, 0x2}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000003c0)={@multicast1, @dev}, &(0x7f0000000400)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000001000000000000000000000000000000e", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']}}, 0x4004c00) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 1435.696387][T26280] IPVS: ftp: loaded support on port[0] = 21 02:27:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0x7, 0x0, &(0x7f0000000080)="4d50b441e69276", 0x0, 0x400}, 0x40) [ 1435.761919][ T27] audit: type=1800 audit(1577500022.909:674): pid=26285 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=427 res=0 [ 1435.791867][T26294] BPF:Invalid section offset 02:27:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff01800000080039503230303075"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000200)) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xc4, 0x1) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x6ac2fab69e37fff9) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="e4f35f6446d5c31124eade"]) [ 1435.813416][T26295] BPF:Invalid section offset [ 1435.827487][ T27] audit: type=1804 audit(1577500022.939:675): pid=26285 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/763/file0/file0" dev="loop3" ino=427 res=1 [ 1435.922039][ T27] audit: type=1804 audit(1577500022.939:676): pid=26285 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/763/file0/file0" dev="loop3" ino=427 res=1 02:27:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0x7, 0x0, &(0x7f0000000080)="4d50b441e69276", 0x0, 0x400}, 0x40) [ 1436.322170][T26308] 9pnet: Insufficient options for proto=fd 02:27:03 executing program 4: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x50000000000, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="7c31e3000007000000040000000000000095f300", @ANYRES32, @ANYBLOB="00000700ffffffff000000f20a000100636f64656c00fdff4b00020008000500000000000800020000000000080005000006000008000300000000000800050000008100080004000000000008000200000000000800010000000000a802040000000000"], 0x7c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000000)={0x800, 0x0, 0x4, 0x8}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f00000000c0)="240000001e005f0214fffffffff807000000000000000000", 0x18) connect$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x1, 0x1, 0x1, 0x2d, 0x7f, "a788d9d6d461aef0e8ed3ed7d193dc2321b53c43d8831a91b4d7e251b944bba1ad46603e333f632f398ab10fd479815106f04ee5dc62442500128f1bb507f7", 0x3}, 0x60) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 1436.436250][T26308] 9pnet: Insufficient options for proto=fd 02:27:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x1000000, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xb, 0x0, &(0x7f0000000080)="4d50b441e692763113ef87", 0x0, 0x400}, 0x40) 02:27:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xa, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000300), 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x2, 0x3, 0x340, 0x0, 0xb8, 0x0, 0xb8, 0x0, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x3, 0x0, {[{{@ip={@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'bond_slave_1\x00', 'veth1\x00'}, 0x0, 0x70, 0xb8, 0x0, {0x6020000}}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x3f, 'syz0\x00'}}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'veth1_to_hsr\x00', 'nr0\x00'}, 0x0, 0x1c8, 0x1f0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x1, 0x7fff, 0x8}}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f) 02:27:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xb, 0x0, &(0x7f0000000080)="4d50b441e692763113ef87", 0x0, 0x400}, 0x40) [ 1437.046465][T26329] xt_NFQUEUE: number of total queues is 0 02:27:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1437.121276][T20456] tipc: TX() has been purged, node left! [ 1437.145151][T26331] xt_NFQUEUE: number of total queues is 0 02:27:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xb, 0x0, &(0x7f0000000080)="4d50b441e692763113ef87", 0x0, 0x400}, 0x40) [ 1437.292169][T20456] tipc: TX() has been purged, node left! 02:27:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f00000005c0)='./bus\x00', 0x5eef439bff9b86cf, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000300), 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair(0x10, 0x6, 0x8, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x3f, 0x1, 0x0, 0x34, 0x0, 0x8, 0x4020, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x7, 0x7}, 0x20000, 0x8000, 0x1ff, 0xa518c069f99e7b24, 0x8, 0x6, 0x20}, r3, 0x5, r1, 0x4) ioctl$CAPI_GET_MANUFACTURER(r2, 0xc0044306, &(0x7f0000000080)=0x1) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f0000000000)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, 0x3, 0x80000001, 0x2, [@default, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) 02:27:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x2000000, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:04 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004000000000000aa3e8384441ad7c495b8ec3ae46de4d8534fff74fb4a53fffdd75cce8e7726"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000004800000000000000000000e507bd917757398400"], &(0x7f0000000080)='s\x00\x00kaller\b', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8982, &(0x7f0000000140)={0x8, 'veth1_to_bond\x00', {'team_slave_0\x00'}, 0x8}) read$char_usb(r1, &(0x7f0000000400)=""/210, 0xd2) 02:27:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xd, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ff", 0x0, 0x400}, 0x40) 02:27:04 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) syz_open_dev$dmmidi(0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000000000000002000000000000000"], 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xc000d00, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) socket$netlink(0x10, 0x3, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000140)={&(0x7f00000002c0)=@l2, 0x80, &(0x7f0000000840)=[{&(0x7f0000000340)=""/193, 0xc1}, {&(0x7f0000000440)=""/215, 0xd7}, {&(0x7f0000000600)=""/150, 0x96}, {&(0x7f0000000080)=""/18, 0x12}, {&(0x7f00000006c0)=""/192, 0xc0}, {&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000000780)=""/149, 0x95}], 0x7, &(0x7f00000008c0)=""/79, 0x4f}, 0x2020) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x40096101, &(0x7f0000000040)) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x8010, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0xc0046d00, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000280)={0x86, @tick=0x80000001, 0x0, {0x0, 0x2}, 0x0, 0x3}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000200)={0x40, 0x3f, 0x80, 0x7f}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) sendto(r1, &(0x7f0000000940)="af4a839373c3080d94727bfff89ab4d0ae550f2095a5a6d3488b30886d54b4a07e7b2e6c426a16a6d677164fd984dc2b02164ba0be3ba74392a86fd274b53747d18b327ad809d65b6c6b066c60cabc42d2de2e2b9262325e70ff23fcedad52fc169d9c0060a38daef69fb472e51b04", 0x6f, 0x4000000, &(0x7f0000000a00)=@ethernet={0x608, @dev={[], 0xe}}, 0x80) 02:27:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xd, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r3, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r5, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r1, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xd, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ff", 0x0, 0x400}, 0x40) 02:27:05 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000840)='/dev/sequencer2\x00', 0x90840, 0x0) nanosleep(&(0x7f0000000900)={0x0, 0x989680}, &(0x7f0000000940)) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) bind$vsock_stream(r2, &(0x7f0000000880)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) io_setup(0x100, &(0x7f00000000c0)=0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, r0, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x8) io_submit(r3, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x68, r4, &(0x7f0000000100)="7e7968c66d11bf7bc7ad46fb3e08aaf437e642a2c43ea9aec073f7aec53560128a72866a96ae3920dbada8d7c837104a6eb1f4673d8e50180f003e6d7ba6f55ef5c185f90fbdb798e58ce6210246d0dab480d90974b75e0912679b90bf14b8886db0c5d889c17bf4b8ae66f0ab69fa9287889538e2e872918c110102d3fb63d228aa265cd58af3872d84b8538a1f27c2bf05b8b844", 0x95, 0x81}]) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040), 0x8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000007c0)={&(0x7f00000002c0)={0x4e0, 0x2, 0x6, 0x0, 0x70bd28, 0x25dfdbfe, {0xa, 0x0, 0x3}, [@typed={0x8, 0x86, @str='\x00'}, @generic="b499ef85536676d9cd374369fb362a3f58fe54208e9ebf817b402b616ea1fe9b8b9e1c8f3c4b0d6621b4f7883689f20994bd576d9ba5229804c17ebea66912d7cc6d5db5b8b4f9b2d0a45b0d3cabc318c81c53ad7741979a86644e32ab71d97d865efb203e7b643d162f7edd50cbaed64de3f78b04aade54522e5ba8ee74a85fc306e9e256c2e9", @generic="20fc26ec24b04357be12aac0abe786ba95aab49353e522036c1cced3d82eab936cb4ad9a7e28897d8fab03e426915f2f0fd4a77945809c38011e380c8feb18e890c0fe7a7a4fae9b455ad062e80f592b089b202a5b18baf69324b491d118279cd80f491b02eb3dcbcd317a6a5f5defc265709ccc466bd650f095b75b4396f8dbfa9fd744f1eace9f42fc0ed4a2e07b812cc4933b527083ff4177a162c12324b77cf880e43107d852a379319a1ce9f2d34fd663eabe5e73c07d9be8a3b4022a822ac0128266aee10199aa9cf76b57b2a2105ce22ad0d2a1", @generic="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", @typed={0xfc, 0x71, @binary="0b0c930c6a29d1f58bb29b384ad81c00f46263aedc7af102dc0758ee2163c67b9aa510794e9652705d43db574b6f12cabf9afb1ad9cc8743e3554c16296e3a4246dd03d08923f2f7590d8ffa5d56107427e2ad79900f72663c51a639a4d09493aae57e335d9ce2f91ef5f1e76149bd8897dd993590aafd2f581884826c26157305bae6e041465aa3f928ee774875b4a506b29752d7740aab3499f1f16a6ae83d2fd393b634638533a114e6e13184ee960ac26ae84b51f3ea0c0917fedc3ea5203a3438b5cb93fd83a3bafdd4d64785433534fd9f2a45f8b0cdb076117da2ede3309b956c872c92446b9c538f7b3892aaf35f3d9f75ae"}, @generic="8b7f93172a25bdbec9d287b8d8ba8acd95c1b2f34cbabbba9f47e57ded29136d2d155c5b6f8f99f8754694b6b4cd957b0da275d713371652fe8fcfd8c257cf0c45e7905a76f1", @nested={0x128, 0x0, [@generic="4cb86ddb104a9f2807d3a32a8e16f4d2d6ecd632ea0435d7249dcc765c3e731d0be84b28e2031a312b81c8768d8a2f53a85c38ae4ab11aa0df984f76d79ac7748e2219535fb5cb122b41b5e5f1f0f15bebbe236e6aebe1a7c51f6742901cd60800ab567f377ef0b45be2b536f6777baa21dd6f5e73dcba97f251df91c7b5ac", @typed={0x14, 0x5, @ipv6=@ipv4={[], [], @multicast2}}, @generic="b16f1ceccfe7a38347342750a6695cc3cee5ec35664e1d13dc67a770742c22a246273d784d016fad9c972af25a5e9d0337b67ca450a7a35b7af945b7e8f621a425ba5caf0c2ee6cf8efeb1d2e79a9525f8ad9190ad668fe1146111345c2deeef7eab2bec451c97f987ab0868b215732bf35bc619da1d95e3cc20a1", @typed={0x14, 0x95, @str='(system@^wlan0\x00'}]}]}, 0x4e0}, 0x1, 0x0, 0x0, 0x4001}, 0x20000010) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000000)={0xfff}, 0x8) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$bt_BT_SECURITY(r5, 0x112, 0x4, &(0x7f0000000980)={0x5, 0x3}, 0x2) write$P9_RLINK(r2, &(0x7f00000008c0)={0x7, 0x47, 0x2}, 0x7) sendmsg(0xffffffffffffffff, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x34000}], 0x1}, 0x0) [ 1438.194239][T26371] overlayfs: unrecognized mount option "uppertiR=./file0" or missing value 02:27:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r3, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r5, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r1, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xd, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ff", 0x0, 0x400}, 0x40) 02:27:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0}, 0x40) 02:27:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x4000000, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r3, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r5, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r1, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:06 executing program 0: ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000040)={'team0\x00\x00\x01\x00'}) r0 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") r2 = msgget(0x0, 0x1) msgsnd(r2, &(0x7f00000001c0)={0x1}, 0x8, 0x0) msgctl$IPC_RMID(r2, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', @ifru_flags=0x2}) [ 1438.931322][ C0] net_ratelimit: 22 callbacks suppressed [ 1438.931332][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1438.942915][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:27:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0}, 0x40) 02:27:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xe, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:06 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000440)='./file0\x00', 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) syz_open_procfs(r2, 0x0) pipe(&(0x7f0000000140)) syz_open_procfs(0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) r4 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x600}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000500)={r6, &(0x7f0000000480)=""/69}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000040)={r6}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r8, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) r10 = dup2(r7, r9) dup3(r10, r8, 0x0) sendto$ax25(0xffffffffffffffff, 0x0, 0x0, 0x800, &(0x7f0000000200)={{0x3, @default, 0x6}, [@bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00TH>C\xf6\xde\xcc\x0e\x19!\x88]O\xcf\x92.c\t\xec\x92Nc\xb3;V\x17\x80\x19D\x01\xb0\xff\xeba\xa5\xc4\x17\xf9\xb1\xf80\xea\xcd\xee5\xb2\x9e\x8a\xf2L\xb9ce\xe9\xed \xfe\x85\xa8\x91\xba\x89\x1c\x16\xe0%\xbc\xcdR1h\xf0\xae;\x1a\xc5\x85\xd0:uT\x9a\x8e\x96\xeb\x95#\x9d>\r\x85\xad4\xda\xaa\xaa\x81\x16\xa0N\xd3~~\x86\xceK\x92\x98y\x85\xac\x8d^k\xd5\xeb\x11H\x8e\xb4\x00\xbd\xae\x7f\tP>V\x8e\xb7\xa3\xf1\x17\x10\x87\xe9\x1d\x11\xbd\bh\x97\f`G7\xcd\xab]\x15\xbeg\x9eQ\x84an') sendfile(r11, r12, 0x0, 0x320f) 02:27:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0}, 0x40) 02:27:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(0x0, 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1439.251309][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1439.257976][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:27:06 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept$alg(r3, 0x0, 0x0) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x269, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) close(r4) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xe) ftruncate(r2, 0x200004) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) accept$alg(r5, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80001d00c0d0) [ 1439.331340][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1439.337172][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:27:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40) 02:27:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x5430000, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(0x0, 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1440.051282][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1440.058019][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1440.059121][ T27] audit: type=1800 audit(1577500027.199:677): pid=26430 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16875 res=0 02:27:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x60, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(0x0, 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40) 02:27:07 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./bus/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept$alg(r3, 0x0, 0x0) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x269, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) r5 = add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$reject(0x13, r5, 0xf66c8d7, 0xadc9, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) recvmmsg(r7, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x269, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYBLOB="8dc1c3104f519c7e3fd3d05aefcc5445ebcca9c59f165df88a8784e6507c18598e5f5cb939312387386b24e6702af7a33e6fcc68b1fd22fb4c1b7e81b35eaa5579d04b692474a7db2cba1c03168fba50a76c65a993c25cf03477532615273d9621c5552abf64bc6e30ecd3b034fea95d149b3cec49", @ANYPTR64, @ANYPTR64, @ANYRESHEX=r4, @ANYRESDEC, @ANYRESOCT=r5, @ANYRESDEC, @ANYRESOCT=r7, @ANYRESHEX, @ANYRESHEX]], @ANYRES16=r2, @ANYRES16=r5]) mkdir(&(0x7f0000000040)='./bus/file1\x00', 0x0) rename(&(0x7f0000000300)='./bus/file1\x00', &(0x7f0000000140)='./bus/file0\x00') rmdir(&(0x7f0000000080)='./bus/file0\x00') 02:27:07 executing program 4: madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xca) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r0, 0x20400000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) r2 = add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$reject(0x13, r2, 0xf66c8d7, 0xadc9, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept$alg(r3, 0x0, 0x0) recvmmsg(r4, &(0x7f0000000e40)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000003c0)=""/231}, {&(0x7f0000002080)=""/4096}, {&(0x7f0000000900)=""/193}, {&(0x7f0000000180)=""/12}, {&(0x7f0000003080)=""/4096, 0x340}, {&(0x7f0000000300)=""/127}, {&(0x7f0000000b40)=""/247}, {&(0x7f0000004080)=""/4096}]}, 0x8001}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000c40)=""/229}, {&(0x7f0000000800)=""/87}, {&(0x7f0000000d40)=""/232}, {&(0x7f0000000a00)=""/82}]}, 0x1}], 0x3d5, 0x0, &(0x7f0000001380)={0x77359400}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) accept$alg(r5, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) r7 = accept$alg(r6, 0x0, 0x0) recvmmsg(r7, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x269, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, 0x0, 0x0) accept$alg(r8, 0x0, 0x0) r9 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x42000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000a80)=ANY=[@ANYBLOB="300001006d000507000000000000000000000100000000000000e9c1653cefb1dd58f38d16f49b57140436a5ce577d1123fee2b6738bd40c157e4349fcdda940c67f03905a6ab3569d41b432f97f36bb09ab70b83e364adc74805e8119e59673cf6f12ef3513968bcd2c146e5860950a30de4a2b414f2b2aa3445d6e727066fd21470f899cd16460723be8efa2da167f7f87df250000", @ANYRES16=0x0, @ANYRESOCT], 0x3}}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r10 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fchdir(r10) r11 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r12 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r14 = socket$inet_udp(0x2, 0x2, 0x0) close(r14) name_to_handle_at(r13, &(0x7f0000000280)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="460000002c000000a987ce8b9aa5a7433222b7cd84780e1cb1338b7f5352c3bb4b12e4378dfa6549a0240071f4bbcb6be7670f2c46d89dc654113deed0a5cdc141cd0d7e93a8e0f0880c73e9a3"], &(0x7f0000000380), 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r11, &(0x7f0000000600)="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", 0x200) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r15, &(0x7f0000000140)=ANY=[], 0xffd7) accept$netrom(r15, 0x0, &(0x7f0000000000)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), &(0x7f00000001c0)=0x10) sendfile(r11, r12, 0x0, 0x7fffffa7) [ 1440.611635][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1440.618056][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:27:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) [ 1440.848446][T26463] overlayfs: unrecognized mount option "" or missing value 02:27:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 02:27:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x8000000, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 02:27:08 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x59a3, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc04, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) getresgid(0x0, &(0x7f0000001840), &(0x7f0000001880)) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x1, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f00000006c0)={0x298, 0x0, 0x0, [{{0x5, 0x0, 0x0, 0x0, 0x5, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, {0x1, 0x0, 0x10, 0x0, 'veth1_to_bridge\x00'}}, {{0x0, 0x0, 0xbcb, 0x0, 0x0, 0x0, {0x0, 0x1, 0x0, 0x8}}, {0x0, 0x0, 0x0, 0xff}}, {{0x0, 0x0, 0x9, 0x0, 0x196, 0xcf, {0x3, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5}}, {0x0, 0x0, 0x4, 0x0, 'eth1'}}, {{}, {0x0, 0x0, 0x10, 0x0, 'veth1_to_bridge\x00'}}]}, 0x298) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) 