ate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000008) [ 770.560757][ T26] audit: type=1800 audit(1570909141.532:308): pid=31179 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=17281 res=0 19:39:01 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T2(r7, 0x103, 0x2, &(0x7f0000000380)=0xaf65, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="02106565", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000180)={r8, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}}, [0xfffffffffffffe00, 0x7, 0x0, 0x1, 0x101, 0xf5a042d, 0x5a3b, 0xffff, 0x9, 0x8, 0x100, 0x3e, 0x9, 0x7, 0x9]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000280)={r9, 0xfff}, &(0x7f0000000300)=0x8) r10 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r11, &(0x7f0000000040)=""/48, 0x57b) getdents64(r11, 0x0, 0x0) setsockopt$packet_int(r11, 0x107, 0x14, &(0x7f0000000040)=0x80000001, 0x4) ftruncate(r10, 0x28007d) sendfile(r10, r10, 0x0, 0x2008000fffffffe) [ 770.628887][ T26] audit: type=1800 audit(1570909141.542:309): pid=31207 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17281 res=0 19:39:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x10, 0x0) [ 770.829186][ T26] audit: type=1800 audit(1570909141.882:310): pid=31228 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16737 res=0 19:39:01 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x9401}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 770.937112][ C1] net_ratelimit: 20 callbacks suppressed [ 770.937175][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 770.949057][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 770.959768][T31234] attempt to access beyond end of device [ 771.013210][ T26] audit: type=1800 audit(1570909141.962:311): pid=31223 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=66 res=0 [ 771.050092][T31234] loop4: rw=2049, want=130, limit=112 [ 771.097657][T31234] attempt to access beyond end of device [ 771.141337][T31234] loop4: rw=2049, want=131, limit=112 [ 771.158418][ T26] audit: type=1804 audit(1570909142.242:312): pid=31226 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/604/file0/file0" dev="sda1" ino=16737 res=1 19:39:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x11, 0x0) [ 771.216808][T31234] attempt to access beyond end of device [ 771.222486][T31234] loop4: rw=2049, want=132, limit=112 19:39:02 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000009) [ 771.301553][ T26] audit: type=1804 audit(1570909142.242:313): pid=31228 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/604/file0/file0" dev="sda1" ino=16737 res=1 [ 771.345170][T31234] attempt to access beyond end of device 19:39:02 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x7ff, 0x200, 0x7, 0x6, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={r1, 0x0, 0x20b1, 0x5a4d000}, &(0x7f0000000180)=0x10) [ 771.385593][T31234] loop4: rw=2049, want=133, limit=112 19:39:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x12, 0x0) [ 771.420920][ T26] audit: type=1800 audit(1570909142.282:314): pid=31226 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=16737 res=0 [ 771.470900][T31234] attempt to access beyond end of device [ 771.568114][ T26] audit: type=1800 audit(1570909142.282:315): pid=31228 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16737 res=0 [ 771.624299][T31234] loop4: rw=2049, want=142, limit=112 [ 771.736777][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 771.742711][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 771.748611][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 771.754367][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 771.772470][T31234] attempt to access beyond end of device 19:39:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x13, 0x0) [ 771.811247][T31234] loop4: rw=2049, want=143, limit=112 [ 771.828495][T31234] attempt to access beyond end of device [ 771.860267][T31234] loop4: rw=2049, want=144, limit=112 [ 771.865816][T31234] attempt to access beyond end of device 19:39:03 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000000a) [ 771.939801][T31234] loop4: rw=2049, want=145, limit=112 [ 771.976727][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 771.982571][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:03 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x3000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:03 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000000080)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040), r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1f, @ipv4={[], [], @remote}, 0x4}, {0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, [], 0x12}, 0x1}, r3, 0x4}}, 0x48) request_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f00000001c0)='selinux.\x00', r1) add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:03 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='Odev/md0\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='rootfs\x00', 0x2200000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:39:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x14, 0x0) 19:39:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x15, 0x0) 19:39:03 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000043c0)=[{{&(0x7f00000033c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x0, &(0x7f0000003540)=[{&(0x7f0000003440)=""/252}], 0x0, &(0x7f0000003580)=""/20}, 0x9}, {{&(0x7f00000035c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0, &(0x7f0000003900)=[{&(0x7f0000003640)=""/170}, {&(0x7f0000003700)=""/86}, {&(0x7f0000003780)=""/104}, {&(0x7f0000003800)=""/19}, {&(0x7f0000003840)=""/22}, {&(0x7f0000003880)=""/41}, {&(0x7f00000038c0)=""/27}], 0x0, &(0x7f0000003980)=""/187}, 0x5}, {{&(0x7f0000003a40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @multicast2}}, 0x0, &(0x7f0000003d80)=[{&(0x7f0000003ac0)=""/151}, {&(0x7f0000003b80)=""/243}, {&(0x7f0000003c80)=""/244, 0xfffffffffffffdd7}], 0x0, &(0x7f0000003dc0)=""/254}, 0x1000}, {{0x0, 0x0, &(0x7f00000042c0)=[{&(0x7f0000003ec0)=""/209}, {&(0x7f0000003fc0)=""/102}, {&(0x7f0000004040)=""/216}, {&(0x7f0000004140)=""/73}, {&(0x7f00000041c0)=""/150}, {&(0x7f0000004280)=""/7}], 0x0, &(0x7f0000004340)=""/96}, 0x5}], 0x40000f8, 0x2000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3918c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x5, 0x200040) fanotify_mark(r2, 0x4, 0x40001000, r0, &(0x7f0000000140)='./file0\x00') r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f00000001c0)={0x0, 0x10000}) prctl$PR_GET_FP_MODE(0x2e) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000000)) getdents(r4, &(0x7f0000000280)=""/84, 0xffffffffffffff51) getdents64(r4, 0x0, 0x0) ioctl$VIDIOC_S_INPUT(r4, 0xc0045627, &(0x7f0000000180)=0x7) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r5, &(0x7f0000000040)=""/48, 0x57b) getdents64(r5, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r6, &(0x7f0000000040)=""/48, 0x57b) getdents64(r6, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x70, 0x6, 0x8c, 0x0, 0x81, 0x0, 0xd51, 0x105, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x3, 0x9}, 0x801, 0x6, 0x8, 0x9, 0x0, 0x1000, 0x4}, r5, 0x3, r6, 0x4) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xfff, 0x2601) [ 772.616719][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 772.622588][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:03 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000000b) 19:39:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x16, 0x0) [ 772.780294][T31326] QAT: Invalid ioctl [ 772.925838][T31326] QAT: Invalid ioctl 19:39:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x17, 0x0) 19:39:04 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x15, 0x0}}], 0x400000000000183, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14, 0x49, 0x1, {0x81, 0x3, 0x2}}, 0x14) r1 = semget$private(0x0, 0x0, 0x0) semctl$IPC_SET(r1, 0x0, 0x1, 0x0) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f00000001c0)=""/179) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x18, 0x0) 19:39:04 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x8000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:04 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000000c) 19:39:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x19, 0x0) [ 773.776018][T31371] attempt to access beyond end of device 19:39:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x1a, 0x0) [ 773.817434][T31371] loop0: rw=2049, want=130, limit=112 [ 773.861627][T31371] buffer_io_error: 17 callbacks suppressed [ 773.861639][T31371] Buffer I/O error on dev loop0, logical block 129, lost async page write 19:39:05 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x1, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000180)="3fbc14d5db43066d65030ebc02172d45c61c5cb150e98d559fabf382a67874c65b3aaf3ce36010d936c6a7d70a355e17cd512407fef58d1260777b6f60bec8de9406cab482ef7c312f46e89f5209a9cb2dcc204e5425f8ebf3144ed9a9104bb27184d389c8efdf0d15353309f7d79808a80ee616fb632337c91584f710a2668d69fbcb5daf8d0e0ee2ca27a5cd41835760ac8f5d2040ff8db8df8e7df66162a0a5f7ed1b341accaa264696ddd358ee") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000240)=0x2) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x1000, 0x5, 0x4, 0x8, r5}, &(0x7f00000000c0)=0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r6, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) [ 774.000059][T31371] attempt to access beyond end of device [ 774.005791][T31371] loop0: rw=2049, want=131, limit=112 19:39:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x1b, 0x0) [ 774.106975][T31371] Buffer I/O error on dev loop0, logical block 130, lost async page write [ 774.217022][T31371] attempt to access beyond end of device [ 774.237638][T31371] loop0: rw=2049, want=132, limit=112 19:39:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x1c, 0x0) [ 774.271554][T31371] Buffer I/O error on dev loop0, logical block 131, lost async page write [ 774.355184][T31371] attempt to access beyond end of device 19:39:05 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) acct(&(0x7f0000000080)='./file0\x00') prctl$PR_GET_FP_MODE(0x2e) [ 774.422801][T31371] loop0: rw=2049, want=133, limit=112 [ 774.446512][T31371] Buffer I/O error on dev loop0, logical block 132, lost async page write 19:39:05 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x9000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x1d, 0x0) [ 774.599607][T31371] attempt to access beyond end of device [ 774.682437][T31371] loop0: rw=2049, want=142, limit=112 [ 774.704899][T31371] Buffer I/O error on dev loop0, logical block 141, lost async page write [ 774.759454][T31371] attempt to access beyond end of device [ 774.795085][T31371] loop0: rw=2049, want=143, limit=112 19:39:05 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvmmsg(r0, &(0x7f0000000980)=[{{&(0x7f0000000080)=@l2, 0x80, &(0x7f0000001ec0)=[{&(0x7f00000009c0)=""/226, 0xe2}, {&(0x7f0000000ac0)=""/147, 0x93}, {&(0x7f0000000b80)=""/31, 0x1f}, {&(0x7f0000000bc0)=""/1, 0x1}, {&(0x7f0000000c00)}, {&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/235, 0xeb}, {&(0x7f0000001d40)=""/87, 0x57}, {&(0x7f0000001dc0)=""/232, 0xe8}], 0x9, &(0x7f00000008c0)=""/185, 0xb9}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2064}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x1e, 0x0) [ 774.815183][T31371] Buffer I/O error on dev loop0, logical block 142, lost async page write [ 774.854113][T31371] attempt to access beyond end of device [ 774.886800][T31371] loop0: rw=2049, want=144, limit=112 [ 774.913685][T31371] Buffer I/O error on dev loop0, logical block 143, lost async page write [ 774.982928][T31371] attempt to access beyond end of device [ 775.026946][T31371] loop0: rw=2049, want=145, limit=112 [ 775.050211][T31371] Buffer I/O error on dev loop0, logical block 144, lost async page write 19:39:06 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000000d) 19:39:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x21, 0x0) 19:39:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xfebe, 0x0, 0xfffffffffffffe00}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) [ 775.308378][ T26] kauditd_printk_skb: 24 callbacks suppressed [ 775.308391][ T26] audit: type=1800 audit(1570909146.392:340): pid=31426 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16913 res=0 19:39:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x22, 0x0) 19:39:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fea, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:06 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x10000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) [ 775.660515][ T26] audit: type=1804 audit(1570909146.742:341): pid=31423 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/609/file0/file0" dev="sda1" ino=16913 res=1 19:39:06 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000000e) [ 775.793648][ T26] audit: type=1800 audit(1570909146.792:342): pid=31426 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=16913 res=0 19:39:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x23, 0x0) [ 775.854151][ T26] audit: type=1800 audit(1570909146.792:343): pid=31423 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16913 res=0 [ 776.053747][ T26] audit: type=1800 audit(1570909147.112:344): pid=31458 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17041 res=0 [ 776.136716][ C1] net_ratelimit: 20 callbacks suppressed [ 776.136724][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 776.148221][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:07 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x24, 0x0) [ 776.318657][ T26] audit: type=1800 audit(1570909147.402:346): pid=31458 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=17041 res=0 [ 776.423850][ T26] audit: type=1804 audit(1570909147.382:345): pid=31464 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/610/file0/file0" dev="sda1" ino=17041 res=1 19:39:07 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000140)) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x8) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={r5, 0x5, 0x10}, &(0x7f0000000300)=0xc) [ 776.490959][ T26] audit: type=1800 audit(1570909147.422:347): pid=31464 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17041 res=0 19:39:07 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x25, 0x0) 19:39:07 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000000f) [ 776.631991][ T26] audit: type=1800 audit(1570909147.712:348): pid=31481 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17041 res=0 19:39:07 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x3f000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 776.776726][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 776.782539][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 776.788407][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 776.794180][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:07 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x26, 0x0) [ 776.929051][ T26] audit: type=1804 audit(1570909148.012:349): pid=31481 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/611/file0/file0" dev="sda1" ino=17041 res=1 19:39:08 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:08 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000010) 19:39:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x27, 0x0) [ 777.176712][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 777.182524][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x28, 0x0) 19:39:08 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) mount$9p_xen(&(0x7f0000000080)='net/igmp6\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x404, &(0x7f0000000540)={'trans=xen,', {[{@access_client='access=client'}, {@access_user='access=user'}, {@noextend='noextend'}, {@cache_mmap='cache=mmap'}]}}) r3 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x2, 0x2) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r4, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000000380)='keyring\x00', 0x0, r4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r5, &(0x7f00000017c0), 0x315, 