0 [ 860.689667][T25022] ? _raw_spin_unlock+0x4b/0x60 [ 860.695156][T25022] ? __alloc_fd+0x2ef/0x3b0 [ 860.703690][T25022] ? get_unused_fd_flags+0x93/0xc0 [ 860.709202][T25022] do_sys_open+0x3b3/0x4f0 [ 860.713652][T25022] __x64_sys_creat+0x45/0x60 [ 860.718311][T25022] do_syscall_64+0xcc/0x370 [ 860.722977][T25022] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 860.728895][T25022] RIP: 0033:0x45a219 [ 860.732819][T25022] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 860.752586][T25022] RSP: 002b:00007f8494aa6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 860.761027][T25022] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 000000000045a219 [ 860.769021][T25022] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 860.777010][T25022] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 860.785007][T25022] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8494aa76d4 [ 860.793016][T25022] R13: 00000000004c0abd R14: 00000000004d3520 R15: 00000000ffffffff [ 860.802855][T25022] Kernel Offset: disabled [ 860.807216][T25022] Rebooting in 86400 seconds..