02:27:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xf0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xda, 0x80000) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000240)={0x1, 0x4}) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x70d, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_MODE={0x8, 0x1, 0x1}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x10aec61bc6caa7b3}}, 0x20}}, 0x0) 02:27:08 executing program 1 (fault-call:5 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1441.986242][T26502] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1442.104941][T26506] device bond1 entered promiscuous mode [ 1442.166213][T26506] 8021q: adding VLAN 0 to HW filter on device bond1 02:27:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1442.222249][T26502] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 02:27:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:09 executing program 0: syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./bus\x00', 0x0, 0xfffffffffffffe5d, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000038c68e6753026c76e0de4daab811b603db897e23856fe7661b6e2b0b8219020cad9efea51cc8d8114569f633d30e61080a0b5d73342ad4a39bc2cd000062b0443fb3659c502619c74066ca89ac6fa44583cb8d0a3b16afcd5064644b321ec707c9e4dce2f01fbec34e02e612c81255a8"]) 02:27:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xa000000, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x543, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(0x0, 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000651ff8)={0x0, 0x1, 0x0, 0x40}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f000079efe0)={0x9}, 0x20) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0), 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 02:27:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1443.287016][ T27] audit: type=1800 audit(1577500030.419:678): pid=26542 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17121 res=0 [ 1443.377629][ T27] audit: type=1804 audit(1577500030.429:679): pid=26542 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/776/file0/file0" dev="sda1" ino=17121 res=1 02:27:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000180)=""/131, 0x83}, {&(0x7f0000000240)=""/83, 0x53}, {&(0x7f0000000400)=""/111, 0x6f}], 0x3, 0x3) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000801, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1902}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080)={0x27, 0x1, 0x2, 0x6, 0x7, 0x4, "c21db6597b1d9829cd4de1e03cd40d29dd33cf2f61133502459472b20ec5d0803ab6527498f93cfb5b8f65ac0fe6e012eaa392b6362fbec0ca6b9f404e6d6a", 0x18}, 0x60) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300), 0x0) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0x0) ftruncate(r4, 0x200004) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000000)=ANY=[@ANYBLOB="29d0f05e"]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1}, 0x0, 0x8, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000100)=0x2c090) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000040)) sendfile(r1, r4, 0x0, 0x80001d00c0d0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$peekuser(0x3, r7, 0x2) 02:27:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(0x0, 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xd000000, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xa00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(0x0, 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1443.975587][ T27] audit: type=1800 audit(1577500031.119:680): pid=26566 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=434 res=0 02:27:11 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x5040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000b00)='pids.current\x00', 0x2761, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) accept$alg(r4, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000180)) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x200002, 0x0) r6 = socket$netlink(0x10, 0x3, 0x40000000010) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="110d000000000000000004000000"], 0x14}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r5, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x98, r7, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xb42}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x200000000000000}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x507196db}]}]}, 0x98}, 0x1, 0x0, 0x0, 0xc010}, 0x4) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) r9 = dup(r8) ioctl$DMA_BUF_IOCTL_SYNC(r9, 0x40086200, &(0x7f0000000140)=0x1) r10 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r11 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@random={'user.', '/dev/ion\x00'}, &(0x7f0000000240)='\x00', 0x1, 0x1) ioctl$ION_IOC_ALLOC(r11, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b, 0x0, 0xffffffffffffffff}) r13 = dup(r12) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r10, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r13}) ioctl$DRM_IOCTL_GEM_CLOSE(r10, 0x40086409, &(0x7f0000000100)={r14, 0x7000000}) ioctl$DRM_IOCTL_ADD_MAP(r10, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x3b, 0xad417d26eccf56f1, 0x10, &(0x7f0000ffc000/0x1000)=nil}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r9}) [ 1444.027677][ T27] audit: type=1804 audit(1577500031.119:681): pid=26566 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/777/file0/file0" dev="loop3" ino=434 res=1 [ 1444.132106][ C0] net_ratelimit: 18 callbacks suppressed [ 1444.138855][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1444.145846][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1444.221796][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1444.228379][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:27:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1444.328823][ T27] audit: type=1800 audit(1577500031.469:682): pid=26583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=435 res=0 02:27:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1444.389040][ T27] audit: type=1804 audit(1577500031.509:683): pid=26583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/778/file0/file0" dev="loop3" ino=435 res=1 02:27:11 executing program 4: r0 = getpid() ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={&(0x7f0000000080), 0x3bda2f24c6ed3185}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') lseek(0xffffffffffffffff, 0x0, 0x1) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000040), 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = gettid() process_vm_writev(r3, &(0x7f0000000000), 0x0, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) quotactl(0x3f, &(0x7f0000000100)='./file0/file0\x00', r5, &(0x7f0000000180)="5fe72aefeee0c8619fb33455a8119c305fd2d893ad5e6281c46ab733beff45320cc1748d06906436ac29a3aac16629dc5a494f827acab4659974848e4f38dabd7c2a60ef3a110f1fbf76c39611f18f07ef") timer_create(0x0, 0x0, 0x0) timer_delete(0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYBLOB="e3a087ea14bd2a1772d7eff74ffdee070bdb8f02eee5aeb5db1e8c2156e8d0bfeca1b5cae64e12958b0a2b3d7ff060367473f0e85bf9bc8213f11b6a9a7ecf6ff472d33d1dd927978ede87c12edab1c99604782294a0ac5d15dcca1056ff7082eedc38ff602f5c7c97f698d34dba744f177993e46842dfaee132df7781e299563fb49783a45be85168f5e93ec911884e6f88e2215f6a4daf110ef053f4975beb1eaa04e4e532ec2c61d0af56fb", @ANYRESDEC=0x0, @ANYBLOB]) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 02:27:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1444.586922][ T27] audit: type=1800 audit(1577500031.729:684): pid=26593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=436 res=0 02:27:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xe000000, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1444.771301][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1444.777109][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:27:11 executing program 0: inotify_init() ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/\x04\x00\x00\xe8\x02\x00\x00\x00+h~t\x00', 0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200000, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 02:27:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1444.810387][ T27] audit: type=1804 audit(1577500031.759:685): pid=26593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/779/file0/file0" dev="loop3" ino=436 res=1 [ 1444.841459][ T27] audit: type=1804 audit(1577500031.759:686): pid=26593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/779/file0/file0" dev="loop3" ino=436 res=1 02:27:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = dup2(r0, r1) ioctl$TIOCSSERIAL(r2, 0x5453, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) [ 1445.166736][ T27] audit: type=1804 audit(1577500032.309:687): pid=26617 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/780/file0/file0" dev="sda1" ino=17297 res=1 [ 1445.193047][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1445.193072][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:27:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xd00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1445.484316][ T27] audit: type=1804 audit(1577500032.309:688): pid=26617 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/780/file0/file0" dev="sda1" ino=17297 res=1 [ 1445.491662][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1445.515860][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1445.705936][ T27] audit: type=1804 audit(1577500032.359:689): pid=26623 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/780/file0/file0" dev="sda1" ino=17297 res=1 02:27:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:12 executing program 4: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) futex(&(0x7f0000000100)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000200)=0xfff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r1}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000280)='eth0nodevlo\x00', r1}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r1}, 0xc) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8, 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000480)={{0x9, 0x3, 0x1, 0x7, 'syz0\x00', 0x630}, 0x1, [0x8, 0x6, 0x9, 0xab1, 0x800, 0x5f8, 0x5, 0x2, 0x8001, 0x4, 0x60, 0x3, 0x3, 0x1, 0x7, 0x401, 0x80, 0x1, 0x1, 0x10000, 0x5, 0x7fff, 0x4, 0x3, 0x3f, 0xe1d, 0xae, 0x9, 0x7, 0x9, 0x64, 0x4, 0x6, 0x3, 0x5, 0x4, 0x4, 0x4, 0xfff, 0x4, 0x10001, 0xfffffffffffff801, 0x401, 0x1, 0x8, 0x3ff, 0x3, 0x9, 0x5, 0x4, 0x1, 0x100, 0x1, 0x1, 0x0, 0x100000000, 0x4e00000000000000, 0x6, 0x9, 0x100000000, 0x4, 0x4, 0xf27, 0x6, 0x6, 0x4, 0xe58, 0x1, 0x4, 0x2, 0x100000001, 0x7ff, 0x2, 0x4, 0x9, 0x80000000, 0x3f, 0x6, 0x23, 0xfb7c, 0x8, 0x100, 0x3, 0x9, 0x7, 0x2033, 0x81, 0x760, 0xff, 0x58f, 0x5, 0xcc, 0x0, 0x0, 0xfffffffffffffffb, 0x5, 0x0, 0x81, 0x0, 0x2, 0x33, 0x800, 0x3ff, 0x7, 0x3fffc00000000000, 0xc90, 0x7fff, 0x9, 0x5, 0x3f, 0x8c, 0x1, 0x2, 0x3, 0x2, 0x2, 0x1, 0x3, 0x5, 0xb0, 0x3, 0xffff, 0x10001, 0x10000, 0x40, 0x3e4, 0xbc1d, 0xfffffffffffffffd]}) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000000c0)=0x81, &(0x7f0000000280)=0x4) clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1, 0x0) setsockopt$SO_J1939_FILTER(r4, 0x6b, 0x1, &(0x7f0000000180)=[{0x3, 0x1, {0x6, 0xff, 0x1}, {0x1, 0x1}, 0x0, 0x2}, {0x3, 0x1, {0x0, 0x0, 0x4}, {0x3, 0xf, 0x4}, 0xfe, 0xfe}, {0x1, 0x1, {0x3, 0xf0, 0x6}, {0x3}, 0x2, 0xfe}, {0x2, 0x1, {0x0, 0xbc860a7af638db90, 0x4}, {0x1, 0x1, 0x4}, 0x0, 0xfe}, {0x3, 0x0, {0x0, 0x1, 0x4}, {0x1, 0x0, 0x3}, 0x728d21dbfe2ae18b, 0xfe}, {0x3, 0x3, {0x4, 0x0, 0x1}, {0x1, 0xf0}, 0x0, 0xff}, {0x3, 0x1, {0x0, 0xff, 0x4}, {0x1, 0xff, 0x3}}], 0xe0) 02:27:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, 0x0, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1445.952728][ T27] audit: type=1800 audit(1577500033.059:690): pid=26644 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=437 res=0 02:27:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x60000000, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:13 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300), 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @local}, &(0x7f0000000380)=0xc) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x70d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_MODE={0x8, 0x1, 0x5}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x10aec61bc6caa7b3}}, 0x20}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000240)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x2221}}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0x0, 0x1, 'ip6tnl\x00'}, {0x0, 0x2, [@tunl6_policy=[@IFLA_IPTUN_REMOTE={0x0, 0x3, @remote}, @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x1}, @IFLA_IPTUN_FWMARK={0x0, 0x14, 0xffffffff}, @IFLA_IPTUN_LINK, @IFLA_IPTUN_ENCAP_DPORT={0x0, 0x12, 0x4e20}, @IFLA_IPTUN_FWMARK={0x0, 0x14, 0x1}, @IFLA_IPTUN_ENCAP_SPORT={0x0, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x0, 0x11, 0x4e24}]], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x0, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xffff}, @IFLA_IPTUN_FWMARK={0x0, 0x14, 0x8}, @IFLA_IPTUN_LINK={0x0, 0x2, r1}, @IFLA_IPTUN_TTL={0x0, 0x4, 0x3}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0x101}, @IFLA_IPTUN_ENCAP_SPORT={0x0, 0x11, 0x4e21}, @IFLA_IPTUN_LINK={0x0, 0x2, r6}, @IFLA_IPTUN_TOS={0x0, 0x5, 0x3f}], @tunl_policy=[@IFLA_IPTUN_TTL={0x0, 0x4, 0x6}, @IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x2}], @tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA, @IFLA_IPTUN_TOS={0x0, 0x5, 0x20}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xf7}, @IFLA_IPTUN_TOS={0x0, 0x5, 0x1f}, @IFLA_IPTUN_COLLECT_METADATA, @IFLA_IPTUN_TOS={0x0, 0x5, 0x5}], @IFLA_IPTUN_ENCAP_LIMIT={0x0, 0x6, 0x40}, @IFLA_IPTUN_FLAGS={0x0, 0x8, 0x1}, @IFLA_IPTUN_ENCAP_LIMIT={0x0, 0x6, 0x4}, @IFLA_IPTUN_LOCAL={0x0, 0x2, @mcast2}], @IFLA_IPTUN_PROTO, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x0, 0x8, 0x3c}, @IFLA_IPTUN_REMOTE={0x0, 0x3, @local}, @IFLA_IPTUN_REMOTE={0x0, 0x3, @dev={0xfe, 0x80, [], 0x15}}, @IFLA_IPTUN_LOCAL={0x0, 0x2, @empty}, @IFLA_IPTUN_FLOWINFO={0x0, 0x7, 0x1}, @IFLA_IPTUN_LOCAL={0x0, 0x2, @dev={0xfe, 0x80, [], 0x2a}}, @IFLA_IPTUN_ENCAP_LIMIT={0x0, 0x6, 0x20}]]}}}]}, 0x3c}}, 0x0) [ 1446.093760][ T27] audit: type=1804 audit(1577500033.059:691): pid=26644 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/781/file0/file0" dev="loop3" ino=437 res=1 02:27:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1446.306181][ T27] audit: type=1804 audit(1577500033.059:692): pid=26644 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/781/file0/file0" dev="loop3" ino=437 res=1 [ 1446.383608][T26668] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1446.421334][T26668] device bond2 entered promiscuous mode [ 1446.427029][ T27] audit: type=1800 audit(1577500033.409:693): pid=26655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=438 res=0 [ 1446.448243][T26668] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1446.458748][ T27] audit: type=1804 audit(1577500033.449:694): pid=26655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/782/file0/file0" dev="loop3" ino=438 res=1 02:27:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, 0x0, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1446.503573][ T27] audit: type=1804 audit(1577500033.499:695): pid=26655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/782/file0/file0" dev="loop3" ino=438 res=1 02:27:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xe00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:13 executing program 4: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) futex(&(0x7f0000000100)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000200)=0xfff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r1}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000280)='eth0nodevlo\x00', r1}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r1}, 0xc) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8, 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000480)={{0x9, 0x3, 0x1, 0x7, 'syz0\x00', 0x630}, 0x1, [0x8, 0x6, 0x9, 0xab1, 0x800, 0x5f8, 0x5, 0x2, 0x8001, 0x4, 0x60, 0x3, 0x3, 0x1, 0x7, 0x401, 0x80, 0x1, 0x1, 0x10000, 0x5, 0x7fff, 0x4, 0x3, 0x3f, 0xe1d, 0xae, 0x9, 0x7, 0x9, 0x64, 0x4, 0x6, 0x3, 0x5, 0x4, 0x4, 0x4, 0xfff, 0x4, 0x10001, 0xfffffffffffff801, 0x401, 0x1, 0x8, 0x3ff, 0x3, 0x9, 0x5, 0x4, 0x1, 0x100, 0x1, 0x1, 0x0, 0x100000000, 0x4e00000000000000, 0x6, 0x9, 0x100000000, 0x4, 0x4, 0xf27, 0x6, 0x6, 0x4, 0xe58, 0x1, 0x4, 0x2, 0x100000001, 0x7ff, 0x2, 0x4, 0x9, 0x80000000, 0x3f, 0x6, 0x23, 0xfb7c, 0x8, 0x100, 0x3, 0x9, 0x7, 0x2033, 0x81, 0x760, 0xff, 0x58f, 0x5, 0xcc, 0x0, 0x0, 0xfffffffffffffffb, 0x5, 0x0, 0x81, 0x0, 0x2, 0x33, 0x800, 0x3ff, 0x7, 0x3fffc00000000000, 0xc90, 0x7fff, 0x9, 0x5, 0x3f, 0x8c, 0x1, 0x2, 0x3, 0x2, 0x2, 0x1, 0x3, 0x5, 0xb0, 0x3, 0xffff, 0x10001, 0x10000, 0x40, 0x3e4, 0xbc1d, 0xfffffffffffffffd]}) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000000c0)=0x81, &(0x7f0000000280)=0x4) clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1, 0x0) setsockopt$SO_J1939_FILTER(r4, 0x6b, 0x1, &(0x7f0000000180)=[{0x3, 0x1, {0x6, 0xff, 0x1}, {0x1, 0x1}, 0x0, 0x2}, {0x3, 0x1, {0x0, 0x0, 0x4}, {0x3, 0xf, 0x4}, 0xfe, 0xfe}, {0x1, 0x1, {0x3, 0xf0, 0x6}, {0x3}, 0x2, 0xfe}, {0x2, 0x1, {0x0, 0xbc860a7af638db90, 0x4}, {0x1, 0x1, 0x4}, 0x0, 0xfe}, {0x3, 0x0, {0x0, 0x1, 0x4}, {0x1, 0x0, 0x3}, 0x728d21dbfe2ae18b, 0xfe}, {0x3, 0x3, {0x4, 0x0, 0x1}, {0x1, 0xf0}, 0x0, 0xff}, {0x3, 0x1, {0x0, 0xff, 0x4}, {0x1, 0xff, 0x3}}], 0xe0) [ 1446.551130][T26673] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 02:27:13 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) request_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)=')\x00', 0xfffffffffffffffe) socket$nl_route(0x10, 0x3, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x6, 0x3, &(0x7f00000000c0), 0x200000c0) 02:27:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1446.886577][ T27] audit: type=1800 audit(1577500034.029:696): pid=26689 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=439 res=0 02:27:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, 0x0, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:14 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x3bf, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x48, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x34, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @local}, @IFLA_GRE_REMOTE={0x14, 0x7, @local}, @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r2}]]}}}]}, 0x68}}, 0x0) 02:27:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:14 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000)={0xa0, 0x0, 0x0, 0x0, 0x60}, 0x194, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURBNDELAY(r2, 0x4008550d, &(0x7f0000000080)) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000000780)=[{0x0}, {0x0, 0xfffffffffffffecf}, {&(0x7f0000000640)=""/203, 0xcb}], 0x3, 0x0, 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000a00)='/dev/cec#\x00', 0xffffffffffffffff}, 0x30) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, r4) [ 1447.276404][T26707] batman_adv: Cannot find parent device 02:27:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x81000000, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600), 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x269, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, 0x0) rename(&(0x7f0000000340)='./file0\x00', 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x8000, 0x0) accept4$nfc_llcp(r3, 0x0, &(0x7f0000000200)=0x79ead56f, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='ip_vti0\x00 \x00', 0x15b) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r5, 0x4, 0x3800) dup2(0xffffffffffffffff, r5) r6 = syz_open_dev$vbi(0x0, 0x3, 0x2) sendmsg$TIPC_NL_BEARER_DISABLE(r6, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r7 = syz_open_dev$admmidi(&(0x7f0000000640)='/dev/admmidi#\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1000000000, r7, 0xa) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000680)={0xf8, 0x0, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_BEARER={0xd8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x0, 0x6, @mcast2, 0x7}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @mcast2, 0x5}}, {0x14, 0x2, @in={0x2, 