0x0) getpeername$ax25(r0, &(0x7f00000002c0)={{}, [@bcast, @null, @netrom, @default, @bcast, @remote, @netrom]}, &(0x7f0000000340)=0x48) prctl$PR_GET_FP_MODE(0x2e) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 19:39:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x29, 0x0) 19:39:08 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000011) 19:39:08 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x64000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:09 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffffffffffff71, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000340)={0x9225, 0xd, [{0xe}, {0xa, 0x1}, {0xf, 0x1}, {0xa}, {0xd}, {0xd}, {0x6, 0x1}, {0xd, 0x1}, {0xe, 0x1}, {0xd}, {0xc}, {0xd}, {0x1}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r1, 0x40000) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r2, 0x5406, &(0x7f00000004c0)={0xfffffffffffffffd, 0x40000004, 0x0, 0xfc63}) ioctl$TCSETSF(r2, 0x5412, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r3, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000380)) timer_create(0x4, &(0x7f0000000080)={0x0, 0x25, 0x4, @thr={&(0x7f0000000140)="1a04cccc0b81a6a85cba4611153a4515e943c2d3c376eb5e70a41d0716a7e27636cb393df2448b670409c8ddcc400a2c84f332400f652544b718d68adb01ccb6e6a7278f4da483b829ffe3be965e2c3f4933e8fad2cd1d09abfe7ced9559fcdd7f5171d66b5fbcc02e787eaa4c25664376198f79f1dacba457b1fe30a7f7cea0fcb0b2fea59db409cab6ebdac31f4cd555a55f7a2375d2edc7484a0439c32050bc379cb3e0b0d0cc0c0caa61ff28a69019e72d0a31036fb817bcf68a21961f89ba13cd263765d098c9545cfd416b70eafc6b", &(0x7f0000000240)="e59379ffd6c6aeadacb1a5b602a8c2d7f4d723345631dff9f6a905175cdebb3bb7af83156a0e9b536001d8cafa260f85f1bf2faad4a0bfd3375804a0792a8694d63f76b2c73708a0065be699ead451f9a27347f188173861eb36358dcafe622d99d8eee6a9cdcef5147b73083086ee82c141d0eb0ebb3c322640d54453d1282d7b77cd48d2e34276e70b0524d22000b6f9fc705430f972bfe957d3666df6f54e408b339f60c595d48ffa32c98cdb1d866052d602f91343ed6706b61cfbd5dbfc7f7750c3"}}, &(0x7f00000000c0)=0x0) timer_getoverrun(r4) [ 777.976754][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 777.982625][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:39:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x2a, 0x0) 19:39:09 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000012) 19:39:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x2b, 0x0) 19:39:09 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) rt_sigprocmask(0x2, &(0x7f00000000c0), &(0x7f0000000140), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000080)={0x1, 0x0, 0x3, 0x0, {0x2, 0x8, 0x9}}) 19:39:09 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r1, &(0x7f0000000040)=""/48, 0x57b) getdents64(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r2, &(0x7f0000000040)=""/48, 0x57b) getdents64(r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r3, &(0x7f0000000040)=""/48, 0x57b) getdents64(r3, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000140)={0x0, 0x180000, r3}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000180)={r4, 0x140000, r7}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4}, 0xc) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 778.621143][T31567] attempt to access beyond end of device [ 778.651130][T31567] loop0: rw=2049, want=130, limit=112 19:39:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x2c, 0x0) 19:39:09 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x94010000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:09 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffe41}}], 0x1, 0x40, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f0000002940)=[{&(0x7f0000000080)=""/1, 0x1}, {&(0x7f00000005c0)=""/190, 0xbe}, {&(0x7f0000000680)=""/73, 0x59}, {&(0x7f0000000700)=""/4096, 0xfffffffffffffef4}, {&(0x7f0000001700)=""/249, 0xf9}, {&(0x7f0000001800)=""/104, 0x68}, {&(0x7f0000000140)=""/159, 0x8f}, {&(0x7f0000003180)=""/4096, 0x1000}], 0x8, 0x0) prctl$PR_GET_FP_MODE(0x2e) [ 778.707274][T31567] Buffer I/O error on dev loop0, logical block 129, lost async page write [ 778.768078][T31567] attempt to access beyond end of device [ 778.789343][T31567] loop0: rw=2049, want=131, limit=112 [ 778.870748][T31567] Buffer I/O error on dev loop0, logical block 130, lost async page write 19:39:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x2d, 0x0) [ 778.922890][T31567] attempt to access beyond end of device 19:39:10 executing program 5: syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x10000, 0x5, &(0x7f00000003c0)=[{&(0x7f00000001c0)="20899de145ec5f7b56b5e2de61ff563998c4e800f95d0e1a75772c71cf45253fdd9c06fb084defccd7d1a0949f9237f44b5aef2cb88346d23c", 0x39, 0xffffffff7fffffff}, {&(0x7f0000000200)='+z', 0x2, 0x9}, {&(0x7f0000000240)="fc27549720a44584eb3c96145c", 0xd, 0x8fe09f7}, {&(0x7f0000000280)="92fa629eb0b85d606b9296a3c3710ef5fa4b643963cb22f33e76308c29fd00c4f4ce54", 0x23, 0x7}, {&(0x7f00000002c0)="b7e47e8bdae4292a7512c6ab398d771104b405ba00ebfe03de44c370d98a5892cf128899f3e1a3c5335902e68f83a4a39d02840f0240faa500d3efb8111ebeba9d31ea3ddcd44628a7d2a7ffc950901ad074b70fa856e0f5f7067c7f5ebc4ae5fe6975650b7375e2b736b7fea459bd2eb5e91cf525804f72d6d893ebf01652d26683876e93b0a15454b0f1f0023142692c48a5d112bb97474f6588fba0e46bd80e8eb33eb29cab91c82f7f3266900f4a758cdb3267cf2e7f674b311e9d7c9a5e5efd022c1c465f0f821ece2e6f9d5d6ec0fe", 0xd2, 0x8001}], 0x10, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x3fffffffffffc20, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x40) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'veth1_to_hsr\x00', 0x100}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="640000002800210400"/20, @ANYRES32=r7, @ANYBLOB="07000000fffffffffffff0000c0001006367726f7570000034000200300001002c0000000000080001006970740004000200180006002b0aad99fce400"/76], 0x64}}, 0x0) connect$packet(r4, &(0x7f0000000440)={0x11, 0x1a, r7, 0x1, 0x40, 0x6, @random="aedefb079469"}, 0x14) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') syncfs(r0) preadv(r8, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) [ 779.021465][T31567] loop0: rw=2049, want=132, limit=112 [ 779.059850][T31567] Buffer I/O error on dev loop0, logical block 131, lost async page write [ 779.154517][T31567] attempt to access beyond end of device [ 779.184200][T31567] loop0: rw=2049, want=133, limit=112 [ 779.191318][T31590] gfs2: Unknown parameter 'obj_t]pL' 19:39:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x2e, 0x0) [ 779.232990][T31567] Buffer I/O error on dev loop0, logical block 132, lost async page write [ 779.337781][T31590] gfs2: Unknown parameter 'obj_t]pL' [ 779.367946][T31567] attempt to access beyond end of device [ 779.440392][T31567] loop0: rw=2049, want=142, limit=112 19:39:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x2f, 0x0) [ 779.507954][T31567] Buffer I/O error on dev loop0, logical block 141, lost async page write 19:39:10 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000080)={0x4, 0x100, 0x1, {0x5, 0x3, 0xb6, 0xffff}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f00000001c0)={0x6, 0x3b6, 0xc46, 'queue0\x00', 0x6}) [ 779.578342][T31567] attempt to access beyond end of device [ 779.584051][T31567] loop0: rw=2049, want=143, limit=112 [ 779.702813][T31567] Buffer I/O error on dev loop0, logical block 142, lost async page write [ 779.808305][T31567] attempt to access beyond end of device [ 779.821959][T31567] loop0: rw=2049, want=144, limit=112 [ 779.886849][T31567] Buffer I/O error on dev loop0, logical block 143, lost async page write [ 779.895426][T31567] attempt to access beyond end of device [ 779.962693][T31567] loop0: rw=2049, want=145, limit=112 [ 780.007058][T31567] Buffer I/O error on dev loop0, logical block 144, lost async page write 19:39:11 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000013) 19:39:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x30, 0x0) 19:39:11 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d00051bd25a80648c63940d0124fc00100002400200a06d053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x7) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000280)={0x1, 0x70, 0x0, 0x44, 0x7, 0x1, 0x0, 0x4, 0x828, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xd0b, 0x2, @perf_config_ext={0x0, 0x6}, 0x4000, 0x0, 0xff, 0xf27374bf89375be5, 0x4, 0x8, 0x47c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) statfs(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000300)={'tunl0\x00', 0x5}) connect(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x4, 0x0, 0x0, 0x2, {0xa, 0x4e24, 0x9e, @dev={0xfe, 0x80, [], 0x1f}, 0x8}}}, 0x80) 19:39:11 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x2c5, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:11 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0xfefdffff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x31, 0x0) 19:39:11 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000014) 19:39:11 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x0, 0x0, 0x39d}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r1, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000140)=""/208, 0xd0}, {&(0x7f0000000240)=""/218, 0xda}, {&(0x7f0000000080)=""/103, 0x67}], 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_DEASSIGN_PCI_DEVICE(r4, 0x4040ae72, &(0x7f0000000380)={0x7, 0x3, 0xebc8, 0x4, 0x4}) prctl$PR_GET_FP_MODE(0x2e) [ 780.791070][ T26] kauditd_printk_skb: 18 callbacks suppressed [ 780.791084][ T26] audit: type=1800 audit(1570909151.872:368): pid=31656 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=69 res=0 19:39:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x32, 0x0) [ 780.858032][T31660] attempt to access beyond end of device [ 780.941434][T31660] loop0: rw=2049, want=130, limit=112 [ 781.001783][T31660] Buffer I/O error on dev loop0, logical block 129, lost async page write 19:39:12 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000140)=0x8, 0x4) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4, 0x80) 19:39:12 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000300), &(0x7f0000000400)=0x0, &(0x7f0000000440)) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x10000, &(0x7f0000000480)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r0}}, {@access_client='access=client'}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/fuse\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'allow_other'}}, {@appraise='appraise'}, {@euid_gt={'euid>', r1}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@fowner_lt={'fowner<', r2}}]}}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 19:39:12 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0xfeffffff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 781.056227][T31660] attempt to access beyond end of device [ 781.139551][T31660] loop0: rw=2049, want=131, limit=112 [ 781.216125][T31660] Buffer I/O error on dev loop0, logical block 130, lost async page write [ 781.286983][T31660] attempt to access beyond end of device [ 781.292670][T31660] loop0: rw=2049, want=132, limit=112 [ 781.305013][T31678] 9pnet: p9_fd_create_tcp (31678): problem connecting socket to 127.0.0.1 [ 781.336755][ C1] net_ratelimit: 20 callbacks suppressed [ 781.336764][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 781.348267][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:12 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r3, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x20000840) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r4, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:12 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x33, 0x0) [ 781.551169][T31660] Buffer I/O error on dev loop0, logical block 131, lost async page write [ 781.643114][T31660] attempt to access beyond end of device [ 781.688683][ T26] audit: type=1804 audit(1570909152.762:369): pid=31686 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/616/file0/file0" dev="loop0" ino=69 res=1 [ 781.717339][T31660] loop0: rw=2049, want=133, limit=112 [ 781.722793][T31660] attempt to access beyond end of device 19:39:12 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x34, 0x0) [ 781.774496][T31660] loop0: rw=2049, want=142, limit=112 [ 781.790254][T31660] attempt to access beyond end of device 19:39:12 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) [ 781.816229][ T26] audit: type=1800 audit(1570909152.802:370): pid=31686 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="loop0" ino=69 res=0 [ 781.846751][T31660] loop0: rw=2049, want=143, limit=112 [ 781.877336][T31660] attempt to access beyond end of device [ 781.914583][T31660] loop0: rw=2049, want=144, limit=112 [ 781.947112][T31660] attempt to access beyond end of device [ 781.952826][T31660] loop0: rw=2049, want=145, limit=112 [ 781.978741][T31660] attempt to access beyond end of device [ 781.991296][T31660] loop0: rw=2049, want=257, limit=112 19:39:13 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}, 0x3a}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4, 0x4, @local, 0xffffffe1}, @in6={0xa, 0x4e21, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1d}}, 0x3}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e24, @rand_addr=0xff}, @in6={0xa, 0x4e20, 0x1, @mcast1, 0x9}], 0x94) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x35, 0x0) [ 782.063797][T31681] 9pnet: p9_fd_create_tcp (31681): problem connecting socket to 127.0.0.1 19:39:13 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000015) [ 782.136748][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 782.142563][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 782.148496][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 782.154256][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:39:13 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0xfffffdfe}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:13 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030530ecd0830303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 782.224310][ T21] attempt to access beyond end of device 19:39:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x36, 0x0) [ 782.286510][ T21] loop0: rw=1, want=2305, limit=112 [ 782.339967][ T21] attempt to access beyond end of device [ 782.345641][ T21] loop0: rw=1, want=3753, limit=112 [ 782.376732][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 782.382545][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:13 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4, 0x100000) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r2, &(0x7f0000000040)=""/48, 0x57b) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x80, 0x0) getdents64(r2, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r3, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'netdevsim0\x00', 0x0}) bind$xdp(r1, &(0x7f0000000140)={0x2c, 0x1, r4, 0x4}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r5, &(0x7f0000000040)=""/48, 0x57b) getdents64(r5, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000200)=0x3) ioctl$RTC_IRQP_READ(r5, 0x8008700b, &(0x7f00000001c0)) [ 782.491626][T31720] fuse: Bad value for 'rootmode' [ 782.524694][T31720] fuse: Bad value for 'rootmode' 19:39:13 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fl=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302cff7365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 19:39:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x37, 0x0) [ 782.767127][ T26] audit: type=1800 audit(1570909153.852:371): pid=31739 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17313 res=0 [ 782.852479][T31743] fuse: Unknown parameter 'fl' 19:39:14 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xfffffffffffffed2, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x38, 0x0) [ 782.907503][T31746] fuse: Unknown parameter 'fl' 19:39:14 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80000, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0xffffffffffff7fff) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 783.016738][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 783.022547][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 783.128590][ T26] audit: type=1804 audit(1570909154.212:372): pid=31739 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/617/file0/file0" dev="sda1" ino=17313 res=1 19:39:14 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000016) 19:39:14 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0xfffffffe}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 783.222834][ T26] audit: type=1800 audit(1570909154.212:373): pid=31734 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=17313 res=0 19:39:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x39, 0x0) [ 783.281820][ T26] audit: type=1800 audit(1570909154.212:374): pid=31739 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17313 res=0 [ 783.493979][ T26] audit: type=1800 audit(1570909154.572:375): pid=31774 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=70 res=0 19:39:14 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RLERROR(r4, &(0x7f00000000c0)={0x13, 0x7, 0x2, {0xa, 'net/igmp6\x00'}}, 0x13) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000080)=0xa, 0x4) preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r8, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r9 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r9, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r10 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r10, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r11 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r11, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r12 = syz_open_dev$binderN(&(0x7f0000002680)='/dev/binder#\x00', 0x0, 0x1000) r13 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r13, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r15) r16 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0, 0x0}, &(0x7f0000b34ffc)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@gid={'gid', 0x3d, r17}}]}) r18 = getpid() lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0, 0x0}, &(0x7f0000b34ffc)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@gid={'gid', 0x3d, r21}}]}) r22 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r22, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r23 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r23, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r24 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r24, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r25 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r25, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r26 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r26, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) sendmmsg$unix(r7, &(0x7f0000002e40)=[{0xfffffffffffffffd, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="7b346147161f130580d81dca226dccdd9fb496363b9fdccbf665f697c6957ecc9546c9c0eab3ce9ee6de356ae75acdaa13", 0x31}, {&(0x7f0000000180)="fa89e655ffe14f056d09f824a44b4368d60af5950e3abc0c9a517721a375f96d548976b36d87f5b7901e8951721c12b3989eb437617bf0d114639fcb0b7e78505eda5f0bfa03607b651d42fb15629e68903bee8cb8233b952298e40c738a18002be30b69fbbc705f2f224de5334737fceaab9788246aa15199fbe59b03661d6d202281b944b2073faa5173e9", 0x8c}], 0x2, 0x0, 0x0, 0x4006084c}, {&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000002600)=[{&(0x7f0000000300)="19b4753efa92857c32b18e80da7e8b7466850a5493fe70203831eae1e4486e3debc25dddde048c790e37656748fe2a89089253896d5befd3a58dca3bd8c6fa36d73e7f8464e3e31f79926793f32c8ef8ffae0227313549cad7d2612a99519472585cdc939ecb8e914ef198f62b58ec3888007c8d73e9aa53b05eaa37076b94616a660fa10bf9254e6813dff9d899cbd3351d8693a12942277784cde6ada050eaad9f28e215df5291320949f54365b2b44f569e1a08552e62c6bd78a3daada8d30745770818eb7e", 0xc7}, {&(0x7f0000000400)="010922d17cfbae50cb32dfa692a541e7ceeef617670265c5ec7c05172acd6a7763be", 0x22}, {&(0x7f0000000440)='z', 0x1}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="8991c8aad5ec1d3564b7f488ca3838130c416eab17c633af672ef81109f0fb112cbfdfe073dc5eae78f11455771c6ddf70bc913fa021286f8fac0e36a095df906c4e44369e308282d090a150192e9007b746297711a435e9bc895bb9753059353f8280d06df6097b4784c57fcca0a28a0f9e491fd95fbe6ee76fd2b1c6b8dd635dbeaf60fb9ad119601d7d461ed689a1d5b71cf301bb4bafc548d9593ec90a6fe5cb810cd4da11fd9518f1579c666dfa12fd4c98fb40ed0822441bedda98bbfb03d6a5236207359f53a72cd6494a", 0xce}, {&(0x7f0000001580)="6357c455e367580962369a01a58e82a8b1d4c3c1300a1d42e9113ddc58b18da7aa820e88c12a2cc8415679abb3546947d9c55a7d67b7fa1da00fda9f956c478e7e176927c2ce13c44e9f1adec0513b7f793ab3", 0x53}, {&(0x7f0000001600)="3c8f8fd9aef9c37ed1f2b1ebfede67d09bc04af199de2d9c508114f2f8e6ddb23fbd2d8472c5df07db6a09b0750f72c4d5828425dc8c32a34b086e37c13160d500eccf49ae0803dca81159cab3a01748bb61cf1961e9b7f25ab54500aba444e56c06536f7c77a315374d0a2a9a46c39869d8dc2d48d421cb0f4d21e0f565945a9004d009cb43b7a14e25cfc275c3e3e222858bce462d58670b04fe8d7e10a8cde708b23699d71b714acab7cad048449c6b2929ec9c2507b91739109a4a0c7cfaa1e1277ecd338ba15e67b0576c2ff7855b89a23867de07b5992b9e8ad6d8e0ed3bc36173000ce3ccfce1ccd1b51dba4fb9a7fa16fdde606aba96891115623640b6694edb1f9c848ba7b654f163c87d90298737af16bf6514c7956d7f767a6313574e49b08ea88004adff0c9db56d7a96be87813fa2d2b4ae906d33b485622ca8298d760cf014c446b08c761a4f8864103d2ee5e0539e03140967f13a3e90ffc6c0ad7525917d569762164684a0cdccb3751814890f12563381859140c8cac84668f9792c4677642882567698f29a9b7d171a608a7ffc9dede1d0a59f306bcc5f29a74a0b9ae6cfe377a94e1d66ddce16b457da64fc52b57ecf097918c66b1a5dfc89a76f0a73aea88ecf55049b05582bc0e9ba80bd973efa8729e8bc2b4640f41b737afad4ce4b01c79678378517c5e80f7fde4e4e99c8dfcfd287f033bc525aa361d4d060473e70be1eed4e67f8c98e4a189fe9ddc52b0634598b18b294d39bd21399748c6f70f3bc71177c0838a590db99a4c25b42fce94c86c4661b1c2574b45e975bdf373efb3c0f849cdb48303f6c772c91ebb06600c529c72a5d9a30a0a0cc0793d9171cd506ba53ef18a6609a870b9e0e03be1aa71977093f6a7d800c71a29c864eee19329e8b35074f3a8e9ec8ed1f56b9791baf30f18d38c9526f9b6ae6630e9282d945fe3b9a594048b387c0f9c0abf452d82998bca9f9c2abc33a1c08c657dc9f67ecccd933145e89038335d9b7f0432b3ebdf6b0af4b6a3060e83090f386c475398c2056ec5d7f0f28637aa742c1272d365606c624f6472ee4adf0c2b577266a0a13a9879d57387858be83cc4e71f6670156aaceb9385ae3f36b6f71976c1c6867896de5b0f747aa192e24754b015293240a1f5afbee54e825e0533c0ca5cf3f0ff8cb19587984d56cdf1caf7595393fa2f992c6209aff1188e7a9bb534c2e703c0eb71a1a2bf3da2b5a28d77c1e523f2be36a743ac96a7cb9b7e9d0bb2db684c3c8a62515bface4143f94f2e23f58029daaa0d23fbb697ce3b82c3ffa0f6b7ec0cb3ca70bddc12e63adc94fc7b6ac9597e2adef75d9e93f0e7334351e51294be93b40de414ac78f5f38533091d56933d3e9725e1afbde27cf6c7daf06fe67a853c1136d49a2e605ae7702901a728361621a5cc6f61dc84b6e520ac5b2dda8f710adff55e48ad316449904cb27b1c9dbe9da1c239f64c252d655482b3b58e4a4109025ffd3543db30eb35429f254045b63eeb356a1dc3e889e35a29f6f20cf9e95eca1979280051ad13460328b5b3e971edecb52098c36d72f0f40f080d6dd78b060177f148893c99fd2ff48a43012597671674233ccbfc676fe6dc14c088ec333e75481f04201100d94518e93176fb36e104e6b8c30dcd159c99e2b4ec17797fed9b9256f1a0399bb4f3059d1e6c0d27e86f404d26977f2ce0379d1e3a1cdc86a9e9c00df8d7f4ada957ed343221044f303b3491eacc8479bd1dbf0b7dfc382667274a76569366dc6985a9d06bf78835884b2a1a513f455a0185e669facf45ca76056f71f36657cd32e4bca71a6308021a86aa94fa736975161a1cb22035131c7b5b34f38feedc6d60b2f001b7f8323620640d54b3d859e9b3f4447b0b6c93de78345a0b321eb66eb19dce461974e05f49cb2c58ddaaeeac7c2f715aab1c549abc86668aa42048f96b3dc8f61763ddecf5a2fd0b76f6b86340f4497b5c19979e3e45618397a76d9f59a74b9c29f9cb2cd52424f70442b26f061d15e3362567eab3929a6e5100648b0767814c188001a90909fdabf6e2c8c80650b83a5ff56fde036a00f2fc544a34cf6daf5f036e0f9acd412d6ca49093801c3663a01faa7d40c9928c808cb91dc862fc3bd2f0fe2612d0644b463cee51925f3d854ac713d384e942cbe7f674158026a68251c4b428c3f5550cbd0097674f008636a1c9bf21abc6187abf3163795cfa49233a08c37241a3913ce4b1626bd3354bb35fe8327d7e476738a78314233169ecf5eba33182b5843493bbd7c6d59b9f6df8ec1098f5fb3f4f1975061f0f384cc8e1ec7748cae24c7ec05cc6c94dae5dede17e7461a4d6ff55a0225f5227a39893936ebb91cfc68963af8f47703150e973ae4da913d319f6ee9d4d0755efc5b50935cb972fa755d778b33331be83558f167f8ea9e00b17ba710b3625238cb5f80adb0b4b759cc6e4878d4dbee8cbaa2bab827fe7ef913e000560219cb5a17cd5251f95170ad15e55b04b4f9e59ceba6255b127ea7a6e13ae62bb3cf6768a169554caa3a6c43bcbe4399fe27f6590f5b7c3c4cc7ea14ad2adb5630584f5350096fdca78d2de0e51d6faba657bc5ed266ab944912640e9d978fe179378184ec568ef1c1f577067f5c9718199d6d87e34c74056e0bae90c08cae3b697123f9418804c15035f18ab0081d9d403e86f841552698b02219a55363d8172404ba336be614dffa976b697d54afcaa540ab93bdb97dd1e9edb4f70480ad36ee1adfdeef2feb7c9b7b289731ce523477ae7f6026be53663d0d7ebca53dc3df357537aa7ee93480c96e277cd00baa78c722cdd86cdba31763724d313cb0c460b14f52c8815516747ac69a31c7662350c64744f24a789fb0855ba8ef594e0f02eac5ff2d4d611e391c9a7fc13771dac0eb22fbf3e80675d9f1a9906924f25f52c8c36c9aa60636722c82a8e3c0823db22079628855136fa9dda23502ed7f4538b471e999e5022a68c459f5c53ca3db4344481d9ba9e02fe29d3332af551488569780dec58a4db59a22ba4d3bcf15dc790b73e797e949ec6fddec280c46128fc99156751bc8e6e759383c593ec08d77a6623a2a7867bfa249dd7dbe434ef3c83a42d783dea95c89dc8b1d06e04f47cae9f46b883997e50e793ea40a874a26bfe984d99f73e5f34c712eb29a2ce06d29c9aca20a128f5dc84c680f8975ebc565ad9ebc454812f614da021d8e4a9ad3ebbd54295267d6198ffa4e0c03ccd03650f7213ca5414e9b0bfc6af7551d4cd0da423505ae35863fc91723bb9b303cdf828e233d5ac75369b4258da9035dd86d6a332eb750263d61be5d70ab7bbbc4c1d83fccecd37956a86568fb4d4f4ae74884fa32990ed43f0a5e3ce76b00d6ff22cf8e13acb0bf04ff2cd91d0a77ef6e98ad877e8edaee20078901620ccffb65ab6b0cd25bc738a1582593fd0bcc0e29b6be36204eb54882737a316c9c4bf7d54f6ef1dde4be17cff5b1633e55833e9fe60ce1d7af5f662b1e61f8e73aadc66cfd83335a1764c9c19ca65faf302ebb9068c400280bd1e1c80b8bfd944757ed90b8844ece67d675f8a43dc2e3d37907c99b900bee495003018fc7fdc8b71492ca480ad9d734084297c1952b7677a4359a226ac7a6a09dccffa1024909e8b3fa5b10b010b76db02d1fbac092864b386b3ce75749b1f116c6a2f7801897dadb400e9dce1c82807fd17b54d539230bdc4322e7119f8610df1ef2f659eac4a43ca999f64b6ebf32c75c355d437bd7672d3848dae3bab00ea099c57ad81e83ae749ce2cdeb764aea2980f45679b5830af0907da25d8c8634e41c4c10020235320db98d6eef73a709e79a4bacdc3f8b6161889bb093b339fb7f68f7fed84e977104d853283ca362b575e9b3e0b983b235757cdb49768ea742ae4d13ad0c844bd83c75ce203156579e269ac7b065c33aee86177b085ee789f8e03d359bed1b3fa216c7fb91d5d2e37128fa5f8b6c521ace9864da9531fe445f6d9f27a53bd3cf81ffef5b5a0cefa1461382bf4c1331fba315946785da5db3c27f408be70729a210c02430a294f606f63928bdb6d1833626257613f95a2246d5e856ea0b4f244627d7ad7972df33dc2c512dbafef2c3e219c1897a733981746d674d9bfe75673673986917ca6806f80ad6f3027a9f65c8860c4d094d01192e9a1066e1b3b4ea61fec6b45156e22a785aae3bc5b179fd50857df5021168210cb5de26a4a9e9c4ab8c3761aa6a3fa660e9ba846723d7f6590e61727100afbb313ca395f13de11b908230da27475648ea6e7b4fa63841099017e6652c8d5652a40ce7a90d42e2d16086e55b67eaf93ccb4810af33e6fe2c70c3e1b6ae0773ad8242d75319c183538cc79404615dc98b15a8292e3cce04eb03fe3d8f57205a35fa7327db8e4b4aa7795391a64cecd3a8c4893878e4c8a9eafc1b178abfc0ad824057f93bb884b49a3b4bb9f0be1ed332574e177f188036c59cea5c72d0e43986d379f851cfbd48fcac96131d9a2a84f1ee259b87085c91fbb26eded5506f1419f80fd178ea83933640a3c61aead76a849aae6c8cbab7ecd8f63d42e89b63f5693b5879a1311e9c3da18d2f16ec4d802853d4111384e725c12cd8c4803c8e25f0b5008380fe3f425aa4ceaa43405c77f9a55bbd98ec6af364258012ae7d85d3dc7dce8ac760a83b773c9dd074d31b00fd5c8ba63255ea816d33c10e800cfb9e33374bb008ae0c35969d749c34deeaaad562f82c8b33d34536890144704dd8ec70cec4f63cdc49534fc33f740caf8876b1d4210def8cf30e8595ff6b0daeabd35ca1a5c76d13d2e3e98d13e3121b959390f4685259c624d6cf68d3af9385ef1c1891c4ee3f24535406479bd9b8ccdcd3dbcce6fcb89ee3ee449fc12a7ba2748737b36e66266e0f85330b72920f77e5651b1031378e2fbc07c95d6519da1444fab059820557970adb33ffcdeabb5a7b96d2968c86349f23e27e576317a98a25cff496bb22ad12f94f5b34c442db4aa4951efb8bf385fb9ea50ae1b11bb4914176a594b6c19e4ba0555463ec34630460af4c372c095079daa58cfdb993d3853c3c0db23ab14adc3faf2dfa6b23b9ea4ba2fe1df2cf182c85028fa4fee70d358da5dc12068d1dc815eed5b8badc6bb7a320d6de4a149c751d52e367aaa5a09906da1abdbbca1b316ec46f0b7b5ad3f7a8e79ea4b155fa5412fe53ac6eca91198f4216d2cbbc6b1b4a786397fdd811f14e7b32c0baf32b0e293f5705852b30d82712cd4ef4c28a03e98b679731677767751c4cc0ebe64aee17fa824f23fc52d02468a672096def13e45642141655d8f9e77651ff71011dd7ced0771d5b40ba9f9401694c8ede55f1e71f8e146a80b1d30e16be1a31422a09a4f501ca1399924b5fbe8d2dcc04dd098ed5e5aea8cb068bfbc5105401437c5538784b91a5d4d0c7facaeaa4b1cd3a6e151847192ccf7f21066590e2c44e36320200db05bfeb5f47103b57fea073ce586ee0a75d4f42286aac874b37d09f7a88bb791456ca685af08b809ea569117544b1948f81381e78bb9a0336a663ee2005b3dcf73119fb66ce95dc1fe955b9030789a89cc849a3a87cc465a50eff56f03e60800165db6d25e9debe4af7b7f7cf74617803977991dbb94fd8e6ee5be34e7d126e2167033e16223bd2bdf28758fa1dd1018796333518e864b55c0ec4633414eab3be16c4aadbc716ff0816edb126712cd41713f7140d97736fce5048477d38df2bbf503fe623255b45c92c8057b0398ed8", 0x1000}], 0x7, &(0x7f0000002780)=[@rights={{0x38, 0x1, 0x1, [r8, r9, r10, r2, r11, 0xffffffffffffffff, r0, 0xffffffffffffffff, r12, r13]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r15, r17}}}, @cred={{0x1c, 0x1, 0x2, {r18, r19, r21}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, r0, r22]}}, @rights={{0x2c, 0x1, 0x1, [r23, r3, r4, r24, r25, r4, r26]}}], 0xc8, 0x24044000}, {&(0x7f0000002880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002dc0)=[{&(0x7f0000002900)="93bb7b7dda076eb01ab9ad0caae1bea91bbee932d3bd729dc8def5adf5b6b9c9f6181c16caa733f2bb62b16f6ebfc3f8754a205ad82e6646192bcab12809475be320542c330b623c", 0x48}, {&(0x7f0000002980)="e08e8d7e2a03e7660549ad6aa066cad8eb7514d61f334265542f20933c831361aed2cdd57624a26a3813509732585868020998903a5d44c8f969a47e477aadac9a7c82662f4633d9c7aa9431b593195ea4647b3b932c817eaf73c973dd55a4ba2df3b40c88c921e79960cc2ee9768cf82ae48b2728c6562b6f2876fe3a6c69841ea70982fc42370ae5d5ff2d16f58918a2c942388f4e02a43bd91693468690aef2", 0xa1}, {&(0x7f0000002a40)="bb1d516aafbdafa6df8df381742dc7adf103f977dae0f3c3052046a4267ff92550a8f2282d2bd39e05e096f5100df73e850e78cb2dd46b95c3d5bf51b512d717ca26ba9c1bd938de0f5a2a677790ee210543b9719eb11ccccafa6c21ae9c1a250d515dda9c7ed8268e15ed836ea8bcc01c4c8e3842da389b406567466f9004be317963800919809f2f69555cd1cc60456d3682a517405138fc1aa7cdbdecd71389a2866d2d994f84b973103294b191b26f2761184b", 0xb5}, {&(0x7f0000002b00)="3d2f4af3a15cc8a6285be25efa02b6741a233a8f006daa16a72dc6de3ca476765552be5bd26bdac47eee26208970226c45d70888adaebfc85479ec4bd83dcd8fba89ede4b03c7dd196593e83047b445fcad043c06b8d68452159d7e990fc45bbcc9c1a2fd2b825b8b72f700361598267f6da9661631ee0650e4017e61b5d4b99208bffe8c66c26ccc8d42cb0ed09b724e349271a8bbb6355d304b2bc225fbd82461082943725be706c4a911395a892d65e754cf902316463b8c9cddab4a3ec894048c2fa2d4f6765dbdb36c10cff4dd6641e5b153c26", 0xd6}, {&(0x7f0000002c00)="4a96794ab04c725a911bc5cb909058bab757dc7e46a6985127e559f5c73332f7a9f6b2a138fc8c851714f1c02230bcb5568d6661f9ab3f3c07073669b633e8da6ac1378d1b96f3f82d85e961cd43213a4997fef28d3ba8cfaebbc1656bfc1421c2b6208a2eee69e7f283a3042f14ee0f8852b4f66d6f8222d4e791482c7810fe17d8eef6ceef22b56f8a70b32099f10f4340704a5c2b2f31589445135ee04d7f0e5bdf2cd857bcd4605eb4096da0dca8464bfdbb", 0xb4}, {&(0x7f0000002cc0)="8eaaa3a1b208a4b51bca796889039cfeab73f819fb86701f73246e6179d1059c103a91f6c1ffd2b07466c16cf4886c98f7a4197378fb57b50cabf2fa068742f16ad73dd307258eec7454a76396789510ab236f1027133d14f36fe6b253838e5ccd85", 0x62}, {&(0x7f0000002d40)="b9b2969b7329f58e9b137193bd4893f510ec4184548393317a5f8aa1729a83997de24c08448fd0419994eba4a44e77c76d7465623debcb500ebac55d4e8a57b5c213b058bdefaf3f43c537c2777b79ae3c7e85b7a8", 0x55}], 0x7, 0x0, 0x0, 0x4000}], 0x3, 0x2000) 19:39:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3a, 0x0) [ 783.587158][T31774] attempt to access beyond end of device [ 783.620403][T31774] loop0: rw=2049, want=130, limit=112 [ 783.676772][T31774] attempt to access beyond end of device [ 783.747658][T31774] loop0: rw=2049, want=131, limit=112 [ 783.778784][T31774] attempt to access beyond end of device 19:39:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3b, 0x0) [ 783.833393][T31774] loop0: rw=2049, want=132, limit=112 [ 783.852791][T31774] attempt to access beyond end of device 19:39:14 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) [ 783.925967][T31774] loop0: rw=2049, want=133, limit=112 19:39:15 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000000c0)={{'\xd5d', 0x3d, r0}, 0x2c, {'\x81ootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCX25GCALLUSERDATA(r3, 0x89e4, &(0x7f0000000140)={0x4c, "aefe153e20c4ceae2ffb12f24568eff7cc08b832b356ebaa955c3717a1fcc73bdd834f682f86cc704397e9d3e2ffcf5bf88b5959f080a62c1df497e2a08d457e12440afa6a6f8a3a0814297dd9cfe734a418034fcfcf4bfc9e8eee884f678e1b9e45cf3797f4ead57be1cd628f66ca7d6fae85594d6ae3613bfecc18de868f57"}) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 