0x0, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x4b, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xff}}, {0x14, 0x2, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x41}, 0x0) connect$inet(r4, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r4, &(0x7f0000007fc0), 0x400000000000030, 0x0) 02:27:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x4305, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000014009ff300000000000000000a000000", @ANYRES32=r4, @ANYBLOB="14000100fe8000003609366b7ba161970006cc707eccd0a723ff00000014000200f6880000000000000000000000000001"], 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 02:27:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1447.904171][T26740] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:27:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600), 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1448.286715][T26736] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 02:27:15 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x800, 0x10580) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r1, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0xfffffd89}], 0x1}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0xfffffffffffffd00) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r2, 0x6}, &(0x7f0000000140)=0x8) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r3, 0x104, 0x0, 0x0, &(0x7f0000000000)) 02:27:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xbaffffff, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:15 executing program 0: pipe(0x0) writev(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x422000a7b, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mknod(&(0x7f0000000180)='./file0\x00', 0x10, 0x4) syz_genetlink_get_family_id$tipc(0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x6}) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003000050ad22780648c6394fb0124fc001007b8400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x20000084) r1 = getpid() sched_setaffinity(r1, 0x8, &(0x7f00000001c0)=0x5) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000200)={0x100, 0xe, 0x4, 0x20, 0x6, {0x77359400}, {0x2, 0x2, 0xff, 0x7f, 0x80, 0x6, "350dbf87"}, 0x4, 0xf0a8bedf829b8e0a, @offset=0x8001, 0xffffffc0, 0x0, 0xffffffffffffffff}) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = accept$alg(r4, 0x0, 0x0) recvmmsg(r5, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x269, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) clock_gettime(0x0, &(0x7f0000004140)={0x0, 0x0}) recvmmsg(r5, &(0x7f0000003f80)=[{{&(0x7f0000000980)=@alg, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000a00)=""/241, 0xf1}, {&(0x7f0000000b00)=""/51, 0x33}, {&(0x7f0000000b40)=""/239, 0xef}], 0x3}, 0x5}, {{&(0x7f0000000c80), 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000d00)=""/138, 0x8a}], 0x1}, 0x8}, {{&(0x7f0000000e00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002280)=[{&(0x7f0000000e80)=""/186, 0xba}, {&(0x7f0000000f40)=""/114, 0x72}, {&(0x7f0000000fc0)=""/198, 0xc6}, {&(0x7f00000010c0)=""/51, 0x33}, {&(0x7f0000001100)=""/94, 0x5e}, {&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000002180)=""/39, 0x27}, {&(0x7f00000021c0)=""/20, 0x14}, {&(0x7f0000002200)=""/121, 0x79}], 0x9}, 0x3ff}, {{&(0x7f0000002340)=@nfc, 0x80, &(0x7f00000026c0)=[{&(0x7f00000023c0)=""/12, 0xc}, {&(0x7f0000002400)=""/22, 0x16}, {&(0x7f0000002440)=""/196, 0xc4}, {&(0x7f0000002540)=""/3, 0x3}, {&(0x7f0000002580)=""/51, 0x33}, {&(0x7f00000025c0)=""/243, 0xf3}], 0x6, &(0x7f0000002740)=""/90, 0x5a}, 0x4}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f00000027c0)=""/154, 0x9a}, {&(0x7f0000002880)=""/67, 0x43}, {&(0x7f0000002900)}], 0x3, &(0x7f0000002980)=""/212, 0xd4}, 0x5}, {{&(0x7f0000002a80)=@can, 0x80, &(0x7f0000002c00)=[{&(0x7f0000002b00)=""/18, 0x12}, {&(0x7f0000002b40)=""/138, 0x8a}], 0x2, &(0x7f0000002c40)=""/171, 0xab}, 0x2}, {{&(0x7f0000002d00)=@ax25={{0x3, @null}, [@null, @bcast, @rose, @null, @rose, @rose, @bcast, @default]}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002d80)=""/64, 0x40}, {&(0x7f0000002dc0)=""/208, 0xd0}, {&(0x7f0000002ec0)=""/4096, 0x1000}], 0x3, &(0x7f0000003f00)=""/78, 0x4e}, 0x7fff}], 0x7, 0x100, &(0x7f0000004180)={r6, r7+30000000}) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='environ\x00') read$FUSE(r9, &(0x7f0000000140), 0xfffffefa) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\b\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={r10}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f00000011c0)={r10, 0x1c, &(0x7f0000001180)=[@in6={0xa, 0x4e20, 0xeca, @mcast2, 0x5}]}, &(0x7f0000001200)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r8, 0x84, 0x75, &(0x7f00000041c0)={r10}, &(0x7f0000004200)=0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000840)={{0x6, 0x4, 0x5, 0xffff2795, '\x00', 0x2}, 0x6, 0x203, 0x20, r3, 0x1, 0x0, 'syz1\x00', &(0x7f00000002c0)=['TIPC\x00'], 0x5, [], [0x80, 0x752d, 0xf6e, 0x2]}) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r11 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4a4cc0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r11, 0xc4c85512, &(0x7f0000000340)={{0x8, 0x0, 0x6, 0xc43, 'syz1\x00', 0x10000}, 0x1, [0x1, 0x7ff, 0x6, 0x3ff, 0xffff, 0x80000000, 0x4, 0xff, 0x3ff, 0x10000, 0x7, 0x101, 0x0, 0x1, 0x2517, 0x8, 0x3, 0x5, 0x9, 0x4, 0x0, 0x7, 0x1000, 0x800, 0x1, 0x3ff, 0xb6, 0xfffffffffffffffa, 0x800, 0x6, 0x0, 0xb0f, 0x9, 0x7, 0x1, 0x4, 0x6a8, 0xa47, 0x1, 0x9, 0x4, 0x5, 0x3, 0xfffffffffffffffc, 0x66, 0x3, 0xd70, 0x1, 0x100, 0x2, 0x40, 0x2, 0x2fc, 0x81, 0x8, 0x101, 0x0, 0x8, 0x1000, 0x6d2a, 0x100, 0x9, 0x8, 0x101, 0xffffffffffff0001, 0x0, 0x5, 0x0, 0x7, 0xee2c, 0x6, 0x8000, 0xfffffffffffffffc, 0x7851, 0x71e62113, 0x9, 0xa922, 0x3, 0x4, 0x33, 0x8001, 0x56000000000, 0x3, 0xfd7, 0xffffffff00000001, 0x1000, 0xff, 0x0, 0x4, 0x6, 0x5, 0x101, 0xc0, 0x800, 0x9, 0x0, 0x7fff, 0x40000000000, 0x1, 0xc74, 0x1000000, 0x5, 0x7, 0x8, 0x5, 0x8, 0xfffffffffffffbff, 0x1ff, 0x3, 0x2, 0x9, 0x8001, 0x35cf8bac, 0x2, 0x8000, 0x0, 0x3, 0x7f, 0x7, 0x6, 0x7, 0x24a7, 0x0, 0x6, 0xc31, 0xe00000000000, 0x8, 0xfff]}) 02:27:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600), 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1448.828531][T26767] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1448.908461][T26767] device 0 entered promiscuous mode 02:27:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x6000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1449.150542][T26775] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 02:27:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x100) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1449.239504][T26775] device 1 entered promiscuous mode 02:27:16 executing program 0: mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x8}, 0x8000000200000402, 0x800007f, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2000, 0x0) recvfrom$unix(r1, &(0x7f00000000c0)=""/103, 0x67, 0xdbde8371987990e1, &(0x7f0000000240)=@file={0x0, './bus\x00'}, 0x6e) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14}, 0xfffffff4) [ 1449.331359][ C0] net_ratelimit: 20 callbacks suppressed [ 1449.331369][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1449.342834][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:27:16 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f00", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) r2 = dup(r1) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$setregset(0x4205, r3, 0x2, &(0x7f0000000000)={&(0x7f0000000200)="190817777d7644bf85fa830c6f134b5632f5ddd6c26cc1030106a75ae0f47fc45de7dcd243a3d55ef120e45c1ce58111553bbd7206d86e2369a28d2a2396f54cc5865b7ce640d9060108213f728ebc7b18babf7940c6704d1a25041b4f2fe66f0cebb1e624e5775644f171c3b71582b3d1d6794863abb286159a9c6b5443ce0fc1eafec357bf82865f19c53b939d88400ecb6b62259c52d3449e98062c132ea7d16b24880a6b89eff65f809844b4a471ebe4d609d901264816382fe030e5fc81a7527e1d6a15fcafddac1e3756e9be52", 0xd0}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x80, 0x0) clone(0x1000, &(0x7f00000003c0)="8fd68a1310d022524139c087ffea61c419f5c6bc97618a62e18c4f7e", &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="b8") r5 = socket$inet6(0xa, 0x3, 0x6) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x810, r5, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) connect$inet6(r5, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r6, &(0x7f0000000240)=0x202, 0x4000000000dc) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') ioctl$KVM_S390_UCAS_UNMAP(r6, 0x4018ae51, &(0x7f00000000c0)={0x8000, 0x7ff, 0x2}) sendmsg$NBD_CMD_RECONFIGURE(r6, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050c27bd7000ffdbdf2503000000038fcb910d3878ea257d13c2c77d1b4192a7e400000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_CONNECT(r4, &(0x7f0000000380)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x5c, r7, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x15cfe949cdd3c6bd}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x804}, 0x20000400) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:27:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x3800) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@rand_addr, 0x0}, &(0x7f0000000100)=0x14) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000180)={r4, @local, @local}, 0xc) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086603, &(0x7f0000000080)) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000200)=0xffff) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, r6) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r7, 0x6, 0x16, &(0x7f0000000300), 0x0) syz_kvm_setup_cpu$x86(r7, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x24, 0x0, 0x27f) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80045503, &(0x7f0000000000)={0xa, 0x1}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) [ 1449.493310][T26793] ptrace attach of "/root/syz-executor.4"[26792] was attempted by "/root/syz-executor.4"[26793] 02:27:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x100) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1449.651288][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1449.657119][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:27:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xf2ffffff, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1449.731307][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1449.737088][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:27:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x100) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x8100, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1450.358902][ T27] kauditd_printk_skb: 20 callbacks suppressed [ 1450.358922][ T27] audit: type=1800 audit(1577500037.499:717): pid=26819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=446 res=0 [ 1450.385620][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1450.385661][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1450.397814][ T27] audit: type=1804 audit(1577500037.519:718): pid=26819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/790/file0/file0" dev="loop3" ino=446 res=1 02:27:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x100) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1450.436822][ T27] audit: type=1804 audit(1577500037.579:719): pid=26825 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/790/file0/file0" dev="loop3" ino=446 res=1 [ 1450.471280][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1450.477053][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1450.571703][T20456] device 0 left promiscuous mode 02:27:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x180) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1450.635459][T20456] device 1 left promiscuous mode 02:27:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x16, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6", 0x100) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:18 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x3800) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@rand_addr, 0x0}, &(0x7f0000000100)=0x14) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000180)={r4, @local, @local}, 0xc) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086603, &(0x7f0000000080)) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000200)=0xffff) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, r6) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r7, 0x6, 0x16, &(0x7f0000000300), 0x0) syz_kvm_setup_cpu$x86(r7, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x24, 0x0, 0x27f) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_RESETEP(0xffffffffffffffff, 0x80045503, &(0x7f0000000000)={0xa, 0x1}) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) [ 1450.881896][T20456] tipc: TX() has been purged, node left! 02:27:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x17, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xfeffffff, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1451.062104][ T27] audit: type=1800 audit(1577500038.209:720): pid=26843 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16811 res=0 02:27:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1451.171318][ T27] audit: type=1804 audit(1577500038.209:721): pid=26840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/791/file0/file0" dev="sda1" ino=16811 res=1 02:27:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x180) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1451.373795][ T27] audit: type=1804 audit(1577500038.249:722): pid=26840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/791/file0/file0" dev="sda1" ino=16811 res=1 02:27:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xf000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x2, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1451.810727][ T27] audit: type=1804 audit(1577500038.949:723): pid=26867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/792/file0/file0" dev="loop3" ino=447 res=1 [ 1451.889178][ T27] audit: type=1804 audit(1577500038.949:724): pid=26863 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/792/file0/file0" dev="loop3" ino=447 res=1 [ 1452.080158][ T27] audit: type=1804 audit(1577500038.949:725): pid=26867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/792/file0/file0" dev="loop3" ino=447 res=1 02:27:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x180) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xffff8000, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xfeffffff, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1452.560362][ T27] audit: type=1800 audit(1577500039.699:726): pid=26887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17425 res=0 02:27:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x4, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1453.551839][T20456] device bridge_slave_1 left promiscuous mode [ 1453.558587][T20456] bridge0: port 2(bridge_slave_1) entered disabled state [ 1453.641930][T20456] device bridge_slave_0 left promiscuous mode [ 1453.648320][T20456] bridge0: port 1(bridge_slave_0) entered disabled state [ 1454.468962][T20456] bond2 (unregistering): Released all slaves [ 1454.477789][T20456] bond1 (unregistering): Released all slaves [ 1454.501979][T20456] device hsr_slave_0 left promiscuous mode [ 1454.571487][T20456] device hsr_slave_1 left promiscuous mode [ 1454.617968][T20456] team0 (unregistering): Port device team_slave_1 removed [ 1454.628661][T20456] team0 (unregistering): Port device team_slave_0 removed [ 1454.638676][T20456] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1454.695115][T20456] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1454.754002][T20456] bond0 (unregistering): Released all slaves [ 1455.332679][T26899] IPVS: ftp: loaded support on port[0] = 21 [ 1455.397992][T26899] chnl_net:caif_netlink_parms(): no params data found [ 1455.429433][T26899] bridge0: port 1(bridge_slave_0) entered blocking state [ 1455.436718][T26899] bridge0: port 1(bridge_slave_0) entered disabled state [ 1455.445187][T26899] device bridge_slave_0 entered promiscuous mode [ 1455.453246][T26899] bridge0: port 2(bridge_slave_1) entered blocking state [ 1455.460475][T26899] bridge0: port 2(bridge_slave_1) entered disabled state [ 1455.468605][T26899] device bridge_slave_1 entered promiscuous mode [ 1455.485923][T26899] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1455.496582][T26899] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1455.515867][T26899] team0: Port device team_slave_0 added [ 1455.522700][T26899] team0: Port device team_slave_1 added [ 1455.573708][T26899] device hsr_slave_0 entered promiscuous mode [ 1455.621694][T26899] device hsr_slave_1 entered promiscuous mode [ 1455.678726][T26899] bridge0: port 2(bridge_slave_1) entered blocking state [ 1455.685797][T26899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1455.693131][T26899] bridge0: port 1(bridge_slave_0) entered blocking state [ 1455.700208][T26899] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1455.733078][T26899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1455.746267][T18544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1455.755254][T18544] bridge0: port 1(bridge_slave_0) entered disabled state [ 1455.763389][T18544] bridge0: port 2(bridge_slave_1) entered disabled state [ 1455.779721][T26899] 8021q: adding VLAN 0 to HW filter on device team0 [ 1455.790749][T18544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1455.799598][T18544] bridge0: port 1(bridge_slave_0) entered blocking state [ 1455.806711][T18544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1455.822327][T22400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1455.830662][T22400] bridge0: port 2(bridge_slave_1) entered blocking state [ 1455.837774][T22400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1455.852011][T18544] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1455.868388][T26899] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1455.879047][T26899] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1455.892950][T18544] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1455.901837][T18544] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1455.910562][T18544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1455.919260][T18544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1455.927745][T18544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1455.942577][T18542] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1455.950141][T18542] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1455.960247][T26899] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1456.110485][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 1456.110509][ T27] audit: type=1800 audit(1577500043.249:729): pid=26909 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=448 res=0 02:27:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x349000, 0x0) write$P9_RCLUNK(r1, &(0x7f0000000100)={0x7, 0x79, 0x2}, 0x7) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94", 0x5) 02:27:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351d", 0x1c0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x80ffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x8, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xffff8100, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7", 0x180) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1456.171376][ T27] audit: type=1804 audit(1577500043.269:730): pid=26909 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir467407070/syzkaller.jamsOF/0/file0/file0" dev="loop0" ino=448 res=1 02:27:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1c0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1456.361312][ C1] net_ratelimit: 18 callbacks suppressed [ 1456.361336][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1456.372791][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:27:23 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, @perf_config_ext={0x8}, 0x0, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dri/renderD128\x00', 0x75727ea0105135c4, 0x0) write$binfmt_script(r1, &(0x7f0000001280)={'#! ', './file0', [{0x20, '/dev/media#\x00'}, {0x20, 'rpc_pipefs\x00'}], 0xa, "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"}, 0x1024) r2 