783.993593][T31774] buffer_io_error: 8 callbacks suppressed [ 783.993606][T31774] Buffer I/O error on dev loop0, logical block 132, lost async page write [ 784.045344][T31774] attempt to access beyond end of device [ 784.066062][T31774] loop0: rw=2049, want=142, limit=112 19:39:15 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}, 0x2}], 0x1, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x1, 0x2) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000140)=""/206) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r1, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000000080)=""/6, &(0x7f00000000c0)=0x6) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={0x0, r4, 0xb}, 0x10) [ 784.091039][T31774] Buffer I/O error on dev loop0, logical block 141, lost async page write 19:39:15 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3c, 0x0) [ 784.160691][T31774] attempt to access beyond end of device [ 784.172768][T31795] fuse: Unknown parameter 'Õd' [ 784.196809][T31774] loop0: rw=2049, want=143, limit=112 [ 784.212525][T31774] Buffer I/O error on dev loop0, logical block 142, lost async page write [ 784.234644][T31796] fuse: Unknown parameter 'Õd' 19:39:15 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:15 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x2c5, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) [ 784.266548][T31774] attempt to access beyond end of device [ 784.297073][T31774] loop0: rw=2049, want=144, limit=112 [ 784.367226][T31774] Buffer I/O error on dev loop0, logical block 143, lost async page write [ 784.410905][ T26] audit: type=1804 audit(1570909155.492:376): pid=31799 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/618/file0/file0" dev="loop0" ino=70 res=1 [ 784.451776][T31774] attempt to access beyond end of device [ 784.516802][T31774] loop0: rw=2049, want=145, limit=112 [ 784.546974][T31774] Buffer I/O error on dev loop0, logical block 144, lost async page write [ 784.588553][ T26] audit: type=1800 audit(1570909155.522:377): pid=31799 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="loop0" ino=70 res=0 19:39:15 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000017) 19:39:15 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x2c5, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:15 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3d, 0x0) 19:39:15 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = getpgrp(0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @loopback, 0x200}, {0x2, 0x4e22, 0xffffffed, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r2}}, 0x2a) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0xffff3779}}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000180)={{0x8, 0x1, 0x3b, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0xa}, 0x4, 0x104, 0x1, r0, 0x6, 0x0, 'syz0\x00', &(0x7f0000000100)=['\x00', '/dev/audio\x00', 'self\xefmd5sum\x00', '/dev/audio\x00', '\x00\x00\x00\x01\x01\aq\x7f', '/dev/audio\x00'], 0x36, [], [0x80, 0x1000, 0x20, 0x33b9]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r4, &(0x7f0000000040)=""/48, 0x57b) getdents64(r4, 0x0, 0x0) ioctl$TIOCSSERIAL(r4, 0x541f, &(0x7f0000000080)={0x8, 0x4, 0x3, 0x0, 0x1f800000, 0xffff, 0x1, 0x1, 0x3ff, 0x2, 0x4b, 0x9, 0x5, 0x1000, &(0x7f0000000140)=""/4096, 0x4f, 0x3, 0x10001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000001140)='/dev/md0\x00', 0x204000, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r5, &(0x7f00000017c0), 0x315, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r7) r8 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0, 0x0}, &(0x7f0000b34ffc)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001180)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r9, @ANYBLOB="2c00b19cc76024417d29b6f27cd1fc5f68c3ee047b199d0d3fba7e80abe45a8300e115f16c354a7b4be455150b13d5497419ec0e736873527abd27074131435f035b550dbd898fb811483c18d3254ab202403cc32b584f7ca3e0eff49c760db9684cd7b6c8cbabe0825f2faf2fda93c0f7b7d98c25372820e3ffd248c4450c45183ef003d785d8d33184ecd178f7be9dcebb70c021941670d0dbe3ab210139679492b34147eaeff9cbdd54e165730e8a3842785e9f88f6783467c309c0ff7558d65f76acfe4b7da9c4c50b09f6f0a32a337e7f04caf01dfb4a"]) fchown(r3, r7, r9) prctl$PR_GET_FP_MODE(0x2e) 19:39:16 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3e, 0x0) 19:39:16 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x2c5, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:16 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x41, 0x0) 19:39:16 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000018) 19:39:16 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='\x8b\x97\\\x10\x00', &(0x7f00000002c0)='./file0\x00', 0x1, 0xaaaaaaaaaaaaca4, &(0x7f0000000040)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x41084, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r2, &(0x7f0000000040)=""/48, 0x57b) getdents64(r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r3, &(0x7f0000000040)=""/48, 0x57b) getdents64(r3, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040), r5, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x3, {0xa, 0x4e22, 0x800, @rand_addr="2d504e1bdfd5e6e1d87826c85f311a49", 0x1ff}, r5}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000080), r6}}, 0x18) 19:39:16 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000180)={0x0, "9ba9ce424bfbcaa02a67b8a77f3a4f916f50e5a703ccc499194a69fbef24bd6c", 0x3, 0x1, 0x2, 0x1, 0x2000202, 0x5}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x200, 0x49) r3 = getpid() r4 = syz_open_procfs(r3, &(0x7f0000000100)='net/igmp6\x00') preadv(r4, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000200)={r8, 0x7fffffff, 0x8000, 0x5}, &(0x7f0000000240)=0x10) 19:39:16 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:16 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x42, 0x0) 19:39:16 executing program 2: 19:39:17 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x43, 0x0) 19:39:17 executing program 2: 19:39:17 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/48, 0x57b) getdents64(r0, 0x0, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x3e, 0x2, 0x38b7, 0x3ff, 0x0, 0x7, 0x6f3c}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) [ 786.007854][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 786.007869][ T26] audit: type=1804 audit(1570909157.092:386): pid=31871 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/934/file0" dev="sda1" ino=17463 res=1 19:39:17 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000019) 19:39:17 executing program 2: 19:39:17 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x4) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r2, 0x28007d) sendfile(r2, r2, 0x0, 0x2008000fffffffe) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000180)={0x9, {{0xa, 0x4e21, 0x400, @empty, 0x9}}}, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$bt_BT_DEFER_SETUP(r5, 0x112, 0x7, &(0x7f0000000040)=0x1, &(0x7f0000000080)=0x4) [ 786.277958][ T26] audit: type=1804 audit(1570909157.152:387): pid=31870 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/620/file0/file0" dev="sda1" ino=17466 res=1 19:39:17 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x44, 0x0) [ 786.444525][ T26] audit: type=1804 audit(1570909157.152:388): pid=31874 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/620/file0/file0" dev="sda1" ino=17466 res=1 [ 786.536740][ C1] net_ratelimit: 20 callbacks suppressed [ 786.536749][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 786.548234][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:17 executing program 2: 19:39:17 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r1, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) pwritev(r1, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000080)={0x10000, 0x100000, 0x7, 0x0, 0x2}) [ 786.766183][ T26] audit: type=1800 audit(1570909157.152:389): pid=31870 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=17466 res=0 19:39:18 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x800000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:18 executing program 2: 19:39:18 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x45, 0x0) 19:39:18 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000040)='./file0\x00', 0x34440, 0x135) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:39:18 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000001a) [ 786.937178][ T26] audit: type=1800 audit(1570909157.182:390): pid=31874 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17466 res=0 19:39:18 executing program 2: 19:39:18 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') sched_setparam(0xffffffffffffffff, &(0x7f0000000080)=0x401) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:18 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x46, 0x0) [ 787.116217][ T26] audit: type=1800 audit(1570909157.612:391): pid=31913 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17455 res=0 [ 787.176742][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 787.182573][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 787.188540][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 787.194316][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:18 executing program 2: [ 787.322116][ T26] audit: type=1804 audit(1570909157.842:392): pid=31913 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/621/file0" dev="sda1" ino=17455 res=1 [ 787.406490][ T26] audit: type=1804 audit(1570909157.852:393): pid=31917 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/621/file0" dev="sda1" ino=17455 res=1 19:39:18 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x47, 0x0) 19:39:18 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4000) io_setup(0x2, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r3, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r4, &(0x7f0000000040)=""/48, 0x57b) getdents64(r4, 0x0, 0x0) io_cancel(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x5, r3, &(0x7f0000000140)="40cd9a81c08324a683b232186d1b292b85a02a43deebb981040dee700071a6a3198acf54bf4c9a8193b9e16982b2bfa968964b18afaf109e7400213a7d3514528d63ef64c74edf381eadaa8b309a51850ca883c0fd41d820bc3951b0f7b1156592511cf3ff145ea68bb75b97de346ac1b074ac45917773b7470264f6cd1caa02ff39348c7ee45b3e465a358c2588296168047d88866a5ea6a79150e3f3125ba36f8cfd00751b52aa7bdf", 0xaa, 0x1, 0x0, 0x2, r4}, &(0x7f00000000c0)) [ 787.542500][ T26] audit: type=1800 audit(1570909158.262:394): pid=31960 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17457 res=0 [ 787.576751][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 787.582593][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0xaf}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x7f\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [0x300000000000000]}, 0x48) [ 787.702308][ T26] audit: type=1800 audit(1570909158.302:395): pid=31963 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17459 res=0 19:39:19 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:19 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r0, 0x28007d) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000080)={0x1, 0x0, [{0x0, 0x4, 0x0, 0x0, @msi={0x1}}]}) sendfile(r0, r0, 0x0, 0x2008000fffffffe) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r4, r3, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f0000000040)={0xd, 0x9, 0x1, 0x1, 0x3, 0x6, 0x89, 0x1f, 0x1f, 0x7, 0x3f}, 0xb) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = dup3(r10, r9, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$P9_RREAD(r11, &(0x7f0000000300)={0xc2, 0x75, 0x1, {0xb7, "7aea04a91ba5a333ee289a4860b9405f488a139ad30b9f656e08c913263f780c36948d8720fe80af183f875ff32e3d0b18fab806fde88e1a2e29919c7f4656df762097644c6ff5795f966d3b6f89fe05ee9c03d652092948c4d3338f28147555c0414e48dc7f2b6f5551d6321646ef284fd098c5a38c0d2396c30595ccd71ffe2415e295441e103f4f339855df7e1342fdb084bb116aa43420e0454f393f96cd583654c6e6e752046244b9bc02fb5b19e980ee04ab9d28"}}, 0xc2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r13) setsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast1, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e22, 0xffff, 0x4e20, 0x7, 0x2, 0x0, 0x20, 0x2c, 0x0, r13}, {0xf47, 0x8001, 0x5, 0x3, 0x4, 0x2, 0x1, 0x10001}, {0x7, 0x8, 0xe4a, 0x1}, 0x8a0, 0x0, 0x0, 0x0, 0x2, 0x3}, {{@in6=@ipv4={[], [], @broadcast}, 0x4d3, 0x33}, 0x2, @in6=@mcast1, 0x3500, 0x4, 0x0, 0x7, 0x2, 0xc64c}}, 0xe8) 19:39:19 executing program 2: r0 = socket(0x18, 0x10000001, 0x0) getsockopt(r0, 0x6, 0x0, 0x0, 0x0) 19:39:19 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000001b) 19:39:19 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x48, 0x0) 19:39:19 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x6, 0xd66, 0x33}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r2, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x5, &(0x7f00000000c0)=[{0x4, 0x9, 0x6, 0x1000}, {0xbc1, 0x8, 0x1f, 0xdd1f}, {0x1, 0x0, 0xd, 0x194b}, {0x7, 0x2, 0x3, 0x8}, {0x6, 0x0, 0x40, 0x2}]}, 0x10) prctl$PR_GET_FP_MODE(0x2e) 19:39:19 executing program 2: 19:39:19 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x49, 0x0) [ 788.370654][T32022] attempt to access beyond end of device [ 788.376718][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 788.382564][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:39:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)=""/34, &(0x7f00000000c0)=0x22) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:19 executing program 2: [ 788.440138][T32022] loop0: rw=2049, want=130, limit=112 [ 788.459458][T32022] Buffer I/O error on dev loop0, logical block 129, lost async page write 19:39:19 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3f, 0x101100) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000100)) syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r3, 0x28007d) sendfile(r3, r3, 0x0, 0x2008000fffffffe) [ 788.539440][T32022] attempt to access beyond end of device [ 788.612629][T32022] loop0: rw=2049, want=131, limit=112 19:39:19 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x4a, 0x0) [ 788.688958][T32022] Buffer I/O error on dev loop0, logical block 130, lost async page write [ 788.798097][T32022] attempt to access beyond end of device [ 788.880698][T32022] loop0: rw=2049, want=132, limit=112 [ 788.928556][T32022] Buffer I/O error on dev loop0, logical block 131, lost async page write [ 788.996926][T32022] attempt to access beyond end of device [ 789.011886][T32022] loop0: rw=2049, want=133, limit=112 [ 789.038815][T32022] Buffer I/O error on dev loop0, logical block 132, lost async page write [ 789.062752][T32022] attempt to access beyond end of device [ 789.104462][T32022] loop0: rw=2049, want=142, limit=112 [ 789.115984][T32022] Buffer I/O error on dev loop0, logical block 141, lost async page write [ 789.156549][T32022] attempt to access beyond end of device [ 789.169881][T32022] loop0: rw=2049, want=143, limit=112 [ 789.175325][T32022] Buffer I/O error on dev loop0, logical block 142, lost async page write [ 789.185349][T32022] attempt to access beyond end of device [ 789.191539][T32022] loop0: rw=2049, want=144, limit=112 [ 789.197540][T32022] Buffer I/O error on dev loop0, logical block 143, lost async page write [ 789.206094][T32022] attempt to access beyond end of device [ 789.212433][T32022] loop0: rw=2049, want=145, limit=112 [ 789.221984][T32022] Buffer I/O error on dev loop0, logical block 144, lost async page write 19:39:20 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:20 executing program 2: 19:39:20 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x7) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:20 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x4b, 0x0) 19:39:20 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:39:20 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000001c) 19:39:20 executing program 2: [ 789.452625][T32085] attempt to access beyond end of device 19:39:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, r2, 0xf7e8f6cb5dcde06f, 0x0, 0x0, {0x11}}, 0x14}}, 0x0) 19:39:20 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r1, &(0x7f0000000040)=""/48, 0x57b) getdents64(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x106, 0x6}}, 0x20) prctl$PR_GET_FP_MODE(0x2e) 19:39:20 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x4c, 0x0) [ 789.504010][T32085] loop4: rw=2049, want=130, limit=112 [ 789.537892][T32085] Buffer I/O error on dev loop4, logical block 129, lost async page write 19:39:20 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000001d) [ 789.601782][T32085] attempt to access beyond end of device [ 789.668569][T32085] loop4: rw=2049, want=131, limit=112 [ 789.723029][T32085] Buffer I/O error on dev loop4, logical block 130, lost async page write 19:39:20 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) [ 789.837606][T32085] attempt to access beyond end of device [ 789.906781][T32085] loop4: rw=2049, want=132, limit=112 [ 789.945229][T32085] Buffer I/O error on dev loop4, logical block 131, lost async page write [ 790.020602][T32085] attempt to access beyond end of device [ 790.060157][T32085] loop4: rw=2049, want=133, limit=112 [ 790.088815][T32085] Buffer I/O error on dev loop4, logical block 132, lost async page write [ 790.153145][T32085] attempt to access beyond end of device [ 790.178696][T32085] loop4: rw=2049, want=142, limit=112 [ 790.184475][T32085] Buffer I/O error on dev loop4, logical block 141, lost async page write [ 790.194964][T32085] attempt to access beyond end of device [ 790.235149][T32085] loop4: rw=2049, want=143, limit=112 [ 790.270045][T32085] attempt to access beyond end of device [ 790.276311][T32085] loop4: rw=2049, want=144, limit=112 [ 790.282366][T32085] attempt to access beyond end of device [ 790.289257][T32085] loop4: rw=2049, want=145, limit=112 [ 790.294988][T32085] attempt to access beyond end of device [ 790.300798][T32085] loop4: rw=2049, want=257, limit=112 19:39:21 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x3f00000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:21 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x4d, 0x0) 19:39:21 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video36\x00', 0x2, 0x0) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x4) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000080)) prctl$PR_GET_FP_MODE(0x2e) 19:39:21 executing program 2: socket$inet(0x2, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:21 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000001e) 19:39:21 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r1, &(0x7f0000000040)=""/48, 0x57b) getdents64(r1, 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x5) ftruncate(0xffffffffffffffff, 0xfffffffd) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2008000fffffffe) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000180)=""/240) [ 790.564033][T32137] FAT-fs (loop4): bogus number of reserved sectors [ 790.605708][T32137] FAT-fs (loop4): Can't find a valid FAT filesystem 19:39:21 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x4e, 0x0) [ 791.143488][T32137] FAT-fs (loop4): bogus number of reserved sectors [ 791.205544][T32137] FAT-fs (loop4): Can't find a valid FAT filesystem 19:39:22 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x4f, 0x0) 19:39:22 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000140)="787a764b4c4c5ca7023ff766e549d5817658ee066454657c079d757be088d179da3954ce51b9440bbfcb0502ddf04c0c452024da4ebb271126a1e43817f517682a5bd081ca8bf948eda9701c465a988d840299cb855a0e47f3c87c53eb39be66487f996815897ac81df644128ca9a1ee26b59e569fef9ceaf54b5588075e73b5aee71750e574812a1f2c90dd0717ee8da612f15e5cc87fb4a02b6b6f9665ee23deea70338f99c71eed297a47293aaeccae6f30b6b6199411520745f8582ceb2a37b8f2525fe11cc5df0481cb42763321194e233e1561ddf4ceee58c9d511745deca2ff2f5cd2cda6ddb1f2b4845dc1903e699dda23a1d064027bf505a51ae6cb525e9c408d6d76e3d2842be75bac6bbcf7c0e0fe511b6ce5f7c66ea584ca2f2b877536b3e1ece99f607e915cea8315e648d3af9a28652fc9e392bde85a22962b06616b8f8cf2e0039901fed13fe7db2a768e45976fe3e013188bce0c5bddc89cd5bd1903d743135732d1ebd581b5cd40b169c7c5514960221eedb58b1db294a8339f97ff3b289b2da65fb558b643c406422db944ce9197b5d69d742662f77ed2e199e113375191cd7e4b00ece1e94d6ee93b2dceda649219d1246df126073b100a755dea2b4f94ead275d00f07537ac0be15a5a07b6e7383609c494416a6a5c71abdc9f1faeb93f65745f7bbc6e3f792ae6402e399bd6b05356afc282c9b68bba654a2fcafe6a3812c6f726d14b0da831b768b7e8d1857917b84b2da966f0ea750d91409600832ec6e315a06a94cb45f1bf412d523b2a2b08750b1135261bb06f0e80e2e2a5ac6fe635593bcfd94f040c4021cc22b92a2e5516986909a543053a4ecd992e4cc8ae2520ff1b356305f3ff5c4c47e573dc01bf5a74dcb5d532fa7790538197e96551fee24ef927c6abed9c8587ae5ba623ac1ce8b97cd4eceacee6113af84cfc8da845e46baba81fa8403d57b64666e46988595fb9eec25a05095ed83a44257542cb00f1637fa9ac8f561c6a9ccfcdac839893627fed76e7a0929a7d5658b14fd9893b0f07a515b04334bda0c1b26b97a9f3422c2b48e20b407d67d1f98917d61dc592fb0b22562da68162ad60a591644f7f5887267ca99ffda123c0ec9ea60aadd3795fd4ff551ca9128f57317296b3dfd00dac7fa30181eaaa0021a246ea7f0587f627905357013f2f9708dc331d0fbbec97a585b39d6e45f439f6143aa30a276756a7c50e23d0610281485eb2bae50b181a8c0b4767e855ce6b42b77a56b40dc21998604384f723a777b28a0607eae5f39b1ab0c4ab51295c53b33e706d89b66d3c3cd5cd7b429f9227ca7aa1f67afdbf2102c52159849975ac0ef7e3caa829eca5781d020a2f3e001ffb549f68cb8774b9dc5a254ac2f7028015da8072575f5e0e8eb80b51b32804c56601a331dacb26e302416dc48dad715e5bb2053784b481e7f23ae96776e23f111aaee72f50f7bae7e9da2d92d9eeb738c88c136a8aa2ec96a59826e1e14bf9827e2ae4458d42e3dd4df42659bf692abe5bf641214fe345445d282c1140fb1580504febe2c13f68eea5ea131d0d9ce984e128a7318737ceb39edc56fe9b1687bba2ae0d0c28733f2f91d57e7514cad6101298e4b34e03d20b303c75ec232e577dac7019b580df163724a9956990b792a608a57cbba44adc28e45670adea6535ac858f612987b81b73c495ef72be57d9e0f563a8eebf2922e0102e0a846f8888c1e846ed5796a9d9372a44d2e73d19b590737cec78ce1d765708c571ebf6b0938817b43626a5f37c46c80b9ce83c820e25f05e4e9fcf73111b5eade97d7cdddac904a218e9910d0de1a1d0fd436c7041175b6ed45c722bf8ac4b5973da12200b11c58849bfee23465f16931f0e9283d676e8c6dc242f167de2e4f309e6acf426cb701e61e8cb4325617fa60a2761ce62e789d957b1f086d263f9d83040c39f0f96f596ba0b70f68055ea0b75f6fc3c3a5898315407ba0bfc8f04912a8b1e274a3d41852fa8831e118e7ad34df7c6cd3e792fe35a88bb08d53dd77800a698b05e9b823bc27c6790e271bea7e3eee3ee9f2bc0c0326b50ef0ec348c2b9bfd3b0d9223fa82e9df9d733befb6785e2ea2de3db8952ad916558b371976dc9ca1ad491682a8984c76ec1a89117cd70d315431446c68811bfed032fa91c9576ef87ceb9d890a254c99d8e9413e070077e16f279e9b0f86cb1038db275fea3eb1c716c903c6beac79fd3e6d5d4f670a446c114b010ec460aa10f3c21d50721e4d23697494c888c08a6ff5609802452b797941e42728d7545e69d5d3b179c691d810990df8d966108b8b9bb6ebc3e176b0a3f7ac7d813090144ae6d9d35ee00fd6732e5cea8738c86e14a9de93a832aeae9e438e5a63392a67f8bd8627ea696e48ef2ec5d9ec90bc62bb823f78b17fa951e3372354fc4296d49b43644714e15967f057b9a41d9cddc5aee801e9098b737de7ab9c0ebbb245b6c91cbe263fb7143b911319b904b93182e708b9fe82b3cc75a71ad8a9a1d973529123afa9cf7987b5b385aff99d627a1a967f886e44efc08253761afaf4c499103e2c06eb431eb0466f6afc46230ae5ff36aecb4dccad19b1836270d13a9586395bd5a4deeaa785c9af754acc7d5227ca0948b72e9d0a41a215444bd49aad72bc81a0061583e1dd034657ee75724a66ee6f3ab3edcf899ac7a014ab83aec7abd7ad4a257ba15b1e18d3a3a8c9d606cc8ef67e4bcb3c8fd1f8feb096ca77f4fa0a5f7c870ce2d8d1197de1b0465b4957b61b2b149e224b0ce464d65d3d76810cdc6a29a87e153584b58ad33192ae68e34ee40448c2e8cc40c82bb4fc432732dd58666db1f1321c3425605c4f71260eaccee8ab34a6d4739691a765fbabb83a62bc33755b977502bd3501ac0490cd5d013acba04bcb934db776f39d776b05a0882f29866bbdfb6f8bbebe60093ef477ad78aeb268f6a2bb7ddee84ea7b5dc4de3fb55c2e6e5c3a949ba5fcc79f279d3e1fc25755eb55ac1b5b71ee0bab634fe6d269b3c4249f7f578391e00e1d5debff90c956be1441c8358be736df58a84f81577264a6213d80d3a62de691871415b41a9151ba775e2ab9f8b2a1fa4b78e36b0dd82b89b9c3e5bdcf46273455e53387f6900bf1489520e514a5b6209d91db0a8c18cefdd8e64b3231d7e72ce37a4860d977721146c608ce627ac3750b2c33e7c2d34bed7a7a3f8a3b4f7879f837bf0a0f20144015924e1cad269efb6b2ab5175a48b6fd21f1042bc86bf6d3ee73c759c1e3f72ed0d161f53a06d250101d364329c7e30e760acecb5a7cdad429407e26536182a7075496fed72695b6fc5f0392e77956dd9a7adb7f70ff10208ac6f0dd0cb040fc06998901ff1d537751bcbed257320d51e2e2ee276693ccdda5718af1904a623ab8639b878cbb039fbd69a77d038389b572463ccc9c8296fb419946af84c25f2982ec0f1bfbdc54e3a5307c8949c7fbaf9911d68754f0074ec2109b600b9253ae739a67ffdf238ae47df0bc6f5010906d4976b2f1298a14ad87b23849e17fb3fdcad17fe7ac43129f57cfe505ebbe19d9db6c77ea4baca550026b88fcd72ac7f8a143674f1a1658d52167876fbff6e8950e432f5fa48b41a3512fc020791d09f0df46a1c27205c1dabb56948520747e8f103439bd4de749fb7af69b6b216a0c7f3d02cedb5e05bcaf069c7e53bcca4ca1ba2917d944ecfb8cc96d39c081622ca13ad1a44499e75ecaec0e7d1ca03405fa6366c56c5209ed9c84378cd27f1136ca0b27be6586a06b439e0f7a1df428b12e0a6f6c476362cb977f04d47f07feaa192f9e0e1abb216d025906778664d0e0cd75bd80aac1e8a3f40b326e9c5ba12de705452d220932fbb2b212077dc9cf66783df2e1eb91cf31a84259e05d28a6deb4bf11bc4ee850597d45d7439fbc4625d53b4ba5261582d499b37d740f974d789137f62670aceda6f0c8f5d696c4f2b481bc86f13695315aaeca64ff8dffbbf8213a2f3844056abbdf352c2a4c49480ad2d71a78e39a6922a544f3b76dfca295c5551902ac28115c5527bede6e4e7d5786e96c9d0a1ac68fb4d6b5a67d73c10a5233f845c50fe3d866b77e749419386f5ea23f0d7ca080cb3d3ea3684f009762e6dbd55c0f733459fdb9ba7ab69a622fbcc4d9e318e2617494940c25dd7f86cfb872916e337e0929c7e68297bbf86ecc3483fb1d7f19cb51e7d949d37436a5dce756febf7fc8156ff5a0ca04b5ce58f310c9e37c93b5c610a1243d1397b83bfa1eebd97a6ea6956eef11e9d6f3d0b26c410afbee58c17f5bab069c76c8521b6fa8c14a6791027a6689ca2ff6cdd792ed01b31e8d7b60a43c69116455e23928a1381c2476d06a2025c89f86c44f9e902941a7ed2051ce2a0833916d660bcbfd35d5a457022526bcf88a7529f9a31c167c7121cd035e48cd716ec0b0aba5990675f8ca50bba72073aba11c6e1556746c6618a55357fa504187298677aefdb113393ea554017f72726b7683d33888c37f26731b0582a9e6bd2fd4e45525ac20a6d15ccf93b5411eaf008b21026fe297cc2889e19a7ab3206995e3252043292e151ff706383fa76668963df6565673b84c90405e1c6b1179a5b1e43d3d9c83d705230e387858f3442119aea0ae5b17c0695a048e4820edd1723cdde3f668eee27acb8bef0916997a3e81a4a18e12dba942d8e56641e52989a66e71cc38cc426ef579e256e04086be6c66ee8b28d22fa19fa0ef2afe10189f9bc868228fd3fce66d54e863542c08b227a75e0ad4fd2251e1d27111597d27a80b56bbf7f93990e094a7b467584da03befce3a54974770a84d88328fcb9750e87b1266060bec15027c8d9047dda75d550c20bc55b0b3f835bbf610591e479bd8a527a06a4b31252b59447b9c2da1bacb43124783c2b36429782dcac95c9dd0179e53e730d78fd3a3a22e5c82376f7a96f8c04d6199b45c518d73b22603a4e0383195d4e15e95571b1b237c25aa1bde55d3a36b9eb7f436e5f6c1e7d82b813b64c8b5adbad67bda9e9021dca5ec8b9ee6fb4a13608bb2515daebf5f76fc882064dc265aee74f25971762a3fe425b1ad3ee9ac1f4bd0ee8aab621633d5c374065ccf0d8b2b9eb09a5b9bbe8cb8956cc6adfe8aea420973b4bf42be5fd441acfd781dc2adea719d5f3dc19a93bb78fa7f921e9520ebfeb70123cda66ad2f4c3ae547858dfaeba7970995975945706abf1710e33a1fcda5b7ab53bbe357d683f65876d3fb229cbbc8fe57b81aa676b436e58d13f9cda63ee5d3ba7da7648af7bfa883ca1d2f83f784c6a9f70f81b74f3be43b34f7045562df43009bac3bfea21bfbc2e1256b51087657f9acc19163783276293a829a819e758d6319e4e71b854029b85a897b0c45414ddc743917b8d6cafea6543e6b01ab91396b71a136710afac087cee6f33a3a4d0767d95b587b693fe88fb0a2ca144f8aa9611c6885c4f473b52f0ddd95ce864c59fce604ebc2ec6c827667dae3976a67103b5a03cd4d9733e48dadc7ed0aaf8562f8ace9d68eaeb273bf9b2643c0d5d469206a700e590a2841600905159a83116069dbffd4b137b820abb56d3f870da1b104a389092671f3b9d49666621c0c731e80a142199a970f18d2ebb4a8716ee1e71c7eca303e482eb79bf9d27960404dee1e36c31ce864fb7ea4677066a4fa02099f2c1f0c3b2c5ec295629557c217b3070cdaa02a1573786cbecda68077908cd2165bb25375dc36bcc8a341274e93f12b21abd2a6c23631f45addd2c5a7", 0x1000, 0x80}, {&(0x7f0000001140)="d844e3e4c84be3ffe6cc5b513ac4ad68b36a4d8ca5008f800066dea3fcbc92ca6cc202ecffb8b46ac03b5c98dec22781d9d0f065c7c81411f5abc61b6487a4d6a2b80ed042884b54145112582462950786a2982fe3cfa830c55f4eeda4599e11b40036254a0e92e66decccc469b26974dd17db21fec324832ec782cd185c0cf19c84118467272b91b35b6cec6f1360f3dcd3a1823a86", 0x96, 0x5}, {&(0x7f0000001200)="86346a6e90f5fdca5cc24661be00c5b982bfe54150a0ed089164d15289c884e3f268224a420432615b0d3b0497a0f9718f76fb436ea6d08162fd7ac206c3f03176ae0cccee40b9ef433c3f8fe38b31012807acc2c4cfc270e8663367aba8c80f5c9e81deb5bf770d56bd2b0831cfdf3ad81e1c7a1479dae91daec343e767088d3866c864754b72f7f60905d7fa139f345f35c54096fd858780562af7245541", 0x9f, 0xc99}], 0x1382008, &(0x7f0000001340)='\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:22 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000021) [ 791.302126][ T26] kauditd_printk_skb: 22 callbacks suppressed [ 791.302139][ T26] audit: type=1800 audit(1570909162.382:418): pid=32148 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17498 res=0 19:39:22 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r2, &(0x7f0000000040)=""/48, 0x57b) getdents64(r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendfile(r1, r1, 0x0, 0x2008000fffffffe) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x227, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r4, r3, r4}, &(0x7f0000001b40)=""/250, 0xfa, &(0x7f0000000580)={&(0x7f0000000080)={'xxhash64-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) keyctl$invalidate(0x15, r3) 19:39:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x6c060000) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000100)={'nat\x00', 0xc8, "4b54802cd539245cdde2f97ad078c26a206b14380b1490150b1591371e6ab41771b2743a3ebb4d3b25d3307f3cce2ecac480520fe649aeef1f41afaffd4629200bf0f6a4f6792fe6da3be0ae2a79cf0c54bcb5bcec410acbee43399bce7cb7900c416f954d41c5fda87106e37300deef8eedc77c043e1c69bcf40d6fea3556f4281e15aceb4f0ea4678fd7f0ee4e3dc156faabfcec3be9e47e75b8ae7f126d1827b19e3d9c467bfab2e6ae34fa3e8b4a701d4780a28141f4030efa731e2105b6e66390033c38d5addd71a6f5"}, &(0x7f0000000200)=0xf0) [ 791.537851][ T26] audit: type=1804 audit(1570909162.382:419): pid=32141 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/626/file0/file0" dev="sda1" ino=17498 res=1 [ 791.703693][ T26] audit: type=1800 audit(1570909162.732:420): pid=32186 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17491 res=0 [ 791.736759][ C1] net_ratelimit: 20 callbacks suppressed [ 791.736766][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 791.748297][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 791.820882][ T26] audit: type=1800 audit(1570909162.842:421): pid=32193 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17503 res=0 19:39:22 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x6400000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:22 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x50, 0x0) [ 791.882017][T32194] IPVS: ftp: loaded support on port[0] = 21 19:39:23 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x51, 0x0) [ 792.171469][ T26] audit: type=1804 audit(1570909163.252:422): pid=32186 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/627/file0" dev="sda1" ino=17491 res=1 19:39:23 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000022) [ 792.320168][ T26] audit: type=1804 audit(1570909163.292:424): pid=32213 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/627/file0" dev="sda1" ino=17491 res=1 [ 792.354834][T32197] IPVS: ftp: loaded support on port[0] = 21 19:39:23 executing program 5: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="784dd9df329fe7a0ce50e53d4f15cc89a462931d0750", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={r0, 0x6}, &(0x7f0000000180)=0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r2, &(0x7f0000000040)=""/48, 0x57b) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/mls\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x58, r4, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8, 0x1, r5}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r6, &(0x7f0000000040)=""/48, 0x57b) getdents64(r6, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@empty, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000880)={'vcan0\x00'}) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="640000002800210400"/20, @ANYRES32=r9, @ANYBLOB="07000000ffff0c0001006367726f7570000034000200300001002c0000000000080001006970740004000200180006002b0aad99fce400"/76], 0x64}}, 0x0) r10 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r10, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) recvmmsg(r10, &(0x7f0000001840)=[{{&(0x7f0000000980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000a00)=""/97, 0x61}], 0x1, &(0x7f0000000ac0)=""/42, 0x2a}, 