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x0) dup2(r2, r3) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000100)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000380)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1, 0x0, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) socket$inet_sctp(0x2, 0x0, 0x84) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)="9dd95908f7fc2aac601acac0fe872c24b763c22d01a4b48a2c0adaa458b950b88e9ce311d20b0194ddec3a6f53df244e29ff169b9ad23bdbe4acdbcba2d54ca32a6fc03fe40447e1a9ac340a64921fd541d3448afa1d73067c942675e77374", 0x5f) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) [ 1456.409794][ T27] audit: type=1804 audit(1577500043.289:731): pid=26909 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir467407070/syzkaller.jamsOF/0/file0/file0" dev="loop0" ino=448 res=1 [ 1456.611422][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1456.617265][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1456.691298][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1456.697109][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1456.737044][ T27] audit: type=1800 audit(1577500043.439:732): pid=26916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=449 res=0 02:27:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xa, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1456.973723][ T27] audit: type=1804 audit(1577500043.449:733): pid=26916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/794/file0/file0" dev="loop3" ino=449 res=1 02:27:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x1f}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001900)={r4, &(0x7f0000000800)="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", &(0x7f0000001800)=""/216, 0x4}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000006c0)={0x2, 0x1, 0x4, 0x2000, 0x4078288f, {0x77359400}, {0x2, 0x8, 0xf, 0xc0, 0x4, 0x5, 'a^m*'}, 0xe168, 0x1, @fd, 0x9, 0x0, r0}) getsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f0000000000), &(0x7f0000000180)=0x4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) accept(0xffffffffffffffff, &(0x7f0000000640)=@ethernet={0x0, @link_local}, &(0x7f00000004c0)=0x80) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r6, 0x127d, &(0x7f0000000540)=0x5201) removexattr(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='b']) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x4e21, @remote}, 0x10) ioctl$VIDIOC_SUBDEV_S_FMT(0xffffffffffffffff, 0xc0585605, &(0x7f0000000780)={0x1, 0x0, {0x1f, 0x8000, 0x15, 0x8, 0x0, 0x4, 0x2, 0xddcc72315041ecb7}}) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0xb2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000]}) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001940)='/proc/capi/capi20\x00', 0x530c02, 0x0) ioctl$TIOCL_SETSEL(r7, 0x541c, &(0x7f0000001980)={0x2, {0x2, 0x0, 0x1f, 0x0, 0x7, 0x3}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1457.255226][ T27] audit: type=1804 audit(1577500043.449:734): pid=26916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/794/file0/file0" dev="loop3" ino=449 res=1 02:27:24 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000001c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) rename(&(0x7f0000000080)='./bus/file0\x00', &(0x7f0000000140)='./bus/file1\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdir(&(0x7f0000000300)='./bus/file0\x00', 0x0) [ 1457.331503][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1457.337831][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:27:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1c0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1457.448516][ T27] audit: type=1800 audit(1577500043.819:735): pid=26926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=450 res=0 02:27:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x81ffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xd, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1457.619857][ T27] audit: type=1804 audit(1577500043.949:736): pid=26926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir084029388/syzkaller.9eiAV5/116/file0/file0" dev="loop4" ino=450 res=1 02:27:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xfffff000, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1457.650942][ T27] audit: type=1804 audit(1577500043.969:737): pid=26926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir084029388/syzkaller.9eiAV5/116/file0/file0" dev="loop4" ino=450 res=1 [ 1457.794212][ T27] audit: type=1804 audit(1577500044.319:738): pid=26948 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/795/file0/file0" dev="sda1" ino=17654 res=1 02:27:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1e0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1457.971638][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1457.978740][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:27:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xe, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1c0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x60, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x300002, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0xf}]]}}}]}, 0x3c}}, 0x0) [ 1458.790059][T27004] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 1458.862763][T26984] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) 02:27:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xf0ffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:26 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nunlb0@', 0x105400, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000080)={0x8, 0x6, 0x1f, "5b3dce61647ac551b3dd5272f8c94b5d5d958f39a55bca096e42e187bdc78624080f0ad320989bd86ba062e1da880d098d57e08de74f28cd1375f410", 0x22, "6721b97a640d3bf789dfa5bda43ff46f3eec618868d508234da60135e7886f4a56b5f0e3dddc5a9e6c2aa5484873ccea1139c8c4979e4f33e7898fad", 0x50}) io_setup(0x2, &(0x7f00000002c0)=0x0) io_submit(r2, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x40000031, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) [ 1458.937895][T26984] FAT-fs (loop3): Filesystem has been set read-only 02:27:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xffffffba, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1458.986377][T26984] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:27:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xb) r3 = socket(0x10, 0x80002, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x4, 0x302) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r5, 0x80045400, &(0x7f0000000100)) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="4c7400000024000b0500000000f4ff00edffffff008757715bfbb3a362db1d1175ca263dca0c9c55f2f09668e1a5117bcf82cd671117acd319cf9a7fa7148222ba90776b38bd54dc6936e24459a569bea4825988a564678d75e62aaeafaf50bda7a9529c11ab4c230ceb86e0273909348f0fa8220c5e3f54610fed1c52ffe1dabe005d51a3c29f30b3ce6d86fba8ff96db49082c005ce43724b31a74813f205e601207ff611dabd9ccc8c31568b4561f462ad47d48a5933c59d51e8d0e62db600e61f1f71004e4898e0b6533fd12b3a6cb3748d4919937383124", @ANYRES32=r6, @ANYBLOB="00000014f1ffffffffffffff0800010073667100480002005bb9c26146fcd2cc9b0000000010000000030000000033cc3598c9aa8178bdf1000000000000000000000000de7f4687000000000000000000000001009900007c24f1583940ea0e363002e94564838f54825863fe646c248656cb5d845549c5ceffcfeaab4260fca524afef20c00352bd32262c964c61f3771603fd386dc70a77e574632bd950e808d63007d6c6251ac28f6b621f863af06767ef3b8444b64c875270810633e2eb7d7a89d0f3cf2074bb2e180708593cd728026dfe7b7bc2cbc705ed95221583ea22eefa47c53252758e28ba4952ba2e86aff40a0cb6088e18f3326fa3a5dcd32cb951da688b87961591b4671e40cf3708000000000000000000321e6e4daef23cf875a45a0643142ac688f2a10d2a194d7079ce17e9cbda5da7ecf526f1406f379e40200000b3c3c00b016f9021957cb27486eea0345bdf43b770452e1353b948841660b1357707dacc631c885e515d18f9e1697a8604cd27f232de35373ad44e60efd73e28c85ce90800002d82680000000000000000ced0894824e83ff51cae120aae6ad04471171f99ab966cf04f91d117ebb94cdeb5697899e4005dae1be3c6299feb0c80ed6d93136f2d1fcc20fd1d0200000000ea195e2c9c2d253637f48f97061896b83a1aaafb7db5e4ba05edd7dfcfd44b0000170fda5ea11e015a17d10000002340a3888bbe076b2a5c9d0241a4e752aab3caf088ad0c9bf849225f8153039f563d154c85c5a3772f01efec840ae3e53085f2877adfe737c01f7c24fc50107c19e35e578b9b608e6a7265eaf5af9387a4a7fe7a190641217ff82eac668d005362f571dae348d770376a67cf141bc81cad1151de8d49745fc360e7a89510253668f3211e9c2e1e59840deae9fa409800499711205f910bce24aad30c604ec6c271f9b48184efdfda2e30bb953dd28b31e5720c8cf0b139ae14f814860f0fd204b8348bdb571f7f66ce3d5a4151f2266d0c695f59b93b948b226a1e1fab37b93197b2c736348e2078212d87b8f0469ea30f3ff63dccb61a517929d7508da6fb66e4cba5ac1e403f8c7de7a29814851423eccff5869eedb6bbe8a0efd47f76b32c30c86e72a5767071559bd357234033e8b949ec15ea42f862f94292d24ef01ad1a174e38c9a22a8cae141a49612875becc9fae30d8bfce0aaeb1c8f0e799c5aa343119cd87f8c6ffd413bada16d2751d2efe486de52812a066f75843bcdc036f85ac93489b92009f240fe5befa04d51375dc2000d253102c618a62831f819a575bacd3ed83066d2c0734273883252de1bfbed06cc705c1729d6ccd9a469c693000000009bf6370fae55a4960513d8eed7978ea6c18b64e50c90b521f5835b6a149a49d75576bcd4b7853a09381184548f3367791d800212df731847582713c9d7f9541b32a840f9989d46ed3905e0f059dc628437bafa4f8ce7b91b0d22850e447196e6457b528e7b2c56f0bc7c60f1122b74601cfd90685c612e"], 0x74}}, 0x0) sendmmsg$alg(r3, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xf, &(0x7f0000000100)}], 0x492492492492642, 0x0) 02:27:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1e0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xf0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1e0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e6", 0x1e0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xfffffff2, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x1000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x543, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1460.636566][T27045] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1460.645608][T27045] FAT-fs (loop3): Filesystem has been set read-only [ 1460.674933][T27045] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 1460.705180][T27041] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1460.721796][T27041] FAT-fs (loop0): Filesystem has been set read-only [ 1460.791446][T27041] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 02:27:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1", 0x1f0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2020, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0xe0ffffff, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000280)={{0xa, 0x4e24, 0x7ff, @local, 0x7fff}, {0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast1}, 0x5}, 0x101, [0x36, 0x9, 0x6, 0x4, 0x3ff, 0xfffffffd, 0xc6, 0x7]}, 0x5c) 02:27:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xfffffffe, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) close(r0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) socket$kcm(0x29, 0x5, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x9d40a785a43830c3, 0x50, r0, 0x8000000) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) 02:27:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xa00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1461.304372][ T27] kauditd_printk_skb: 18 callbacks suppressed [ 1461.304470][ T27] audit: type=1800 audit(1577500048.449:757): pid=27070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=468 res=0 02:27:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1461.491708][ C0] net_ratelimit: 18 callbacks suppressed [ 1461.497456][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1461.503664][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1461.516173][ T27] audit: type=1804 audit(1577500048.499:758): pid=27070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/800/file0/file0" dev="loop3" ino=468 res=1 [ 1461.618375][T27070] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1461.667469][T27070] FAT-fs (loop3): Filesystem has been set read-only 02:27:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xd00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1461.744147][T27070] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 1461.752350][ T27] audit: type=1804 audit(1577500048.519:759): pid=27070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/800/file0/file0" dev="loop3" ino=468 res=1 [ 1461.812015][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1461.818315][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:27:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1f0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:29 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='\b\x8a\x0f\xfd\xf5\xffv\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "5b204aec4b7de780"}, 0x28) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) fcntl$dupfd(r2, 0x406, r0) [ 1462.131644][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1462.137871][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1462.211283][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1462.217083][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1462.240926][ T27] audit: type=1800 audit(1577500049.379:760): pid=27090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=469 res=0 02:27:29 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)={0x20, 0x0, 0x2, 0x319, 0x0, 0x0, {}, [@nested={0x4, 0x2}, @typed={0x8, 0x3, @fd}]}, 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0xc) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) [ 1462.389786][ T27] audit: type=1804 audit(1577500049.429:761): pid=27090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/801/file0/file0" dev="loop3" ino=469 res=1 [ 1462.415313][ T27] audit: type=1804 audit(1577500049.449:762): pid=27090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/801/file0/file0" dev="loop3" ino=469 res=1 02:27:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) pipe(&(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)="b9", 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x100000, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000200)='./bus\x00', 0x0) r2 = getegid() r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0x0, 0x800000003, 0x6a) bind(r4, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r4, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r6 = socket(0x11, 0x800000003, 0x81) r7 = socket(0x9, 0x3, 0x9) bind(r7, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000007540)=ANY=[@ANYBLOB="0000000000000000000101010000fb5700"/32], 0xfdef) fcntl$getown(r3, 0x9) getgid() getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r9) r10 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) writev(r10, &(0x7f0000000000)=[{&(0x7f0000000100)}, {&(0x7f0000000040)="53006000c659ca807737f40000002bc05500", 0x12}], 0x2) r11 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) r13 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfffffffffffffffe, 0x45) writev(r13, &(0x7f0000000000)=[{0x0}, {&(0x7f00000004c0)="53006000c659740077e42100004bc095c89af04bbe5d9aa5bc7e4b312578fe1a85978ac42120ab28391c9f7c15701a10933b8fcb12f8aa4cb1f08bc257fa0a738edb4e46c361eaf8f06bdcd1096c8c82aad40894d783fa4d6a9596f2b5930df3c6823d603a2f3523d2e2a273f53723c29318790691438928f8f9e6188577e472e0123f0284b2a30b2626c0567ec49e54451542f4643320ef0b9cabd6ebd47fcd472f39431a59373d015f03c819c46f29bd05d71d4358759a07d0839c1b2198ce496b9a9563", 0xc5}], 0x2) r14 = accept4$rose(0xffffffffffffffff, &(0x7f00000005c0)=@short={0xb, @dev, @default, 0x1, @bcast}, 0x0, 0x800) r15 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) writev(r15, &(0x7f0000000000)=[{&(0x7f0000000040)="53006000c659ca807737f40000002bc05500", 0x12}], 0x1) r16 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r16, 0x4, 0x42000) sendmsg$unix(r7, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)="e0132a18608f5db7e76a5f5f1874b72028532d4524c57452a95f96f390317ac646fc7cf23b0b004c458e5a9f82bcf2a9520210164cce3c37882892964bd9dbd6919ec36079acc94eee56325ca73a3cc0e8673e3a249d24aed453b494272dd1fd06dabc1ea38276fe14d82e20eb991bfa476c03fb269c813284e0e3ec9502489ffa18004fbaf2a10a0e6e5661ca1b8c8391ec6e953e99c7239bcefe40b667970009d7c08177b5091fcca3f46a2387d506b19785cbbb83fae50351fbe005e7f0d138ebcd5d3dc7c3fce52a0759384dcf3c6c61ce71e0a1cd58189a9d77bafc44e3c9c8156d9e5a3969ec0796cef8ab7415a4", 0xf1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r10, @ANYRES32=r11, @ANYRES32=r6, @ANYRES32=r16, @ANYBLOB="18010098d9007bf980504b0001000000", @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r13, @ANYRES32, @ANYRES32, @ANYRES32=r14, @ANYRES32=r6, @ANYRES32=r5, @ANYRES32, @ANYRES32], 0x90, 0x1}, 0x40) r17 = getgid() setresgid(0x0, r17, 0x0) fchown(r0, 0x0, r2) syz_open_dev$vcsn(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f00000019c0)=[0x0, 0x0]) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x8}, 0x0, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000005, 0x10, 0xffffffffffffffff, 0x0) utimes(&(0x7f0000000040)='./bus\x00', 0x0) r18 = socket$inet6(0xa, 0x400000000001, 0x0) r19 = dup(r18) setsockopt$inet6_tcp_int(r19, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r18, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r18, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) setsockopt$inet6_int(r18, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) setsockopt$inet6_opts(r18, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) r20 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r20, 0x7fff) sendfile(r19, r20, 0x0, 0x8040fffffffd) 02:27:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xffffffff, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x4000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1462.621324][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1462.627108][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1462.652608][T27107] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1462.727097][T27090] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1462.797608][T27090] FAT-fs (loop3): Filesystem has been set read-only [ 1462.846075][T27090] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 1462.970802][T27117] sg_write: process 33 (syz-executor.0) changed security contexts after opening file descriptor, this is not allowed. 