0x5}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000b00)=""/33, 0x21}], 0x1}}, {{&(0x7f0000000b80)=@can, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000c00)=""/196, 0xc4}, {&(0x7f0000000d00)=""/119, 0x77}, {&(0x7f0000000d80)=""/124, 0x7c}, {&(0x7f0000000e00)=""/102, 0x66}], 0x4, &(0x7f0000000ec0)=""/174, 0xae}, 0x2}, {{&(0x7f0000000f80)=@alg, 0x80, &(0x7f0000001540)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f00000010c0)=""/226, 0xe2}, {&(0x7f00000011c0)=""/217, 0xd9}, {&(0x7f00000012c0)=""/59, 0x3b}, {&(0x7f0000001300)=""/85, 0x55}, {&(0x7f0000001380)=""/130, 0x82}, {&(0x7f0000001440)=""/8, 0x8}, {&(0x7f0000001480)=""/175, 0xaf}], 0x8, &(0x7f00000015c0)=""/138, 0x8a}, 0x7}, {{&(0x7f0000001680)=@x25, 0x80, &(0x7f0000001800)=[{&(0x7f0000001700)=""/25, 0x19}, {&(0x7f0000001740)=""/152, 0x98}], 0x2}, 0x4}], 0x5, 0x393a84a558d3f5b0, &(0x7f0000001980)) r11 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = dup3(r12, r11, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) getpeername$packet(r13, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000001b00)={@dev}, &(0x7f0000001b40)=0x14) 19:39:23 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x0, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x4, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000100)='map_files\x00') getdents(r2, &(0x7f0000000040)=""/48, 0x57b) getdents64(r2, 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000300)={"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"}) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000040)=0xad) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x5000000, 0x11, 0xffffffffffffffff, 0x8000000) fchdir(r0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r4, 0x28007d) sendfile(r4, r4, 0x0, 0x2008000fffffffe) socket$inet6(0xa, 0x3, 0x7f) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r5, &(0x7f0000000040)=""/48, 0x57b) getdents64(r5, 0x0, 0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f00000001c0)=ANY=[@ANYBLOB='\b'], 0x1) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000000200)={0x2, 0x4e21, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x66, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000180)={r9, 0x0, 0xc8c}, 0x8) [ 792.460767][ T26] audit: type=1804 audit(1570909163.302:425): pid=32196 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/941/file0/file0" dev="sda1" ino=17503 res=1 [ 792.536713][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 792.542538][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 792.548381][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 792.554149][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:39:23 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x52, 0x0) [ 792.597650][T32230] netlink: 'syz-executor.5': attribute type 3 has an invalid length. [ 792.618705][ T26] audit: type=1800 audit(1570909163.292:423): pid=32186 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=17491 res=0 [ 792.646406][ T26] audit: type=1800 audit(1570909163.302:426): pid=32213 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17491 res=0 [ 792.646796][T32233] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. [ 792.670866][ T26] audit: type=1800 audit(1570909163.372:427): pid=32193 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=17503 res=0 [ 792.766474][T32234] FAT-fs (loop4): bogus number of reserved sectors [ 792.776738][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 792.782561][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 792.821290][T32234] FAT-fs (loop4): Can't find a valid FAT filesystem 19:39:24 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x53, 0x0) 19:39:24 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000023) 19:39:24 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x9401000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:24 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x54, 0x0) [ 793.196598][T32234] FAT-fs (loop4): bogus number of reserved sectors [ 793.249044][T32234] FAT-fs (loop4): Can't find a valid FAT filesystem [ 793.320848][T32230] netlink: 'syz-executor.5': attribute type 3 has an invalid length. [ 793.351213][T32233] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.5'. [ 793.416725][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 793.422567][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:26 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe(&(0x7f0000004b80)={0xffffffffffffffff}) getsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0x0) 19:39:26 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000024) 19:39:26 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000}, 0x0, 0x0, 0x0, 0x0, 0x718}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000080)=0x1) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:26 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) r2 = socket$inet(0x2, 0x4, 0x2) accept4$inet(r2, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x1000) 19:39:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x55, 0x0) 19:39:26 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0xfefdffff00000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x56, 0x0) 19:39:26 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/48, 0x57b) getdents64(r0, 0x0, 0x0) ioctl$USBDEVFS_DISCARDURB(r0, 0x550b, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:27 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000025) 19:39:27 executing program 2: bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x1000007ffff000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x2, 0x6, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}]}, 0x18}}, 0x0) write$binfmt_aout(r2, &(0x7f00000003c0)={{0x108, 0x0, 0x5d, 0x9b, 0x3c7, 0x0, 0x9a, 0x6d}, "", [[], [], [], [], [], []]}, 0x620) getsockopt$sock_buf(r1, 0x1, 0x3d, 0x0, &(0x7f0000000300)) 19:39:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x57, 0x0) 19:39:27 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:27 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) capset(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) getsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, 0x0) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x91) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:39:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x58, 0x0) 19:39:27 executing program 2: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000002600110500"/20, @ANYRES32=0x0, @ANYBLOB="01000000000000000000000004000a00"], 0x28}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180), 0x3a36d51, 0x0) 19:39:27 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0xfeffffff00000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 796.468274][ T26] kauditd_printk_skb: 20 callbacks suppressed [ 796.468287][ T26] audit: type=1800 audit(1570909167.552:448): pid=32352 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17513 res=0 [ 796.575927][ T26] audit: type=1804 audit(1570909167.652:449): pid=32339 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/631/file0/file0" dev="sda1" ino=17506 res=1 19:39:27 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x1003e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8941, &(0x7f0000000240)=0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e62", 0x0}, 0x40) 19:39:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x59, 0x0) 19:39:27 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000026) 19:39:27 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(0x0, 0x45, 0x0) ioctl$KDDISABIO(r0, 0x4b37) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r0, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r1, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KDENABIO(r6, 0x4b36) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r7) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000080)={0x81}, 0x1) ioprio_get$uid(0x7, r7) [ 796.701517][ T26] audit: type=1800 audit(1570909167.692:450): pid=32335 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=17506 res=0 [ 796.746866][ T26] audit: type=1800 audit(1570909167.692:451): pid=32339 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17506 res=0 [ 796.936739][ C1] net_ratelimit: 20 callbacks suppressed [ 796.936748][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 796.948271][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000080)) preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:28 executing program 2: socket$inet(0x2, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) timer_create(0x0, 0x0, &(0x7f00000003c0)) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x5a, 0x0) [ 797.071916][ T26] audit: type=1800 audit(1570909168.152:452): pid=32382 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17509 res=0 19:39:28 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000027) [ 797.262784][ T26] audit: type=1804 audit(1570909168.342:453): pid=32399 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/944/file0" dev="sda1" ino=17513 res=1 19:39:28 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x9681277c89221ed5, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x40, 0x0) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:39:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x5b, 0x0) 19:39:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x10, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r1, &(0x7f0000000040)=""/48, 0x57b) getdents64(r1, 0x0, 0x0) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f00000000c0)={0x4001, 0x9, 0x9}) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000080), 0x4) [ 797.576751][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 797.582563][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 797.588438][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 797.594209][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:28 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000028) 19:39:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x5c, 0x0) 19:39:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$x25(0xffffffffffffffff, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') recvfrom$ax25(r0, &(0x7f0000000140)=""/209, 0xd1, 0x4666d05c75ba3edf, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:28 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 797.848042][ T26] audit: type=1800 audit(1570909168.932:454): pid=32432 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17500 res=0 [ 797.977250][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 797.983475][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:29 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) ftruncate(0xffffffffffffffff, 0x28007d) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x8c482) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r1, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$USBDEVFS_CLAIM_PORT(r5, 0x80045518, &(0x7f0000000240)=0x2) ioctl$VHOST_VSOCK_SET_GUEST_CID(r5, 0x4008af60, &(0x7f0000000200)) sendfile(0xffffffffffffffff, r2, 0x0, 0x4000002f000000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040)={0x3, 0x2, 0x100000, 0x7f}, 0x14) [ 798.020988][ T26] audit: type=1800 audit(1570909169.102:455): pid=32444 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17537 res=0 19:39:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r1, &(0x7f0000000040)=""/48, 0x57b) getdents64(r1, 0x0, 0x0) prctl$PR_GET_FP_MODE(0x2e) open$dir(&(0x7f00000000c0)='./file0\x00', 0x2000, 0x1) 19:39:29 executing program 2: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @loopback, @remote}, &(0x7f00000005c0)=0xc) socket$nl_route(0x10, 0x3, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x88bd8d4457921674, &(0x7f0000000a00)={@loopback}, &(0x7f0000000a40)=0x14) r2 = socket$inet6(0xa, 0x0, 0x3) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000ac0)={@local}, &(0x7f0000000b00)=0x14) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xb1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, 0x0) 19:39:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x5d, 0x0) [ 798.379244][ T26] audit: type=1800 audit(1570909169.462:457): pid=32444 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=17537 res=0 19:39:29 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000029) 19:39:29 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) sendfile(r1, r1, 0x0, 0x2008000fffffffe) [ 798.508375][ T26] audit: type=1804 audit(1570909169.452:456): pid=32439 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/634/file0/file0" dev="sda1" ino=17537 res=1 19:39:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x5e, 0x0) 19:39:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r4, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) fstat(r4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={r1, r3, r5}, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r6, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:29 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 798.776755][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 798.782591][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:39:30 executing program 2: r0 = socket(0xa, 0x3, 0x87) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @rand_addr="ffba4195a8914923d5b3b6e33004d368"}, 0x1c) sendmmsg$alg(r0, &(0x7f00000000c0)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="7277fdffffff", 0x6}], 0x1}], 0x1, 0x0) 19:39:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000000040)="eb560b00000000732e6661740002000100021200a97d0c4bbcc1b5289f223a472caf7ad4b3", 0x25}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = semget(0x2, 0x0, 0x300) semop(r1, &(0x7f0000000100)=[{0x3, 0x1}], 0x1) fchdir(r0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r2, 0x28007d) sendfile(r2, r2, 0x0, 0x2008000fffffffe) 19:39:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x5f, 0x0) 19:39:30 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x30100, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000001140)={0x800, 0x1, 0x4, 0x1, 0x2, 0x0, 0xfffffffc, 0x80, 0xa6, 0x7, 0x1, 0x8, 0xfd15, 0xfffe, &(0x7f0000000140)=""/4096, 0x7fff, 0x4, 0xffffffff9b52c45b}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r4, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000080)={r4}) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r5, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:30 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000002a) 19:39:30 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) pipe(0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@local, 0x4e24, 0x12a, 0x4e24, 0x0, 0x0, 0x20, 0x0, 0x4}, {0x0, 0x0, 0xcf1c, 0x7, 0x3, 0x9, 0x101, 0x28}, {0x5, 0x0, 0x7}, 0x1, 0x6e6bb6, 0x2, 0x1}, {{@in6=@local, 0x0, 0xff}, 0x2, @in6=@ipv4={[], [], @loopback}, 0x3500, 0x0, 0x3, 0x3}}, 0xe8) sendto$inet(r0, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') syz_extract_tcp_res$synack(0x0, 0x1, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) [ 799.404345][T32530] FAT-fs (loop4): bogus number of FAT structure [ 799.490841][T32530] FAT-fs (loop4): Can't find a valid FAT filesystem 19:39:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x60, 0x0) [ 799.631006][T32548] attempt to access beyond end of device 19:39:30 executing program 2: shmctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/222) 19:39:30 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r1, &(0x7f0000000040)=""/48, 0x57b) getdents64(r1, 0x0, 0x0) read$char_usb(r1, &(0x7f0000000080)=""/82, 0x52) prctl$PR_GET_FP_MODE(0x2e) [ 799.773459][T32548] loop0: rw=2049, want=130, limit=112 19:39:30 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 799.833397][T32548] buffer_io_error: 3 callbacks suppressed [ 799.833408][T32548] Buffer I/O error on dev loop0, logical block 129, lost async page write [ 799.892598][T32530] FAT-fs (loop4): bogus number of FAT structure 19:39:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'exec ', '&\t&'}, 0x8) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000040)={'exec ', '&\t&'}, 0x8) [ 799.955199][T32530] FAT-fs (loop4): Can't find a valid FAT filesystem [ 799.986860][T32548] attempt to access beyond end of device [ 800.000571][T32548] loop0: rw=2049, want=131, limit=112 19:39:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x61, 0x0) [ 800.030831][T32548] Buffer I/O error on dev loop0, logical block 130, lost async page write [ 800.071112][T32548] attempt to access beyond end of device 19:39:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x400, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/48, 0x57b) getdents64(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r1, 0x1c}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x101000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) [ 800.129098][T32548] loop0: rw=2049, want=132, limit=112 19:39:31 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="640000002800210400"/20, @ANYRES32=r2, @ANYBLOB="07000000fffffffffffff0000c0001006367726f7570000034000200300001002c0000000000080001006970740004000200180006002b0aad99fce400"/76], 0x64}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@mcast2, 0x0, r2}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x8000, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r3, 0x4008ae48, &(0x7f0000000080)=0xf000) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r5, 0x28007d) 19:39:31 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) [ 800.196763][T32548] Buffer I/O error on dev loop0, logical block 131, lost async page write [ 800.281609][T32548] attempt to access beyond end of device [ 800.357079][T32548] loop0: rw=2049, want=133, limit=112 [ 800.362495][T32548] Buffer I/O error on dev loop0, logical block 132, lost async page write 19:39:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x62, 0x0) [ 800.546886][T32548] attempt to access beyond end of device [ 800.599677][T32548] loop0: rw=2049, want=142, limit=112 [ 800.644898][T32548] Buffer I/O error on dev loop0, logical block 141, lost async page write [ 800.716487][T32548] attempt to access beyond end of device [ 800.761293][T32548] loop0: rw=2049, want=143, limit=112 [ 800.791895][T32548] Buffer I/O error on dev loop0, logical block 142, lost async page write [ 800.823468][T32548] attempt to access beyond end of device [ 800.842784][T32548] loop0: rw=2049, want=144, limit=112 [ 800.863834][T32548] Buffer I/O error on dev loop0, logical block 143, lost async page write [ 800.899609][T32548] attempt to access beyond end of device [ 800.905334][T32548] loop0: rw=2049, want=145, limit=112 19:39:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0xffffffffffffff97, 0x2800) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) sendfile(r0, r0, 0x0, 0x1) 19:39:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x63, 0x0) 19:39:32 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000002b) 19:39:32 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000001c0)='./file1\x00', 0xe002, 0x307, &(0x7f0000000200)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x221900, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) close(r4) r5 = socket(0x200000100000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'veth0_to_bond\x00', 0x0}) bind$packet(r5, &(0x7f00000000c0)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f00000001c0)=0x8, 0x4) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r5, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x204}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, r7, 0x1, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8001}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_SECRET={0xc, 0x4, [0xca78, 0x4]}]}, 0x48}}, 0x20044820) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r7, 0x100, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x2800c041}, 0x2000040) fchdir(r0) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r8, 0x28007d) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @empty}, &(0x7f0000000180)=0xc) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000040)={0x79, 0x0, [0x8, 0x7fff, 0xfb06, 0x6]}) sendfile(r8, r8, 0x0, 0x2008000fffffffe) [ 800.912490][T32548] Buffer I/O error on dev loop0, logical block 144, lost async page write 19:39:32 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160-generic\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_matches\x00') sendfile(r3, r4, 0x0, 0x1000007ffff000) 19:39:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x64, 0x0) 19:39:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/48, 0x57b) getdents64(r0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r7, 0x84, 0x5, &(0x7f00000004c0)={r4, @in6={{0xa, 0x4e22, 0x3a, @rand_addr="34b6d75a71e7b6d14b07bd193df36fef", 0x1}}}, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000480)={r4}, 0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r8, &(0x7f0000000400)=[{&(0x7f0000000080)=""/45, 0x2d}, {&(0x7f0000000140)=""/193, 0xc1}, {&(0x7f00000000c0)=""/25, 0x19}, {&(0x7f0000000240)=""/91, 0x5b}, {&(0x7f00000002c0)=""/72, 0x48}, {&(0x7f0000000340)=""/163, 0xa3}], 0x6, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:32 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@uname={'uname', 0x3d, '#%\x00'}}, {@access_any='access=any'}, {@version_L='version=9p2000.L'}, {@cache_mmap='cache=mmap'}, {@privport='privport'}], [{@obj_type={'obj_type'}}, {@obj_type={'obj_type', 0x3d, 'vfat\x00'}}, {@fsname={'fsname', 0x3d, 'posix_acl_access'}}, {@appraise_type='appraise_type=imasig'}]}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='#%\x00', r4}, 0x10) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:39:32 executing program 2: clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000540)=0x2, 0x0, 0x2, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) readv(r1, &(0x7f0000000640)=[{&(0x7f0000000100)=""/53, 0x35}], 0x1) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup3(r2, r1, 0x0) tkill(r0, 0x1000000000015) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) accept$inet(r4, 0x0, 0x0) [ 801.355857][T32664] 9pnet: p9_fd_create_tcp (32664): problem connecting socket to 127.0.0.1 19:39:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x65, 0x0) [ 801.442006][T32668] attempt to access beyond end of device [ 801.498396][T32668] loop4: rw=2049, want=130, limit=112 [ 801.518917][ T26] kauditd_printk_skb: 20 callbacks suppressed [ 801.518933][ T26] audit: type=1804 audit(1570909172.602:478): pid=32647 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/637/file0/file0" dev="sda1" ino=16721 res=1 [ 801.537316][ T26] audit: type=1800 audit(1570909172.622:479): pid=32643 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=16721 res=0 19:39:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) [ 801.593471][T32668] Buffer I/O error on dev loop4, logical block 129, lost async page write 19:39:32 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000002c) [ 801.700181][T32668] attempt to access beyond end of device [ 801.738251][T32668] loop4: rw=2049, want=131, limit=112 19:39:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x66, 0x0) [ 801.758445][ T26] audit: type=1800 audit(1570909172.662:480): pid=32647 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16721 res=0 [ 801.760606][T32668] Buffer I/O error on dev loop4, logical block 130, lost async page write 19:39:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/101, 0x65}, {&(0x7f0000000140)=""/106, 0x6a}, {&(0x7f00000001c0)=""/81, 0x51}, {&(0x7f0000000240)=""/96, 0x60}, {&(0x7f00000002c0)=""/144, 0x90}], 0x5, 0x0) prctl$PR_GET_FP_MODE(0x2e) [ 801.873254][T32668] attempt to access beyond end of device [ 801.885880][T32668] loop4: rw=2049, want=132, limit=112 [ 801.953445][ T26] audit: type=1800 audit(1570909173.032:481): pid=32695 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16913 res=0 [ 802.010978][T32668] attempt to access beyond end of device [ 802.047071][T32668] loop4: rw=2049, want=133, limit=112 19:39:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x67, 0x0) [ 802.056985][T32668] attempt to access beyond end of device [ 802.069507][T32668] loop4: rw=2049, want=142, limit=112 19:39:33 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x64}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:33 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r1, &(0x7f0000000040)=""/48, 0x57b) getdents64(r1, 0x0, 0x0) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000080)={0xfff9, 0x7fff, 0xff08, 0x62, 0x7, 0x27, 0x13, "7d905d632489670a664c189ec687e7408f3b0a29", "5829ad4dc5db4adad907b93f622428cf23b49429"}) prctl$PR_GET_FP_MODE(0x2e) [ 802.114392][T32668] attempt to access beyond end of device [ 802.136732][ C1] net_ratelimit: 20 callbacks suppressed [ 802.136741][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 802.142499][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 802.202175][ T26] audit: type=1804 audit(1570909173.282:482): pid=32695 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/638/file0/file0" dev="sda1" ino=16913 res=1 19:39:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x68, 0x0) [ 802.262475][T32707] 9pnet: p9_fd_create_tcp (32707): problem connecting socket to 127.0.0.1 [ 802.272667][ T26] audit: type=1800 audit(1570909173.332:483): pid=32691 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=16913 res=0 [ 802.317475][T32668] loop4: rw=2049, want=143, limit=112 [ 802.322938][T32668] attempt to access beyond end of device [ 802.395487][ T26] audit: type=1800 audit(1570909173.332:484): pid=32695 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16913 res=0 [ 802.450298][T32668] loop4: rw=2049, want=144, limit=112 19:39:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6gretap={{0xa, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8}]]}}}]}, 0x40}}, 0x0) [ 802.479575][ T26] audit: type=1804 audit(1570909173.492:485): pid=32708 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/951/file0/file0" dev="loop4" ino=75 res=1 [ 802.527991][T32668] attempt to access beyond end of device [ 802.568667][T32668] loop4: rw=2049, want=145, limit=112 [ 802.583369][ T26] audit: type=1800 audit(1570909173.492:486): pid=32708 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="loop4" ino=75 res=0 [ 802.606528][ T26] audit: type=1804 audit(1570909173.492:487): pid=32709 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/951/file0/file0" dev="loop4" ino=75 res=1 [ 802.675709][T32735] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 19:39:33 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self\x00', 0xa2040, 0x0) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000100)='vfat\x00', 0x0, r3) 19:39:33 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000002d) 19:39:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x69, 0x0) 19:39:33 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000080)=@netrom={'nr', 0x0}, 0x10) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 19:39:33 executing program 2: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) [ 802.936745][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 802.942551][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 802.948413][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 802.954185][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:39:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x6a, 0x0) 19:39:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003180)=[{{&(0x7f0000000080)=@ipx, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/172}]}, 0x3f}, {{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x0, &(0x7f0000001640)=[{&(0x7f00000002c0)=""/80}, {&(0x7f0000000340)=""/145}, {&(0x7f0000000400)=""/173}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/4096}, {&(0x7f0000001500)=""/183}, {&(0x7f00000015c0)=""/106}], 0x0, &(0x7f00000016c0)=""/220}, 0x2}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000017c0)=""/144}, {&(0x7f0000001880)=""/148}, {&(0x7f0000001940)=""/17}], 0x0, &(0x7f00000019c0)=""/165, 0x2ae}, 0x1}, {{&(0x7f0000001a80)=@in={0x2, 0x0, @local}, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)=""/235, 0x32}], 0x0, &(0x7f0000001c40)=""/4}, 0xa9b6}, {{&(0x7f0000001c80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000001d00)=""/188}], 0x0, &(0x7f0000001e00)=""/227}, 0x9}, {{0x0, 0x0, &(0x7f00000020c0)=[{&(0x7f0000001f00)=""/205}, {&(0x7f0000002000)=""/177}], 0x0, &(0x7f0000002100)=""/4096}}], 0x40000000000008c, 0x100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:34 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r2 = getegid() r3 = socket$inet(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendmsg(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="240000005a0007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) dup(r3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r4 = geteuid() setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x2, {0x1b04, {0x20, 0x3, 0x8}, 0x0, r4, r2, 0x9309, 0x6, 0x9, 0x20, 0x5, 0x6f, 0x3ff, 0xf97d, 0x5, 0x1, 0xc474, 0xfffffffffffffffc, 0x2, 0x8, 0x7}}, 0xa0) chown(&(0x7f0000000040)='./file0\x00', 0x0, r2) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x4, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x10, 0x0, 0x4}, 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0xfffffffffffffffe}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 803.176724][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 803.182555][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:34 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x194}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:34 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000002e) 19:39:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x6b, 0x0) 19:39:34 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) inotify_init1(0x800) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file1\x00', 0x3, 0x6, &(0x7f0000000540)=[{&(0x7f0000000180)="8d00678ad312c0ae4d6198fdedebf8747c21cf8223908cf4eb1853d2b35bd789ad36e28424a60d8467ecb7e305a027bd02fc843bef6b3a8e7c1954a2dc9ae987357fa147f64a44f95b1499a3dcc3aaca717fae0e4a0855c0c540a0ab0bf43d0ac7686e47e79709128d47a89295af83b4c7647ed1539626c19661501fd08121202e3caaf4b4a41e62502b108ae15f1bed2a294b6313de", 0x96, 0x7fffffff}, {&(0x7f0000000100)="19a313e98801904230a9f90e84f46eee8f95201485a3e3e3b9d672b2e0ff5f6d2f06e72c747f958dd73f38935bd15dc5172c3c40e079f9", 0x37, 0x200}, {&(0x7f0000000240)="ef74446ccce50e0c497b819379f41b104df709671d8f6eb9f40878fc78f74ebe044bd27add5ba766c844f47a104357a4f85da187fa78fd6d50122bd538b8648c4b7a361f54c9cf1199862790", 0x4c, 0x4}, {&(0x7f0000000300)="4caa5f8a38e28789af4eb1bc0b7a6055ecda6ddb39ff3ae9f5a1668a5b68a941b638036e1a2361dab156645b40329311d58655128c192aa0b32ead11c0b3ff7e3132638f7b28d39f90cec0e9ee240e40e1bbfb0f8a64855bcfbe73ffba03c29c5ee37dfab1af1ec1a2bf99a1b93e3265f3fb60fcf3982a07f2f7a476f0f2d52c3f44b3a64fa2c71baf99af95a9cc0cef3eb50850183adbcd1e449d49ea9e0c179fa1f37e6cd6f29aa7ac2e", 0xab, 0x1}, {&(0x7f00000003c0)="336babe509c64638f1b1b5c066989cd4985b8cb38fa8dd2d38780b1c8bf6c20ab7b6c97c8f9ca3df78995ea5d0ac7f860f1f7b633f697251a51cf1b77cd8119a16507eae310f0cc22b06d3fb9c79e133f36d09b3c2aa6a92fa9a8a8bf70293c0cc78f9b1ffd7b8c769f8d080eebaa22269da95bfc68c761cdcc521e96910cb894ac31c6784f9d89f425ccfbc536294f917e10677327e736689859b6ee9e20355d97114e2148a82966fe7a7f120927cd026369d067ddafdab585c87ef8364e4552dc1f30dc3b7647e83446b2abde1743e03b5bcb8d8cbb2fdece180b85b44", 0xde, 0x558}, {&(0x7f00000004c0)="48334a70318bc1914c2e11ae9c2cedefc5bf6919dab70b544612e1bc020324880b4a3b63a367a722bc99dee34d27afbd1228cb58d450209d64da8b36ac9d2cd19b2608a1", 0x44, 0x80000001}], 0x50000, &(0x7f0000000600)={[{@acl='acl'}, {@thread_pool={'thread_pool', 0x3d, 0x6}}, {@thread_pool={'thread_pool', 0x3d, 0x4}}, {@subvolid={'subvolid', 0x3d, 0x3}}], [{@obj_user={'obj_user', 0x3d, 'vfat\x00'}}]}) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:39:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x6c, 0x0) [ 803.646588][ T324] attempt to access beyond end of device [ 803.715913][ T324] loop0: rw=2049, want=130, limit=112 [ 803.811940][ T324] attempt to access beyond end of device [ 803.827136][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 803.833157][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 803.844720][ T324] loop0: rw=2049, want=131, limit=112 19:39:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x6d, 0x0) [ 803.901651][ T324] attempt to access beyond end of device [ 803.930246][ T324] loop0: rw=2049, want=132, limit=112 [ 803.999081][ T324] attempt to