02:27:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1", 0x1f0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xe00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1463.315325][ T27] audit: type=1800 audit(1577500050.459:763): pid=27124 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=470 res=0 02:27:30 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000700)='ntfs\x00', &(0x7f0000000740)='./bus\x00', 0x16a, 0x6, &(0x7f0000001c80)=[{&(0x7f00000008c0)}, {&(0x7f0000000980)="8f0b1d50431de104f1ff681ec18d52532896031a86cb180a97b06ead15dd26d1298ead42dd973a01483b3c4610fc990d3ded75448e48665b1a0d40e798eaa89623e71fca3cf9b13afa6101d18d2319bf164e9733ab45b7115457ac1be75176a932f62fabec2f7abcdf73b09717a311b5cc180e9266a927b1400001f2bfd88a834b17a788e32239c743ffc27fc250d46e4c76088743d014e182b6f1d79154ede81a63dae07663f29344556a79afc33b6e48ab0892", 0xb4, 0xffffffff}, {&(0x7f0000000a80)="ace62adcf9b58299a666ccde81e11c1f7c70747e301c31fd03ec62ffd16c1f50a422a272", 0x24, 0x4}, {&(0x7f0000000ac0), 0x0, 0x1d2}, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x8}], 0x4, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40000, 0x0) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000180)={'broute\x00'}, &(0x7f00000002c0)=0x78) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000ac0)={{0x108, 0x0, 0x8, 0x2f5, 0x17a, 0x5, 0x2c1, 0x8}, "88b9f3bfcb7305c8de57eba33ea661834287faabed85d1cfa6b80aaa1b14e9b733f8b5c6ca0308fb9cddfa6f9fe290818524f2fd53c2b30b184d2b85fe192fee89deb6d94832034ff9c1fb6a53e00ee5fdc7be61214d1100b26ef13dd4fd3df055547e0e964bdf58ff20bcb7e90c5aa57597decaa2c5d373b65fd27166c8106116bfc5d81362ad50cd8d", [[], [], [], []]}, 0x4aa) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/d\x80v/loBon}rol\x00', 0x2c4001, 0x0) set_thread_area(&(0x7f0000000240)={0x8000, 0x20000800, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x63, "270cf4a80257442fef0134db7c7794e548b4cf5ad0961d0738c9ca1939ff0fabbc756cad6b5686a86cd36a9296ecda69255536a7ed96b45066b53e18862f70e0a16a66e26d30a31e4db5dd2132199365f9b3bcac49c87bc13543451e13c357b5f70999"}, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000300)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socket(0x100000000011, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x28804) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0xc, &(0x7f0000000440)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x44b}, @map={0x18, 0xc}, @call={0x85, 0x0, 0x0, 0x27}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81}, @ldst={0x0, 0x0, 0x0, 0x0, 0x5}, @generic={0x0, 0x0, 0x8, 0x0, 0x4}, @alu={0x0, 0x1, 0x8, 0x0, 0x9f11a71dc752fb7f, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @generic={0x2, 0x5, 0x7, 0x0, 0xd7}], 0x0, 0xb3, 0x62, &(0x7f0000000500)=""/98, 0x41100, 0x0, [], 0x0, 0x36, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x3, 0x0, 0x0, 0x5}, 0x10}, 0x70) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) restart_syscall() [ 1463.471441][T27124] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1463.481945][T27124] FAT-fs (loop3): Filesystem has been set read-only [ 1463.490845][T27124] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:27:30 executing program 4: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_dev$cec(&(0x7f0000000440)='/dev/cec#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r5}}) r6 = socket$pppoe(0x18, 0x1, 0x0) pipe(&(0x7f0000000100)) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r7, 0x6, 0x16, &(0x7f0000000300), 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) connect$pppoe(r6, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_UNISCRNMAP(r8, 0x4b69, &(0x7f0000000040)=""/64) ioctl$PPPIOCGCHAN(r6, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x42000) r10 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r10, 0x4, 0x42000) sendfile(r9, r10, &(0x7f0000000140)=0x5, 0x1) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r11, 0x6, 0x16, &(0x7f0000000300), 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r11, 0x4010aeab, &(0x7f00000000c0)={0x3, 0x4000}) [ 1463.517097][ T27] audit: type=1804 audit(1577500050.489:764): pid=27124 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/802/file0/file0" dev="loop3" ino=470 res=1 02:27:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1f8) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1463.722550][ T27] audit: type=1804 audit(1577500050.499:765): pid=27124 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/802/file0/file0" dev="loop3" ino=470 res=1 [ 1463.862441][ T27] audit: type=1800 audit(1577500051.009:766): pid=27146 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=471 res=0 02:27:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x5430000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1463.970382][T27146] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1463.979445][T27146] FAT-fs (loop3): Filesystem has been set read-only [ 1463.989081][T27146] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:27:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef874505a3", 0x0, 0x400}, 0x28) 02:27:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1f8) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1f0) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x4305, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept$alg(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x269, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x2, @multicast2}, 0x3, 0x0, 0x0, 0x3}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x2000, 0x800000000000000a, 0x0, 0xa0}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x2b}, 0x2, @in6=@loopback, 0x0, 0x4}}, 0x30) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 02:27:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='\x01\x00\xc8\x00\b') pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000300)={&(0x7f0000000040), 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x68, r1, 0x71c, 0x70bd2c, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x44, @link='syz1\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8040}, 0x44100) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x162, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="e9ff0000d7083ab2b6b7ac0c1dee397d5374aed50500097db275b20ebf3c8e900c1b9bd78048363053818946ed9c2bb9aea6decf28210ee121d2fb6c0700000000000000bb2ea0004a971d4e86104de5ef75e46a7d1634d157cf1ab12c37116db2025d352850374f575e3a2d3a9added8835bb7a98a65aa3181b4dac0445bc57bcde01a9051b86e117fa16430ac9a0e87b6aacf806e8e4d32ba8a383abee14c9d0596c25d04bd7cbdc71a5f8341fd81b9bc708abca362e3e9b3713cc1a912fc5458d65b41608b18d3475f459e2828825c93c5b7fa5b41e13b38e83dc34ad6c00"/239, @ANYRES16=r1, @ANYBLOB="d3d600000000000000000100000000000000014100000000001700000000000000003a000000"], 0x3c}, 0x1, 0x0, 0x0, 0xc054}, 0x0) [ 1464.846222][T27176] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1464.856344][T27176] FAT-fs (loop0): Filesystem has been set read-only [ 1464.865102][T27176] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 02:27:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1f8) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x2}, 0x28) 02:27:32 executing program 0: write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='\x00\x00\x00\x00\xa7\x00', 0x9) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x2, &(0x7f00000000c0)=ANY=[@ANYRESOCT, @ANYBLOB="7ae308f68d505440ba00d53b4864e2d5b62cd2e731eed4b6ecefa0c30dcff868ed0276b23b96a46c766ce8f68241f788682d001c3608054cd711f6d4ea5560c0eb1a7c33c4c1fcd3961c827bd8a449a0ebcad48e3c03a26fb3f7d2fbc18624592ba12864bcdc8fdb976f3e424e599369b5efe2e5f67f43"], 0x0, 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000300)={r3, 0x2}) 02:27:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x8000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1465.373310][T27192] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1465.383290][T27192] FAT-fs (loop3): Filesystem has been set read-only [ 1465.397609][T27192] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:27:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fc) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x6000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x3}, 0x28) 02:27:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x8100, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:33 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) syz_open_dev$char_usb(0xc, 0xb4, 0x1ff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) connect$inet(r2, &(0x7f0000000180), 0x10) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) shutdown(r3, 0x1) 02:27:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x4}, 0x28) [ 1465.994046][T27212] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1466.103611][T27212] FAT-fs (loop3): Filesystem has been set read-only [ 1466.140874][T27212] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:27:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fc) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xa000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x200, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\x00;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddpr\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(0xffffffffffffffff) recvmsg$kcm(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0, 0x19, 0x2, {0x4, {0xa, 0x2, 0x5}, 0x100, 0x0, r4, 0x7, 0x6, 0x2, 0x7, 0x1, 0x1, 0x27cbecb8, 0x0, 0x200, 0x200, 0x9, 0xfff, 0x1, 0xffffffffffffffe1, 0x9}}, 0xa0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) syz_genetlink_get_family_id$tipc2(0x0) r7 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r1, r7}) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000001c0)=[{0x50, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) r9 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) setsockopt$inet_sctp6_SCTP_CONTEXT(r9, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={0x0, 0x2}, &(0x7f00000002c0)=0x8) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 02:27:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x5}, 0x28) [ 1466.467781][ T27] kauditd_printk_skb: 20 callbacks suppressed [ 1466.467802][ T27] audit: type=1800 audit(1577500053.609:781): pid=27241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=475 res=0 [ 1466.531418][ T27] audit: type=1804 audit(1577500053.649:782): pid=27241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/807/file0/file0" dev="loop3" ino=475 res=1 [ 1466.563566][ T27] audit: type=1804 audit(1577500053.699:783): pid=27247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/807/file0/file0" dev="loop3" ino=475 res=1 [ 1466.664920][T27241] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1466.673987][T27241] FAT-fs (loop3): Filesystem has been set read-only [ 1466.683228][T27241] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 1466.771290][ C1] net_ratelimit: 26 callbacks suppressed [ 1466.771303][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1466.782778][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1467.011800][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1467.018362][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1467.091372][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1467.097200][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:27:35 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) waitid(0x2, r0, &(0x7f0000000080), 0x60000000, &(0x7f0000000100)) r1 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x17, 0x80000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2080140}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x74, r2, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff0000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000110}, 0x20044860) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x250080, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r4, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x4000051) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000500)={0x2, [0x0, 0x0]}) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-monitor\x00', 0x50100, 0x0) accept4$tipc(r5, &(0x7f0000000580), &(0x7f00000005c0)=0x10, 0x800) r6 = syz_open_dev$vcsu(&(0x7f0000000600)='/dev/vcsu#\x00', 0x2, 0x80) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r6, 0x800455d1, &(0x7f0000000640)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000700)={0xa30000, 0x265, 0x6, r5, 0x0, &(0x7f00000006c0)={0x990966, 0x90, [], @p_u16=&(0x7f0000000680)=0xe5c6}}) ioctl$USBDEVFS_FREE_STREAMS(r7, 0x8008551d, &(0x7f0000000740)={0x98f2, 0x2, [{0x1}, {0xe, 0x1}]}) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000780)='/dev/bsg\x00', 0x400000, 0x0) ioctl$BLKBSZGET(r8, 0x80081270, &(0x7f00000007c0)) r9 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer2\x00', 0xd99b426d6a4a934d, 0x0) getsockopt$inet_mreqsrc(r9, 0x0, 0x26, &(0x7f0000000840)={@rand_addr, @dev, @initdev}, &(0x7f0000000880)=0xc) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/rtc0\x00', 0x212102, 0x0) ioctl$RTC_AIE_OFF(r10, 0x7002) clone3(&(0x7f0000000b40)={0x800, &(0x7f00000009c0), &(0x7f0000000a00)=0x0, &(0x7f0000000a40), {0x9}, &(0x7f0000000a80)=""/13, 0xd, &(0x7f0000000ac0)=""/27, &(0x7f0000000b00)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff], 0x5}, 0x50) perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x1, 0xf0, 0x6, 0x9, 0x0, 0x101, 0xc60aec5681c3057c, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x4000, 0x5, 0x7, 0x0, 0x3, 0x2400000}, r11, 0xe, r9, 0x1) pipe(&(0x7f0000000bc0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_DSP_STEREO(r12, 0xc0045003, &(0x7f0000000c00)=0x1) r13 = socket$vsock_stream(0x28, 0x1, 0x0) fgetxattr(r13, &(0x7f0000000c40)=@random={'system.', '\x00'}, &(0x7f0000000c80)=""/4096, 0x1000) ioctl$DRM_IOCTL_GET_CAP(r9, 0xc010640c, &(0x7f0000001c80)={0x8, 0x6}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r1, 0xc0884123, &(0x7f0000001cc0)={0x6, "4be4e040056275018ee28aea452b537ae94c26c047d3083f122d8b743cdec52ff005900c94c18a724ef6aaae65026c132df9366fb94cf3b8edd1cce9009245ed", {0xc347, 0xb5}}) r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000006500)='projid_map\x00') setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r14, 0x110, 0x3) 02:27:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x6}, 0x28) 02:27:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xf000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed183", 0x1fc) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fc) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xd000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1468.451317][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1468.457164][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1468.502941][ T27] audit: type=1800 audit(1577500055.649:784): pid=27268 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=476 res=0 [ 1468.572360][ T27] audit: type=1804 audit(1577500055.679:785): pid=27268 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/808/file0/file0" dev="loop3" ino=476 res=1 02:27:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x7}, 0x28) [ 1468.673996][T27268] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1468.682809][T27268] FAT-fs (loop3): Filesystem has been set read-only [ 1468.691056][T27268] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 1468.699612][ T27] audit: type=1804 audit(1577500055.689:786): pid=27268 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/808/file0/file0" dev="loop3" ino=476 res=1 02:27:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x800000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d6", 0x1fe) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1468.800219][ T27] audit: type=1800 audit(1577500055.749:787): pid=27278 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16526 res=0 [ 1468.851796][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1468.857710][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1468.872323][ T27] audit: type=1804 audit(1577500055.829:788): pid=27278 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir084029388/syzkaller.9eiAV5/127/file0/file0" dev="sda1" ino=16526 res=1 [ 1468.957470][ T27] audit: type=1804 audit(1577500055.859:789): pid=27278 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir084029388/syzkaller.9eiAV5/127/file0/file0" dev="sda1" ino=16526 res=1 02:27:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$addseals(r2, 0x409, 0x8) recvfrom$inet(r0, &(0x7f0000000040)=""/11, 0xb, 0x1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) fsetxattr$system_posix_acl(r2, &(0x7f00000004c0)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [], {}, [], {0x8}}, 0x24, 0x0) dup3(r1, r2, 0x0) 02:27:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x8}, 0x28) [ 1469.254186][ T27] audit: type=1800 audit(1577500056.399:790): pid=27297 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16674 res=0 02:27:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x80ffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x9}, 0x28) 02:27:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fe) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xe000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:39 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffa}, 0x0, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x600000, 0x0) ioctl$SNDRV_PCM_IOCTL_UNLINK(r3, 0x4161, 0x0) tkill(r2, 0x3b) rt_sigtimedwait(&(0x7f00004f3ff8)={0xffffffffffffffff}, &(0x7f0000a37000), 0x0, 0x8) 02:27:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x810000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:40 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000300), 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x60000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x70d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_MODE={0x8, 0x1, 0x5}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x10aec61bc6caa7b3}}, 0x20}}, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000240)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x0, 0x2221}}, 0x20}}, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x16, &(0x7f0000000300), 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r9, 0x10, &(0x7f0000000400)={&(0x7f0000000380)=""/99, 0x63, 0xffffffffffffffff}}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r11, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x17, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x75b, 0x0, 0x0, 0x0, 0xa944}, [@ldst={0x1, 0x0, 0x0, 0x2, 0xa, 0x41, 0xfffffffffffffffc}, @ldst={0x0, 0x1, 0x0, 0x17, 0xa, 0x18, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x953e, 0x68, &(0x7f0000000240)=""/104, 0x41000, 0x10, [], r7, 0xe, r8, 0x8, &(0x7f0000000300)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0xe, 0x7, 0x2}, 0x10, r10, r11}, 0x78) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000140)={0xb, @raw_data="11239cb43b8b1f7b569117f31b74b0afcf706c8a9768a961fa28c81dd1db7e4aaa77643e65a1fe5ea63835fc56f92d620bd98c98c3212bb861bcd9d549096c2aea9b5c9f2f01ff62fba88e1d6e3c327f9b94ae25c81147a0ea929f8d977c3d79795002a31690fbc28db26751dd526ba1f231eef4cde1a761386df2cab84b54f0d4345f7401bf5e9b2e52e8020d2197e29c73e4f24a5d235f6e8deedacc7a7629c35bedc37f27b0f96a6b70d097f6bd42359e4f92baaa9e38c6ad3c90a03057e4e33345221a73433f"}) ioctl$int_in(r0, 0x40000000af01, 0x0) r12 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) close(r12) socket$can_raw(0x1d, 0x3, 0x1) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r12}) [ 1472.836863][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 1472.836950][ T27] audit: type=1800 audit(1577500059.979:793): pid=27323 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=477 res=0 02:27:40 executing program 4: socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x10, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) sendto$llc(r1, &(0x7f0000000180)="b433e0727a822d50e23a498b80528d16ed8629e4be6c", 0x16, 0x800, &(0x7f00000001c0)={0x1a, 0x323, 0x18, 0x3f, 0xde, 0x80, @dev={[], 0x16}}, 0x10) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="1db6057be0c24f9df50cd9fbc2c63fa4"], 0x10) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r2, 0x0, 0x7fffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x1305) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) sendfile(r2, r2, 0x0, 0x8800000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000380)=ANY=[@ANYBLOB="2400001800210000000000003e9115170000001c140000f40000014000000008000900000000005787358eb33c06cd81c5751962a020ac447416730fa824f768d54ae7e6de676d157e66403ee39d0361bfe1aba75d6d1412501119baef1c4428d94a254c00"], 0x1}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x204}, 0x3c) socket$kcm(0x29, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, 0x10) [ 1472.988914][ T27] audit: type=1804 audit(1577500060.029:794): pid=27323 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/810/file0/file0" dev="loop3" ino=477 res=1 [ 1473.011694][ C1] net_ratelimit: 4 callbacks suppressed [ 1473.011840][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1473.026330][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:27:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0xa}, 0x28) [ 1473.251280][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1473.257076][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1473.301216][ T27] audit: type=1804 audit(1577500060.059:795): pid=27323 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/810/file0/file0" dev="loop3" ino=477 res=1 [ 1473.332105][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1473.338436][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1473.345478][T27323] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1473.364317][T27323] FAT-fs (loop3): Filesystem has been set read-only [ 1473.380851][T27323] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:27:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x60000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0xb}, 0x28) 02:27:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d6", 0x1fe) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x81ffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0xc}, 0x28) [ 1473.906743][ T27] audit: type=1800 audit(1577500061.049:796): pid=27353 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=478 res=0 [ 1473.971294][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1473.977192][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:27:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xf0ffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1473.998905][ T27] audit: type=1804 audit(1577500061.089:797): pid=27358 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/811/file0/file0" dev="loop3" ino=478 res=1 [ 1474.041885][ T27] audit: type=1804 audit(1577500061.189:798): pid=27358 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/811/file0/file0" dev="loop3" ino=478 res=1 02:27:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0xd}, 0x28) [ 1474.156001][T27353] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1474.164856][T27353] FAT-fs (loop3): Filesystem has been set read-only [ 1474.174475][T27353] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:27:41 executing program 4: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000300), 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) sendmsg$can_bcm(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="e56dcf5300010000ffffffff00000000", @ANYRES64=r2, @ANYRES64=r3/1000+10000, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="e4ff0000000000000000ff7f0000b12e3f33b1d7cafff56312b98e1fd51f30800fa4177ec0c00e4a9b21dbfc435da4eed14100a74be593da672df5f0b9311c74f7d4ea87f3167796947f721f81edec563a7b32320ea90f36134b19494fcac4f7fb75f2"], 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x20000044) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) accept4$tipc(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x10, 0x800) geteuid() r4 = getegid() fstat(0xffffffffffffffff, &(0x7f0000000d00)) getuid() getresgid(&(0x7f0000000000), &(0x7f0000000200), &(0x7f0000001680)) fstat(r0, 0x0) gettid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000f40)="62d9b9d62ee09936fce881b2550fdc2981e99c581a741e243d7b763d190c717200238d3de1a1ed4149f4604efd5c917eb4f32db14eb5cfdd73c37282c004d5b3ed9942ee14657bdf6224d8eb6b9958612d3cf0a4c4e3f10922e8c6de354421403c2d01b2b7e6fa53ffa7210c8d0b5bcaa7f376d26f49fcef2357b4d7be156eafb98ffd", 0x83}, {0x0}], 0x2, &(0x7f00000010c0), 0x0, 0x40044}, {0x0, 0x0, 0x0}], 0x3, 0x20000000) getgroups(0x3, &(0x7f00000000c0)=[0x0, 0xffffffffffffffff, 0x0]) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r7 = accept(0xffffffffffffffff, &(0x7f0000000300)=@vsock, &(0x7f0000000380)=0x80) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x125) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000140)={0x9c, 0x1000, 0x0, 0x39, 0x1f, 0x96}) ftruncate(r8, 0x200004) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) sendfile(r5, r8, 0x0, 0x80001d00c0d0) 02:27:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1474.291297][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1474.297093][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1474.550714][ T27] audit: type=1800 audit(1577500061.689:799): pid=27383 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=479 res=0 [ 1474.593682][ T27] audit: type=1804 audit(1577500061.719:800): pid=27383 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/812/file0/file0" dev="loop3" ino=479 res=1 [ 1474.672137][T27383] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1474.681109][ T27] audit: type=1804 audit(1577500061.719:801): pid=27383 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/812/file0/file0" dev="loop3" ino=479 res=1 [ 1474.706682][T27383] FAT-fs (loop3): Filesystem has been set read-only [ 1474.715351][T27383] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 1479.095863][T27392] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1479.110805][T27392] device bond1 entered promiscuous mode [ 1479.116668][T27392] 8021q: adding VLAN 0 to HW filter on device bond1 02:27:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0xd}, 0x28) 02:27:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x81000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x1000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0xe}, 0x28) 02:27:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x200000000000000, 0x100000000001}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = memfd_create(&(0x7f0000001fc1)='#vmnet1nodevem1\x00', 0x0) write(r0, &(0x7f0000000040)='/', 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r3 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(0xffffffffffffffff, 0x0, 0x8000011000, 0x400000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r2, 0x8, 0x0, 0x8000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='fd=', @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES64=r4, @ANYRESDEC=r0], @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303031303030302c757365725f69643dbd95c104c73fb8270596caf93a15bc8d8f44bf8ff6d1c6d0da9246b0b65cdcf35081b8abc53788e82ac79557948504939101af79017db0f991a3f073abdd8b4289b9e0a09219c83dcdc7e6d1a6e28ad6e2f16c68f413c051d415ceb90064dd2377757776fc4ca9d542bcf6c883dbf396425d495ff41063bb6d8f986220fa7ebf3e228ac71fd851ab470cbb53b18f66927a550b38ddcb9d369773bddf81b2a2aefcfc58355d4f6a08684a451e39754d40afbcc0699bd7880d1b8e5bc66967fadf6a85477f8b8b55fac5ea7490755223769d6307518b9fae4b83ad565a0aabe55001b902260685ebc090966b7671b661d0323bbe1d22c9dd5582bcc83d", @ANYRES16=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="00ed"]) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @multicast1, @local}, 0xc) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x80f, 0x1) close(r6) splice(r5, 0x0, r6, 0x0, 0x80000001, 0x0) ioctl$PPPIOCSDEBUG(r5, 0x40047440, &(0x7f0000000080)=0xfffffffffffffffe) socket$inet(0x2, 0x3, 0x2) r7 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r7, 0x0, 0xca, &(0x7f0000000000), 0x10) r8 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r8, 0x0, 0xca, &(0x7f0000000000), 0x10) setsockopt$inet_int(r8, 0x0, 0x32, &(0x7f0000000040)=0xfffffffffffffffd, 0x8) pipe(&(0x7f00000003c0)) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r10, 0x407, 0x0) write(r10, &(0x7f0000000340), 0x41395527) getsockopt$packet_int(r3, 0x107, 0xe, &(0x7f0000000200), &(0x7f0000000140)=0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x10) sendfile(r0, r0, &(0x7f00000000c0), 0xffffffff) 02:27:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fe) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1480.510110][ T27] audit: type=1800 audit(1577500067.649:802): pid=27411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16523 res=0 [ 1480.531326][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1480.537212][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1480.573173][T27412] fuse: Bad value for 'fd' 02:27:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0xf}, 0x28) [ 1480.662124][ T27] audit: type=1804 audit(1577500067.729:803): pid=27411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/813/file0/file0" dev="sda1" ino=16523 res=1 [ 1480.688235][ T27] audit: type=1804 audit(1577500067.739:804): pid=27413 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/813/file0/file0" dev="sda1" ino=16523 res=1 02:27:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fe) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x10}, 0x28) [ 1480.851291][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1480.857092][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1480.931298][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1480.937097][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:27:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1481.037759][ T27] audit: type=1800 audit(1577500068.179:805): pid=27423 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=480 res=0 [ 1481.162397][ T27] audit: type=1804 audit(1577500068.209:806): pid=27423 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/814/file0/file0" dev="loop3" ino=480 res=1 02:27:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xbaffffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x11}, 0x28) [ 1481.316548][ T27] audit: type=1804 audit(1577500068.219:807): pid=27423 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/814/file0/file0" dev="loop3" ino=480 res=1 [ 1481.341767][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1481.341925][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1481.361824][T27423] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1481.461387][T27423] FAT-fs (loop3): Filesystem has been set read-only [ 1481.477916][T27423] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 1481.571313][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1481.577628][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:27:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x4000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @rand_addr="0000000000000000000000001d00"}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6a) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x3, @loopback, 0x6}, 0x1c) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) 02:27:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d6", 0x1fe) open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x12}, 0x28) 02:27:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xf2ffffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:54 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0xfffffff8}, 0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000580)={0x0, 0x5}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x9, 0x2}, 0xce) [ 1486.898959][ T27] audit: type=1800 audit(1577500074.039:808): pid=27449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=481 res=0 02:27:54 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r0, 0x0) stat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000280)='./file0/file0/../file0\x00', r0, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) stat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000280)='./file0/file0/../file0\x00', r2, r4) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x40, &(0x7f0000000140)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@aname={'aname', 0x3d, 'ppp12ppp0-em1md5sum@em1{lo'}}, {@uname={'uname', 0x3d, '\x00'}}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@euid_lt={'euid<', r2}}]}}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp1\x00', 0x20000, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r6, 0xc0045004, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r7, 0x0) stat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000280)='./file0/file0/../file0\x00', r7, r8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r9, 0x0) stat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000280)='./file0/file0/../file0\x00', r9, r10) lsetxattr$system_posix_acl(&(0x7f0000000200)='./file0/file0/../file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x6, r7}, {0x2, 0xa}, {0x2, 0x9}, {0x2, 0x5, r3}], {0x4, 0x1}, [{0x8, 0x4, r10}], {0x10, 0x2}, {0x20, 0x5}}, 0x4c, 0x2) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x298, 0x100, 0x100, 0x100, 0x0, 0x0, 0x200, 0x200, 0x200, 0x200, 0x200, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x1f, 0x0, 'snmp_trap\x00', 'syz1\x00'}}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'syzkaller1\x00', 'caif0\x00'}, 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) 02:27:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x13}, 0x28) [ 1486.988509][ T27] audit: type=1804 audit(1577500074.079:809): pid=27449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/815/file0/file0" dev="loop3" ino=481 res=1 [ 1487.091294][ C0] net_ratelimit: 2 callbacks suppressed [ 1487.091304][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1487.092013][T27449] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1487.096923][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1487.127235][ T27] audit: type=1804 audit(1577500074.089:810): pid=27449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/815/file0/file0" dev="loop3" ino=481 res=1 [ 1487.171303][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1487.177098][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:27:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x5430000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1487.205959][T27449] FAT-fs (loop3): Filesystem has been set read-only [ 1487.249146][T27449] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:27:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:27:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x14}, 0x28) [ 1487.571288][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1487.577085][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1487.588079][ T27] audit: type=1800 audit(1577500074.729:811): pid=27480 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=482 res=0 [ 1487.629203][ T27] audit: type=1804 audit(1577500074.759:812): pid=27480 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/816/file0/file0" dev="loop3" ino=482 res=1 02:27:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x8000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:27:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1487.688537][T27480] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1487.697408][T27480] FAT-fs (loop3): Filesystem has been set read-only [ 1487.706402][T27480] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:27:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x15}, 0x28) 02:27:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xfeffffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1487.891289][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1487.897098][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:27:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x4000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1488.078121][ T27] audit: type=1800 audit(1577500075.219:813): pid=27499 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=483 res=0 02:27:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x16}, 0x28) 02:27:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xa000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1488.273223][ T27] audit: type=1804 audit(1577500075.269:814): pid=27499 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/817/file0/file0" dev="loop3" ino=483 res=1 [ 1488.331314][T27499] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1488.340137][T27499] FAT-fs (loop3): Filesystem has been set read-only [ 1488.349654][T27499] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 1488.531590][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1488.537846][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:28:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x17}, 0x28) 02:28:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xffff8000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xd000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket(0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) prctl$PR_GET_NAME(0x10, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB, @ANYBLOB='\x00', @ANYRES32, @ANYRES32=0x0], 0x4, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)) socket(0x0, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000680)=@profile={'stack ', 'jfs\x00'}, 0xa) syz_mount_image$iso9660(&(0x7f0000000380)='iso9660\x00', 0x0, 0x0, 0x5, &(0x7f0000001700)=[{0x0}, {0x0, 0x0, 0x6}, {&(0x7f0000000640)="95a837132c2144c5a01c97", 0xb}, {0x0, 0x0, 0x482}, {&(0x7f0000000700)}], 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) 02:28:01 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r1, 0x4122, 0x0) sendmsg(r0, &(0x7f0000000040), 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) accept$alg(r3, 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000)=0x8, r3, &(0x7f00000000c0)=0xeb2, 0x9, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x3f1282, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r6, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1060000, 0xffffffffffffffff}}}, 0x90) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000001c0)=0x2e, r7, 0x0, 0x0, 0x1}}, 0x20) ioctl$PPPIOCGMRU(r4, 0x80047453, &(0x7f0000000180)) recvmmsg(r0, &(0x7f00000064c0), 0x400000000000254, 0x2, 0x0) [ 1494.461553][ T27] audit: type=1800 audit(1577500081.589:815): pid=27529 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=484 res=0 [ 1494.524900][ T27] audit: type=1804 audit(1577500081.649:816): pid=27529 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/818/file0/file0" dev="loop3" ino=484 res=1 02:28:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x18}, 0x28) 02:28:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xe000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1494.771724][ C0] net_ratelimit: 2 callbacks suppressed [ 1494.777442][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1494.783304][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:28:02 executing program 4: add_key(&(0x7f00000002c0)='trusted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1) msgget$private(0x0, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f00000000c0)='asymmetric\x00\xf3\xad\xe75\xf9\x03\x00AU\xa0\xe1\x94N\xd8\xdfLA\x1e0\x89dm\x10\xb4e\xa6\x91\v\x13', &(0x7f0000000200)=@secondary='builtin_and_secondary_trusted\x00') keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000040)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8', &(0x7f0000000180)=@chain={'key_or_keyring:', r4, ':chain\x00'}) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r4, 0xa3, 0x59}, &(0x7f0000000340)={'enc=', 'oaep', ' hash=', {'michael_mic\x00'}}, &(0x7f00000003c0)="b2817300a3567838bdc096ac163e71ae748fd31063df601295927ca768144cc6e9e189ee91bb4eece639fe301f7d5ec31f77722103926e85a976c7eb66d4a2c0ef6b200964efecd6eb69d35f2f1aedfe28278c975d03278a9bcdcd8f5dcfff2afa328647246056c612eb1cf0458022759e08d5d31126d1467f6aee6e61fcf22db7a8da82e5e20c973d528d5dc90ecccc27540f3e3c90f126dbd06f4e7b0398e8c1baef", &(0x7f0000000480)=""/89) r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r5, 0x10e, 0xa, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@getroute={0x14, 0x1a, 0x1, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3800f0ff24000705000000", @ANYRES32=r8, @ANYBLOB="00000000fffffffff6ffffff0b000100"], 0x3}}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r10, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r11 = accept$packet(r10, 0x0, &(0x7f0000000500)) getsockname$packet(r11, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) [ 1494.985315][ T27] audit: type=1800 audit(1577500082.129:817): pid=27554 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=485 res=0 02:28:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x19}, 0x28) 02:28:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x60000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1495.091078][ T27] audit: type=1804 audit(1577500082.129:818): pid=27554 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/819/file0/file0" dev="loop3" ino=485 res=1 [ 1495.091329][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1495.142676][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1495.158348][T18542] relay: one or more items not logged [item size (56) > sub-buffer size (9)] [ 1495.193118][T27554] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1495.210792][T27560] debugfs: Directory 'loop0' with parent 'block' already present! [ 1495.226654][T27554] FAT-fs (loop3): Filesystem has been set read-only [ 1495.278249][T27554] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:28:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xffff8100, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d634", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1495.411291][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1495.417243][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1495.491309][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1495.497166][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:28:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x1a}, 0x28) [ 1495.697837][ T27] audit: type=1800 audit(1577500082.839:819): pid=27576 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=486 res=0 [ 1495.726672][ T27] audit: type=1804 audit(1577500082.869:820): pid=27576 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/820/file0/file0" dev="loop3" ino=486 res=1 [ 1495.891796][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1495.898061][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1495.987235][T27576] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) 02:28:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x81000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x1b}, 0x28) [ 1496.028252][T27576] FAT-fs (loop3): Filesystem has been set read-only [ 1496.085284][T27576] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:28:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0xa68eeb94ade1ed92, r0) ioctl$USBDEVFS_GETDRIVER(r1, 0x41045508, &(0x7f0000000300)={0xffffaaf6, "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"}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000300), 0x0) getsockopt$llc_int(r2, 0x10c, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x79, 0x0, 0x0, &(0x7f0000000000)={[{@attr2='&:B\x83\x06'}]}) 02:28:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xfffff000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x1c}, 0x28) 02:28:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2004, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8610008}, 0x8, &(0x7f0000000100)={&(0x7f0000000180)={0x24, 0x0, 0x120, 0x70bd2a, 0x25dfdbfb, {{}, {}, {0xffffffffffffff5d, 0x11, 0x10001}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40005}, 0x15) setsockopt$rose(r1, 0x104, 0x5, &(0x7f0000000000), 0x4) 02:28:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xbaffffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1501.468918][T27616] xfs: Unknown parameter '&:Bƒ' [ 1501.538156][ T27] audit: type=1800 audit(1577500088.679:821): pid=27620 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16946 res=0 [ 1501.651683][ C0] net_ratelimit: 4 callbacks suppressed [ 1501.651704][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1501.659492][ T27] audit: type=1804 audit(1577500088.719:822): pid=27614 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/821/file0/file0" dev="sda1" ino=16946 res=1 [ 1501.663300][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1501.731290][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1501.737253][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:28:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7ff}}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[]}, 0x1, 0x2000000000000000}, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000080)={&(0x7f0000001340)=ANY=[@ANYBLOB="95a80153a3ac3ff9135d12cd38f12cfbe8533dc3cd43d67d36f30a126a391943aa2841db8a93d58d6e006a0900000000000000d8172af8b65d3259df02730742bcc2550e7e864bd46a45e39bae5c9da7ef55f6f630fa4d73"]}, 0x1, 0x2000000000000000}, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x40, 0x0) getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x10000, &(0x7f0000000340)=""/4096) r2 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='-\x93\xf5\x01\x00', 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) r5 = socket$tipc(0x1e, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000100)={r5}) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r6, &(0x7f0000000100), 0x5bd, 0x0) r7 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x48, r9, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x48}}, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r10, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x48, r11, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x48}}, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r12, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x48, r13, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x48}}, 0x0) r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r14, 0x117, 0x1, 0x0, 0x0) r15 = accept$alg(r14, 0x0, 0x0) recvmmsg(r15, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x269, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYRES64, @ANYRESHEX=r15, @ANYRES16=0x0, @ANYRESOCT=r9, @ANYRES64=r10, @ANYRESHEX=r13], &(0x7f000095dffc)=0x6) r16 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r16, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r16, 0x84, 0x6d, &(0x7f0000001900)=ANY=[@ANYRESHEX, @ANYRESHEX=r1], &(0x7f0000000000)=0x2) r17 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r17, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) connect$inet6(r17, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r17, &(0x7f0000000100), 0x5bd, 0x0) r18 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r18, 0x84, 0x6d, &(0x7f0000000640)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000000)=0x2) getsockopt$inet_sctp6_SCTP_MAXSEG(r17, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x7}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x7}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r19, &(0x7f0000000200)=0x4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x5}, 0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) 02:28:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x1d}, 0x28) 02:28:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xf2ffffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1502.038501][T27632] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 1502.115203][T27629] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 1502.131618][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1502.138008][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1502.142446][T27629] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 02:28:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x1e}, 0x28) [ 1502.162471][ T27] audit: type=1800 audit(1577500089.309:823): pid=27635 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=487 res=0 [ 1502.371598][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1502.377867][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1502.379422][ T27] audit: type=1804 audit(1577500089.349:824): pid=27635 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/822/file0/file0" dev="loop3" ino=487 res=1 02:28:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1502.447214][T27635] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1502.456114][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1502.456258][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1502.468428][T27635] FAT-fs (loop3): Filesystem has been set read-only [ 1502.478107][T27635] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:28:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x21}, 0x28) 02:28:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xffffffba, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1502.724123][ T27] audit: type=1800 audit(1577500089.869:825): pid=27654 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=488 res=0 [ 1502.767995][T27632] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 1502.837019][T27629] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 1502.872484][T27663] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 1502.898934][ T27] audit: type=1804 audit(1577500089.889:826): pid=27654 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/823/file0/file0" dev="loop3" ino=488 res=1 02:28:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x22}, 0x28) [ 1503.028745][T27654] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1503.078727][T27654] FAT-fs (loop3): Filesystem has been set read-only 02:28:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xfeffffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1503.137403][T27654] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:28:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7ff}}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[]}, 0x1, 0x2000000000000000}, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000080)={&(0x7f0000001340)=ANY=[@ANYBLOB="95a80153a3ac3ff9135d12cd38f12cfbe8533dc3cd43d67d36f30a126a391943aa2841db8a93d58d6e006a0900000000000000d8172af8b65d3259df02730742bcc2550e7e864bd46a45e39bae5c9da7ef55f6f630fa4d73"]}, 0x1, 0x2000000000000000}, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x40, 0x0) getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x10000, &(0x7f0000000340)=""/4096) r2 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='-\x93\xf5\x01\x00', 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) r5 = socket$tipc(0x1e, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000100)={r5}) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r6, &(0x7f0000000100), 0x5bd, 0x0) r7 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x48, r9, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x48}}, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r10, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x48, r11, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x48}}, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r12, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x48, r13, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x48}}, 0x0) r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r14, 0x117, 0x1, 0x0, 0x0) r15 = accept$alg(r14, 0x0, 0x0) recvmmsg(r15, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x269, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYRES64, @ANYRESHEX=r15, @ANYRES16=0x0, @ANYRESOCT=r9, @ANYRES64=r10, @ANYRESHEX=r13], &(0x7f000095dffc)=0x6) r16 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r16, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r16, 0x84, 0x6d, &(0x7f0000001900)=ANY=[@ANYRESHEX, @ANYRESHEX=r1], &(0x7f0000000000)=0x2) r17 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r17, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) connect$inet6(r17, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r17, &(0x7f0000000100), 0x5bd, 0x0) r18 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r18, 0x84, 0x6d, &(0x7f0000000640)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000000)=0x2) getsockopt$inet_sctp6_SCTP_MAXSEG(r17, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x7}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x7}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r19, &(0x7f0000000200)=0x4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x5}, 0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) 02:28:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d634", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xfffffff2, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x23}, 0x28) 02:28:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xffff8000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1507.775480][ T27] audit: type=1800 audit(1577500094.919:827): pid=27688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=489 res=0 [ 1507.875670][ T27] audit: type=1804 audit(1577500094.969:828): pid=27688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/824/file0/file0" dev="loop3" ino=489 res=1 [ 1507.930280][T27697] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 1507.957928][T27697] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 1507.971608][ C1] net_ratelimit: 2 callbacks suppressed [ 1507.977437][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1507.999011][T27697] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 02:28:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xffff8100, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x24}, 0x28) [ 1508.064639][T27688] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1508.092952][T27688] FAT-fs (loop3): Filesystem has been set read-only [ 1508.105676][T27688] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:28:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xfffffffe, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x25}, 0x28) [ 1508.371291][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1508.377140][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1508.441686][ T27] audit: type=1800 audit(1577500095.589:829): pid=27718 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=490 res=0 02:28:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xfffff000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1508.482524][ T27] audit: type=1804 audit(1577500095.629:830): pid=27718 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/825/file0/file0" dev="loop3" ino=490 res=1 [ 1508.611304][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1508.617126][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1508.691409][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1508.697299][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1508.704490][T27724] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1508.755525][T27724] FAT-fs (loop3): Filesystem has been set read-only [ 1508.778335][T27724] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 1515.992726][ T27] audit: type=1800 audit(1577500103.139:831): pid=27738 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=491 res=0 [ 1516.013778][ T27] audit: type=1804 audit(1577500103.139:832): pid=27738 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir467407070/syzkaller.jamsOF/19/file0/file0" dev="loop0" ino=491 res=1 [ 1516.309683][T27738] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1516.318525][T27738] FAT-fs (loop0): Filesystem has been set read-only [ 1516.326597][T27738] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 02:28:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d634", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xf2ffffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x26}, 0x28) 02:28:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xffffffba, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xffffffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1517.522910][ T27] audit: type=1800 audit(1577500104.669:833): pid=27752 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16769 res=0 [ 1517.549670][ T27] audit: type=1804 audit(1577500104.699:834): pid=27749 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/826/file0/file0" dev="sda1" ino=16769 res=1 02:28:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1517.651303][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1517.657083][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:28:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x27}, 0x28) 02:28:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x26}, 0x28) 02:28:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xfffffff2, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1517.832496][ T27] audit: type=1800 audit(1577500104.979:835): pid=27758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16593 res=0 [ 1517.900412][ T27] audit: type=1804 audit(1577500105.019:836): pid=27758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/827/file0" dev="sda1" ino=16593 res=1 [ 1517.971299][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1517.977081][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:28:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x28}, 0x28) [ 1518.263012][ T27] audit: type=1800 audit(1577500105.409:837): pid=27774 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=492 res=0 [ 1518.362501][ T27] audit: type=1804 audit(1577500105.409:838): pid=27774 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/828/file0/file0" dev="loop3" ino=492 res=1 [ 1518.497414][T27774] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1518.506158][T27774] FAT-fs (loop3): Filesystem has been set read-only [ 1518.514641][T27774] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:28:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xffffffba, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xd, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xfffffffe, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x29}, 0x28) 02:28:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1526.909270][ T27] audit: type=1800 audit(1577500114.049:839): pid=27807 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16987 res=0 [ 1527.005130][ T27] audit: type=1804 audit(1577500114.079:840): pid=27796 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/829/file0/file0" dev="sda1" ino=16987 res=1 02:28:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xe80, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x2a}, 0x28) 02:28:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1527.091298][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1527.097099][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:28:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xffffffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xfffffffe, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1527.331304][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1527.337140][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1527.383438][ T27] audit: type=1800 audit(1577500114.529:841): pid=27819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=493 res=0 [ 1527.421312][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1527.427108][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1527.601722][T27825] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1527.656080][T27825] FAT-fs (loop3): Filesystem has been set read-only [ 1527.658977][ T27] audit: type=1804 audit(1577500114.529:842): pid=27819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/830/file0/file0" dev="loop3" ino=493 res=1 02:28:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1527.725810][T27825] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 1528.057922][ T27] audit: type=1800 audit(1577500115.199:843): pid=27839 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=494 res=0 [ 1528.090279][ T27] audit: type=1804 audit(1577500115.199:844): pid=27839 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/831/file0/file0" dev="loop3" ino=494 res=1 [ 1528.134717][T27839] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1528.144707][T27839] FAT-fs (loop3): Filesystem has been set read-only [ 1528.157526][T27839] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 1535.255410][ T27] audit: type=1800 audit(1577500122.399:845): pid=27848 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=495 res=0 [ 1535.382640][ T27] audit: type=1804 audit(1577500122.529:846): pid=27848 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir467407070/syzkaller.jamsOF/21/file0/file0" dev="loop0" ino=495 res=1 [ 1535.668142][T27848] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1535.677273][T27848] FAT-fs (loop0): Filesystem has been set read-only [ 1535.685728][T27848] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 02:28:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x40, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x2b}, 0x28) 02:28:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xd, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:43 executing program 0: mkdir(&(0x7f00000003c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r0, 0x0) stat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000280)='./file0/file0/../file0\x00', r0, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) stat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000280)='./file0/file0/../file0\x00', r2, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) stat(0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000280)='./file0/file0/../file0\x00', r4, r5) mount$bpf(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x24000, &(0x7f0000000400)={[{@mode={'mode', 0x3d, 0x8}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x65, 0x38, 0x4ed77f977bdc496, 0x35, 0x62, 0x18, 0xb353bbd62e9d2a13], 0x2d, [0x36, 0x33, 0x39, 0x37], 0x2d, [0x38, 0x61, 0x61, 0x62], 0x2d, [0x65, 0x38, 0x62, 0x35], 0x2d, [0x62, 0x65, 0x62, 0x50, 0x36, 0x36, 0x35, 0x35]}}}, {@fowner_gt={'fowner>', r0}}, {@euid_gt={'euid>', r2}}, {@euid_gt={'euid>', r4}}, {@obj_role={'obj_role', 0x3d, 'upperdir'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x65, 0x61, 0x0, 0x36, 0x34, 0xf, 0x39], 0x2d, [0x61, 0x63, 0x34, 0x38], 0x2d, [0x51, 0x33, 0x64, 0x38], 0x2d, [0x66, 0x62, 0x63, 0x37], 0x2d, [0x6, 0x66, 0x62, 0x566398e56fc86d8c, 0x0, 0x63, 0x62, 0x38]}}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) rename(&(0x7f0000000080)='./bus/file0\x00', &(0x7f0000000140)='./bus/file1\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) 02:28:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x2000008e, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1536.878633][ T27] audit: type=1800 audit(1577500124.019:847): pid=27855 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=496 res=0 02:28:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe80, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1536.909570][ T27] audit: type=1800 audit(1577500124.049:848): pid=27864 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=497 res=0 [ 1536.941986][ T27] audit: type=1804 audit(1577500124.089:849): pid=27864 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/832/file0/file0" dev="loop3" ino=497 res=1 02:28:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1536.986494][ T27] audit: type=1804 audit(1577500124.129:850): pid=27855 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir084029388/syzkaller.9eiAV5/145/file0/file0" dev="loop4" ino=496 res=1 02:28:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x2c}, 0x28) [ 1537.147091][T27855] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1537.168780][T27855] FAT-fs (loop4): Filesystem has been set read-only [ 1537.174498][T27873] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1537.189686][T27855] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) [ 1537.197941][T27873] FAT-fs (loop3): Filesystem has been set read-only [ 1537.233146][T27873] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:28:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000000)="3e260f090f20e0350000d7a502000200e0260f205bf78d7132713279e6c3c685030000440f20c0350f000000440f22c0b949090000f3e1000fae44ee08", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11d000}) write$char_usb(0xffffffffffffffff, &(0x7f0000000440)="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", 0xb41) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000040)={0x81, 0x0, [0x8, 0x200, 0x8, 0xffff]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6(0xa, 0x80001, 0x0) r6 = dup2(r4, r5) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000000c0)={0x0, 0xb2}, 0x0, &(0x7f0000000200)="cf91212a2f288445f4078c32ee6455789416edec4e94d105ac488b89fc9a44fa2a5e7c46c000d782b151c48aefe07094b5dae756fb94bb7dec6940458eb1f0055ea185968e40a81d4581cf8ee7e545ed9c01538d7681b0c01ec560145e35e1f03e9c8b43db5f378b1e7205fab771e17ce4ea6136d54bb205e0c57e2d1bb52112c6c570154503256331d156d165da57e652c5b7c1b58e388b0d5234b471c9012a2f0ccfc3a723c728258a43217db2ef882345", 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:28:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0x2000008e, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x2d}, 0x28) [ 1537.501713][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1537.508017][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1537.701944][ T27] audit: type=1800 audit(1577500124.839:851): pid=27895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=498 res=0 [ 1537.727124][ T27] audit: type=1804 audit(1577500124.869:852): pid=27895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/833/file0/file0" dev="loop3" ino=498 res=1 [ 1537.731392][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1537.758808][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1537.811583][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1537.817568][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1537.850616][T27900] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) 02:28:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1537.859671][T27900] FAT-fs (loop3): Filesystem has been set read-only [ 1537.868408][T27900] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:28:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d634", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1538.069867][ T27] audit: type=1800 audit(1577500125.209:853): pid=27910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=499 res=0 [ 1538.135489][ T27] audit: type=1804 audit(1577500125.259:854): pid=27910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/834/file0/file0" dev="loop3" ino=499 res=1 [ 1538.228649][T27910] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1538.237461][T27910] FAT-fs (loop3): Filesystem has been set read-only [ 1538.245683][T27910] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:28:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) 02:28:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x2e}, 0x28) 02:28:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xe, 0x2, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x2, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:53 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x100000000011, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) unshare(0x20600) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x1c\x00\xff', @ifru_names='bond_slave_1\x00'}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x1ff, 0x2, 0x0, 0x7fffffff, 0x1}, &(0x7f0000000180)=0x14) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={r2, 0x1}, &(0x7f0000000200)=0x8) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f@'}) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)=' \xfb\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB]) socket$alg(0x26, 0x5, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="3f168b5b80520f057bcdf00949422b88e6420c81ed7a97490b76d29b8e7f53ae95bf13d77ecde24ffe668cc54fb06b0a3dbcd4aa97bacd29bbefe35dd9943565fd9af3a9abb4a7571b61ea2d9c236510f042141c4722d4fe2253a266f821d76670ca3bab47563a68d32029"], 0x0) socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x0}) [ 1546.195467][T27927] bond0: (slave bond_slave_1): Releasing backup interface [ 1546.246964][ T27] audit: type=1800 audit(1577500133.389:855): pid=27931 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=500 res=0 [ 1546.349740][ T27] audit: type=1804 audit(1577500133.389:856): pid=27931 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/835/file0/file0" dev="loop3" ino=500 res=1 02:28:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x2f}, 0x28) [ 1546.563252][T27931] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1546.621605][T27931] FAT-fs (loop3): Filesystem has been set read-only [ 1546.688286][T27931] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:28:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x4, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1546.771532][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1546.777775][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:28:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d634", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xe, 0x4, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x30}, 0x28) [ 1547.091554][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1547.097640][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1547.105537][ T27] audit: type=1800 audit(1577500134.259:857): pid=27954 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=501 res=0 02:28:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000001580)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0x0) [ 1547.287591][ T27] audit: type=1804 audit(1577500134.279:858): pid=27954 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/836/file0/file0" dev="loop3" ino=501 res=1 [ 1547.411990][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1547.418495][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1547.470642][T27959] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1547.490188][T27959] FAT-fs (loop3): Filesystem has been set read-only [ 1547.498512][T27959] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 1547.501285][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1547.512488][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:28:59 executing program 0: poll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x2000}], 0x1, 0x0) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x100000211, 0x0, 0x0, 0x800e00706) poll(&(0x7f0000000040), 0x21b1, 0xff) shutdown(r0, 0x0) 02:28:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x31}, 0x28) 02:28:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x8, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:28:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:28:59 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(0xffffffffffffffff) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout_data(r6, 0x107, 0x16, &(0x7f00000003c0)={0x0, 0x0}, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f00000007c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r7, 0x2, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x10000) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f00000003c0)={&(0x7f0000000240), 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x30, r7, 0x300, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a80)) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x17e56d513b772fdc, 0x0) getsockopt$inet6_buf(r8, 0x29, 0x7c, &(0x7f0000000180)=""/27, &(0x7f00000001c0)=0x1b) setresgid(0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$rfkill(r2, &(0x7f0000000200)={0x3, 0x3, 0x2, 0x1, 0x1}, 0x8) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0) 02:28:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xe, 0x8, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1552.562883][ T27] audit: type=1800 audit(1577500139.709:859): pid=27985 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=502 res=0 [ 1552.641792][ T27] audit: type=1804 audit(1577500139.709:860): pid=27985 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/837/file0/file0" dev="loop3" ino=502 res=1 [ 1552.710381][T27993] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1552.722990][T27993] FAT-fs (loop3): Filesystem has been set read-only [ 1552.736487][T27993] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:28:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:29:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000840)=[{&(0x7f0000000040)=""/143, 0x8f}, {0x0}, {0x0}, {0x0, 0x3df}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) r1 = dup(r0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x2a80, 0x0, 0x0, 0x800e00506) r4 = dup(r2) shutdown(r4, 0x0) poll(0x0, 0x0, 0xff) shutdown(r3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 02:29:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x32}, 0x28) [ 1553.011294][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1553.017132][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1553.089626][ T27] audit: type=1800 audit(1577500140.229:861): pid=28010 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=503 res=0 [ 1553.182099][T28010] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1553.191095][T28010] FAT-fs (loop3): Filesystem has been set read-only [ 1553.201326][ T27] audit: type=1804 audit(1577500140.239:862): pid=28010 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/838/file0/file0" dev="loop3" ino=503 res=1 02:29:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xa, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:29:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 1553.203820][T28010] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 1553.331308][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1553.337224][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:29:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x33}, 0x28) [ 1553.493280][ T27] audit: type=1800 audit(1577500140.639:863): pid=28024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=504 res=0 [ 1553.651044][ T27] audit: type=1804 audit(1577500140.679:864): pid=28024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/839/file0/file0" dev="loop3" ino=504 res=1 [ 1553.676255][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1553.676290][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1553.757025][T28030] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1553.767959][T28030] FAT-fs (loop3): Filesystem has been set read-only [ 1553.776480][T28030] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:29:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) shmget(0x1, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) recvfrom$inet(r0, 0x0, 0xd997, 0x2, 0x0, 0x800e00636) shutdown(r0, 0x0) 02:29:09 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/random\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(r0, &(0x7f0000000680), 0x2, 0x0) 02:29:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xe, 0xa, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 02:29:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x34}, 0x28) 02:29:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, r6, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:29:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xd, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 1561.971300][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1561.977086][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1561.989462][ T27] audit: type=1800 audit(1577500149.129:865): pid=28052 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=505 res=0 [ 1562.020970][ T27] audit: type=1804 audit(1577500149.159:866): pid=28052 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/840/file0/file0" dev="loop3" ino=505 res=1 [ 1562.051301][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1562.057226][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:29:09 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0030000000000000000", 0x29c}], 0x2) [ 1562.131433][T28062] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1562.140264][T28062] FAT-fs (loop3): Filesystem has been set read-only [ 1562.148909][T28062] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 02:29:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ftruncate(0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) open(0x0, 0x80044, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) recvfrom$packet(r4, &(0x7f0000000140)=""/15, 0xf, 0x2000, &(0x7f0000000180)={0x11, 0x18, 0x0, 0x1, 0x3, 0x6, @dev={[], 0x20}}, 0x14) getsockopt$inet6_udp_int(r2, 0x11, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 02:29:09 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0030000000000000000", 0x29c}], 0x2) 02:29:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x35}, 0x28) [ 1562.451883][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1562.458292][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:29:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x6d}) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xffffffffffffff1c}, {0x0}, {&(0x7f0000000140)=""/64, 0xfffffffffffffece}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x2e) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1562.538143][ T27] audit: type=1800 audit(1577500149.679:867): pid=28076 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16802 res=0 [ 1562.562805][ T27] audit: type=1804 audit(1577500149.709:868): pid=28076 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir382816683/syzkaller.LZ7cNs/841/file0/file0" dev="sda1" ino=16802 res=1 02:29:09 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0xff4e, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 1562.691295][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1562.697095][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1562.746960][T28054] ================================================================== [ 1562.755124][T28054] BUG: KCSAN: data-race in batadv_tt_local_add / batadv_tt_local_add [ 1562.763188][T28054] [ 1562.765529][T28054] read to 0xffff88809d1f4f98 of 2 bytes by task 28094 on cpu 0: [ 1562.773185][T28054] batadv_tt_local_add+0x11e/0x1200 [ 1562.778402][T28054] batadv_interface_tx+0x398/0xbe0 [ 1562.783529][T28054] dev_hard_start_xmit+0xef/0x430 [ 1562.788568][T28054] __dev_queue_xmit+0x14e9/0x1ba0 [ 1562.793605][T28054] dev_queue_xmit+0x21/0x30 [ 1562.798117][T28054] __bpf_redirect+0x4b4/0x710 [ 1562.802807][T28054] bpf_clone_redirect+0x1a5/0x1f0 [ 1562.807845][T28054] bpf_prog_bb15b996d00816f9+0xd98/0x1000 [ 1562.813571][T28054] bpf_test_run+0x1c3/0x490 [ 1562.818092][T28054] bpf_prog_test_run_skb+0x511/0x8a0 [ 1562.823397][T28054] __do_sys_bpf+0xf77/0x3150 [ 1562.828009][T28054] __x64_sys_bpf+0x4c/0x60 [ 1562.832437][T28054] do_syscall_64+0xcc/0x3a0 [ 1562.836956][T28054] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1562.842843][T28054] [ 1562.845208][T28054] write to 0xffff88809d1f4f98 of 2 bytes by task 28054 on cpu 1: [ 1562.852951][T28054] batadv_tt_local_add+0x29b/0x1200 [ 1562.858153][T28054] batadv_interface_tx+0x398/0xbe0 [ 1562.863275][T28054] dev_hard_start_xmit+0xef/0x430 [ 1562.868314][T28054] __dev_queue_xmit+0x14e9/0x1ba0 [ 1562.873342][T28054] dev_queue_xmit+0x21/0x30 [ 1562.877852][T28054] __bpf_redirect+0x4b4/0x710 [ 1562.882545][T28054] bpf_clone_redirect+0x1a5/0x1f0 [ 1562.887580][T28054] bpf_prog_bb15b996d00816f9+0xc38/0x1000 [ 1562.893312][T28054] bpf_test_run+0x1c3/0x490 [ 1562.897823][T28054] bpf_prog_test_run_skb+0x511/0x8a0 [ 1562.903128][T28054] __do_sys_bpf+0xf77/0x3150 [ 1562.907762][T28054] __x64_sys_bpf+0x4c/0x60 [ 1562.912187][T28054] do_syscall_64+0xcc/0x3a0 [ 1562.916709][T28054] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1562.922595][T28054] [ 1562.924926][T28054] Reported by Kernel Concurrency Sanitizer on: [ 1562.931097][T28054] CPU: 1 PID: 28054 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 1562.939789][T28054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1562.949851][T28054] ================================================================== [ 1562.957921][T28054] Kernel panic - not syncing: panic_on_warn set ... [ 1562.964525][T28054] CPU: 1 PID: 28054 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 1562.973202][T28054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1562.983256][T28054] Call Trace: [ 1562.986567][T28054] dump_stack+0x11d/0x181 [ 1562.990910][T28054] panic+0x210/0x640 [ 1562.994818][T28054] ? vprintk_func+0x8d/0x140 [ 1562.999440][T28054] kcsan_report.cold+0xc/0xd [ 1563.004059][T28054] kcsan_setup_watchpoint+0x3fe/0x460 [ 1563.009448][T28054] __tsan_unaligned_write2+0xc7/0x110 [ 1563.014851][T28054] batadv_tt_local_add+0x29b/0x1200 [ 1563.020065][T28054] ? packet_rcv+0xbe/0xa60 [ 1563.024503][T28054] batadv_interface_tx+0x398/0xbe0 [ 1563.029638][T28054] dev_hard_start_xmit+0xef/0x430 [ 1563.034674][T28054] __dev_queue_xmit+0x14e9/0x1ba0 [ 1563.039708][T28054] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1563.045434][T28054] ? skb_release_data+0x267/0x3a0 [ 1563.050470][T28054] ? pskb_expand_head+0x353/0x870 [ 1563.055502][T28054] ? __write_once_size+0x5a/0xe0 [ 1563.060658][T28054] dev_queue_xmit+0x21/0x30 [ 1563.065164][T28054] __bpf_redirect+0x4b4/0x710 [ 1563.069850][T28054] ? skb_ensure_writable+0xa2/0x290 [ 1563.075058][T28054] bpf_clone_redirect+0x1a5/0x1f0 [ 1563.080096][T28054] bpf_prog_bb15b996d00816f9+0xc38/0x1000 [ 1563.085841][T28054] ? try_to_wake_up+0x79/0x6e0 [ 1563.090630][T28054] ? __list_del_entry_valid+0x86/0x93 [ 1563.096062][T28054] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 1563.101873][T28054] ? swake_up_one+0x35/0x40 [ 1563.106384][T28054] ? rcu_gp_kthread_wake+0x110/0x150 [ 1563.111689][T28054] ? rcu_report_qs_rsp+0xaa/0xd0 [ 1563.116654][T28054] ? rcu_preempt_deferred_qs_irqrestore+0x34f/0x580 [ 1563.123256][T28054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1563.129513][T28054] ? debug_smp_processor_id+0x43/0x137 [ 1563.134996][T28054] ? delay_tsc+0x8f/0xc0 [ 1563.139361][T28054] ? __const_udelay+0x36/0x40 [ 1563.144055][T28054] ? __udelay+0x10/0x20 [ 1563.148232][T28054] ? constant_test_bit+0x12/0x30 [ 1563.153187][T28054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1563.159442][T28054] bpf_test_run+0x1c3/0x490 [ 1563.163966][T28054] bpf_prog_test_run_skb+0x511/0x8a0 [ 1563.169469][T28054] ? bpf_test_init.isra.0+0x240/0x240 [ 1563.174860][T28054] __do_sys_bpf+0xf77/0x3150 [ 1563.179481][T28054] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1563.185420][T28054] ? __read_once_size+0x5a/0xe0 [ 1563.190329][T28054] __x64_sys_bpf+0x4c/0x60 [ 1563.194775][T28054] do_syscall_64+0xcc/0x3a0 [ 1563.199296][T28054] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1563.205199][T28054] RIP: 0033:0x45a919 [ 1563.209099][T28054] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1563.228803][T28054] RSP: 002b:00007f64b3973c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1563.237200][T28054] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a919 [ 1563.245175][T28054] RDX: 0000000000000028 RSI: 0000000020000040 RDI: 000000000000000a [ 1563.253301][T28054] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1563.261272][T28054] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64b39746d4 [ 1563.269243][T28054] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 00000000ffffffff [ 1563.279069][T28054] Kernel Offset: disabled [ 1563.283397][T28054] Rebooting in 86400 seconds..