access beyond end of device [ 804.027054][ T324] loop0: rw=2049, want=133, limit=112 [ 804.047572][ T324] attempt to access beyond end of device 19:39:35 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r1, &(0x7f0000000040)=""/48, 0x57b) getdents64(r1, 0x0, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000180)) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x400000, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000000c0)=0xff, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r3, &(0x7f0000000040)=""/48, 0x57b) getdents64(r3, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f00000001c0)={0x2, 0x1000, 0x80, 'queue0\x00', 0x4}) 19:39:35 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='stat\x00') exit(0x0) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000180)=""/68, 0x44}], 0x1, 0x0) [ 804.086490][ T324] loop0: rw=2049, want=142, limit=112 [ 804.124068][ T324] attempt to access beyond end of device 19:39:35 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x3ff, 0x12600) setsockopt$rose(r1, 0x104, 0x5, &(0x7f0000001b00)=0x3, 0x4) recvmmsg(r0, &(0x7f0000001a00)=[{{&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000180)=""/143, 0x8f}, 0xffffffff}, {{&(0x7f0000000240)=@ax25={{0x3, @default}, [@bcast, @netrom, @netrom, @null, @null, @rose, @null, @bcast]}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/176, 0xb0}, {&(0x7f00000013c0)=""/225, 0xe1}], 0x3, &(0x7f0000001500)=""/98, 0x62}, 0xe4b}, {{&(0x7f0000001580)=@pppoe, 0x80, &(0x7f0000001940)=[{&(0x7f0000001600)=""/194, 0xc2}, {&(0x7f0000001700)=""/115, 0x73}, {&(0x7f0000001780)=""/244, 0xf4}, {&(0x7f0000001880)=""/30, 0x1e}, {&(0x7f00000018c0)=""/114, 0x72}], 0x5, &(0x7f00000019c0)=""/12, 0xc}, 0x5}], 0x3, 0x20000041, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000001ac0)=@req={0x3, 0xffff96e6, 0x7fff, 0xffffff3a}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r4, 0x28007d) sendfile(r4, r4, 0x0, 0x2008000fffffffe) [ 804.215521][ T324] loop0: rw=2049, want=143, limit=112 [ 804.224393][ T324] attempt to access beyond end of device [ 804.235683][ T324] loop0: rw=2049, want=144, limit=112 19:39:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x6e, 0x0) [ 804.277938][ T324] attempt to access beyond end of device [ 804.285474][ T324] loop0: rw=2049, want=145, limit=112 [ 804.315459][ T324] attempt to access beyond end of device 19:39:35 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x2) [ 804.450693][ T324] loop0: rw=2049, want=257, limit=112 19:39:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x6f, 0x0) 19:39:35 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 804.563788][ T374] attempt to access beyond end of device [ 804.646708][ T374] loop4: rw=2049, want=130, limit=112 19:39:35 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000002f) 19:39:35 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket(0x840000000002, 0x3, 0x200000000000ff) r0 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000000)=0x6, 0x4) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) creat(0x0, 0x0) [ 804.713719][ T374] attempt to access beyond end of device [ 804.790309][ T374] loop4: rw=2049, want=131, limit=112 19:39:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x70, 0x0) [ 804.893000][ T374] buffer_io_error: 15 callbacks suppressed [ 804.893012][ T374] Buffer I/O error on dev loop4, logical block 130, lost async page write 19:39:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x3, 0x6) sendmsg(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="24000000120007031dfffd946fa2830012000a0009000000741d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) [ 805.029376][ T399] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 19:39:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x71, 0x0) [ 805.116922][ T374] attempt to access beyond end of device [ 805.124836][ T399] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 805.186972][ T374] loop4: rw=2049, want=132, limit=112 [ 805.268347][ T374] Buffer I/O error on dev loop4, logical block 131, lost async page write 19:39:36 executing program 2: open(0x0, 0x100000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file1\x00'}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x810, 0x0, 0x4, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x1, 0x0, {0x0, 0x0, 0x0, 0x8, 0x5, 0x69}}) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x8002100, &(0x7f0000000a80), &(0x7f0000000700), 0x0, &(0x7f0000000b80)="5d14785ac98407337e2aa90c1bd051ceaa73a808abb0462ee0a6ee088b3b03c6e87c1ab4ce99c5468b245bf100a2e76bf82d2cdb147e6aa72528df6de77c97ac167fff43bcd4fb471f8de466dda217df3f4bed450be95faa56b53f14a75578fe9ca775a38dcff2e17a71c6ca1ad33b7c7f2b77da84cdd98d4809640159e88e61e47fddbad421") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget(0x3, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) geteuid() write(0xffffffffffffffff, 0x0, 0x0) 19:39:36 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000030) [ 805.381604][ T374] attempt to access beyond end of device [ 805.409025][ T374] loop4: rw=2049, want=133, limit=112 [ 805.456825][ T374] Buffer I/O error on dev loop4, logical block 132, lost async page write [ 805.479289][ T374] attempt to access beyond end of device [ 805.504909][ T374] loop4: rw=2049, want=142, limit=112 [ 805.537920][ T374] Buffer I/O error on dev loop4, logical block 141, lost async page write [ 805.584797][ T374] attempt to access beyond end of device [ 805.605036][ T419] IPVS: ftp: loaded support on port[0] = 21 [ 805.607731][ T374] loop4: rw=2049, want=143, limit=112 [ 805.626848][ T374] Buffer I/O error on dev loop4, logical block 142, lost async page write [ 805.656814][ T374] attempt to access beyond end of device [ 805.663143][ T374] loop4: rw=2049, want=144, limit=112 [ 805.672122][ T374] Buffer I/O error on dev loop4, logical block 143, lost async page write [ 805.690967][ T374] attempt to access beyond end of device [ 805.705411][ T374] loop4: rw=2049, want=145, limit=112 [ 805.716832][ T374] Buffer I/O error on dev loop4, logical block 144, lost async page write [ 805.750367][ T374] attempt to access beyond end of device [ 805.769620][ T374] loop4: rw=2049, want=257, limit=112 19:39:36 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:37 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@loopback, 0x1}) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r4, 0x28007d) sendfile(r4, r4, 0x0, 0x2008000fffffffe) 19:39:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x72, 0x0) 19:39:37 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000031) [ 805.901345][ T2798] attempt to access beyond end of device [ 805.911988][ T2798] loop4: rw=1, want=2313, limit=112 [ 805.969717][ T2798] attempt to access beyond end of device [ 805.986022][ T2798] loop4: rw=1, want=4793, limit=112 [ 806.030969][ T419] IPVS: ftp: loaded support on port[0] = 21 [ 806.041662][ T2798] attempt to access beyond end of device [ 806.091351][ T2798] loop4: rw=1, want=5241, limit=112 19:39:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x73, 0x0) 19:39:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x74, 0x0) 19:39:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pause() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000324000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 806.602206][ T26] kauditd_printk_skb: 29 callbacks suppressed [ 806.602218][ T26] audit: type=1800 audit(1570909177.672:517): pid=457 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16596 res=0 [ 806.833284][ T468] mmap: syz-executor.2 (468) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 806.876447][ T26] audit: type=1800 audit(1570909177.742:518): pid=462 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17026 res=0 19:39:38 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000032) 19:39:38 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000040)) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000080)={@remote, @multicast2}, &(0x7f0000000100)=0xc) fchdir(r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) open(&(0x7f0000000200)='./file1\x00', 0x0, 0x108) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000180)=0x3, &(0x7f00000001c0)=0x2) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r4, 0x28007d) sendfile(r4, r4, 0x0, 0x2008000fffffffe) [ 806.991552][ T26] audit: type=1804 audit(1570909177.762:519): pid=465 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/955/file0/file0" dev="sda1" ino=16596 res=1 19:39:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x75, 0x0) [ 807.216483][ T26] audit: type=1800 audit(1570909178.292:520): pid=476 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17026 res=0 19:39:38 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x3f00}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 807.336712][ C1] net_ratelimit: 20 callbacks suppressed [ 807.336719][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 807.348209][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 807.356565][ T26] audit: type=1800 audit(1570909178.412:521): pid=485 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16658 res=0 19:39:38 executing program 2: r0 = msgget(0x0, 0x0) msgsnd(r0, 0x0, 0xfffffffffffffe8d, 0x0) 19:39:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x76, 0x0) [ 807.757494][ T26] audit: type=1800 audit(1570909178.782:522): pid=481 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=17026 res=0 19:39:39 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000033) 19:39:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f00000015c0)={0x8, "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", 0xfffffffffffffde9}, 0x10000005c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in=@empty, @in=@local, 0x4e20, 0x7, 0x4e23, 0xff, 0xa, 0x0, 0xc0}, {0xfffffffffffff001, 0x1000, 0x1, 0x40, 0x101, 0x9, 0xfff, 0x5}, {0x6, 0x7fffffff, 0x5, 0x6}, 0x100}, {{@in=@local}, 0x0, @in6=@remote}}, 0xe8) fadvise64(r0, 0x0, 0x0, 0x4) [ 807.996161][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 808.001990][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 808.007828][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 808.013586][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 808.037412][ T26] audit: type=1804 audit(1570909179.122:523): pid=506 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/956/file0/file0" dev="sda1" ino=16658 res=1 19:39:39 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x77, 0x0) [ 808.235872][ T26] audit: type=1800 audit(1570909179.152:524): pid=485 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=16658 res=0 19:39:39 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)={@rand_addr="fb81e6d43a126a769697b442d269370e", 0x84000036}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x30d340, 0x91) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r1, &(0x7f0000000040)=""/48, 0x57b) getdents64(r1, 0x0, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000440)={0x10001, {{0x2, 0x4e22, @remote}}, 0x1, 0x8, [{{0x2, 0x4e21, @local}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e20, @empty}}, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e21, @empty}}, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @multicast2}}]}, 0x490) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mkdirat$cgroup(r4, &(0x7f0000000380)='syz0\x00', 0x1ff) accept4$unix(r1, &(0x7f0000000200), &(0x7f00000003c0)=0x6e, 0xc13fd64a58b52c21) fchdir(r0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0xaca42, 0x0) r6 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r6, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r6, 0x800c6613, &(0x7f00000001c0)=@v2={0x2, @aes256, 0x4, [], "0e8c98deaf1a5747a1d183f5a5b0fb8b"}) ftruncate(r5, 0x28007d) getsockopt$inet_udp_int(r5, 0x11, 0x0, &(0x7f0000001f00), &(0x7f0000001f40)=0x4) fchmodat(r0, &(0x7f0000000180)='./file0\x00', 0x10) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0xa00202, 0x0) openat$cgroup_ro(r7, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000900)={0x0, 0x0}) process_vm_writev(r8, &(0x7f0000001a40)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000002080)=""/4096, 0x1000}, {&(0x7f0000001940)=""/2, 0x2}, {&(0x7f0000001980)=""/139, 0x8b}], 0x4, &(0x7f0000001e80)=[{&(0x7f0000001a80)=""/173, 0xad}, {&(0x7f0000001b40)=""/248, 0xf8}, {&(0x7f0000001c40)=""/50, 0x32}, {&(0x7f0000001c80)=""/103, 0x67}, {&(0x7f0000001d00)=""/169, 0xa9}, {&(0x7f0000001dc0)=""/145, 0x91}], 0x6, 0x0) getsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000040)=0x6, &(0x7f0000000080)=0x4) [ 808.317605][ T518] attempt to access beyond end of device [ 808.358718][ T518] loop0: rw=2049, want=130, limit=112 [ 808.377020][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 808.383366][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 808.400214][ T518] Buffer I/O error on dev loop0, logical block 129, lost async page write [ 808.403352][ T26] audit: type=1800 audit(1570909179.152:525): pid=506 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16658 res=0 [ 808.498617][ T518] attempt to access beyond end of device 19:39:39 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x78, 0x0) [ 808.593643][ T518] loop0: rw=2049, want=131, limit=112 [ 808.609161][ T530] FAT-fs (loop4): bogus number of reserved sectors [ 808.615972][ T26] audit: type=1800 audit(1570909179.322:526): pid=515 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=79 res=0 [ 808.639149][ T518] Buffer I/O error on dev loop0, logical block 130, lost async page write 19:39:39 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x6400}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 808.697150][ T530] FAT-fs (loop4): Can't find a valid FAT filesystem [ 808.724664][ T518] attempt to access beyond end of device [ 808.756805][ T518] loop0: rw=2049, want=132, limit=112 [ 808.812311][ T530] FAT-fs (loop4): bogus number of reserved sectors [ 808.819508][ T518] Buffer I/O error on dev loop0, logical block 131, lost async page write [ 808.854193][ T530] FAT-fs (loop4): Can't find a valid FAT filesystem 19:39:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x79, 0x0) [ 808.917596][ T518] attempt to access beyond end of device 19:39:40 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r2, &(0x7f0000000040)=""/48, 0x57b) getdents64(r2, 0x0, 0x0) write$P9_RCREATE(r2, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0xa, 0x3, 0x4}, 0x1f}}, 0x18) sendfile(r1, r1, 0x0, 0x2008000fffffffe) [ 808.990444][ T518] loop0: rw=2049, want=133, limit=112 [ 809.071514][ T518] attempt to access beyond end of device [ 809.136220][ T518] loop0: rw=2049, want=142, limit=112 [ 809.169377][ T518] attempt to access beyond end of device [ 809.176714][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 809.182507][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 809.226773][ T518] loop0: rw=2049, want=143, limit=112 [ 809.252500][ T518] attempt to access beyond end of device 19:39:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x7a, 0x0) [ 809.292884][ T518] loop0: rw=2049, want=144, limit=112 [ 809.332027][ T518] attempt to access beyond end of device 19:39:40 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 809.371974][ T518] loop0: rw=2049, want=145, limit=112 19:39:40 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000034) 19:39:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x7b, 0x0) 19:39:40 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x9401}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:40 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:40 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="eb3c906d6b010002000270fff800"/23, 0x16, 0x3}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000080)) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) [ 809.913927][ T584] attempt to access beyond end of device 19:39:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x7c, 0x0) [ 810.079723][ T584] loop0: rw=2049, want=130, limit=112 [ 810.085310][ T584] buffer_io_error: 5 callbacks suppressed [ 810.085321][ T584] Buffer I/O error on dev loop0, logical block 129, lost async page write 19:39:41 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 810.168602][ T584] attempt to access beyond end of device [ 810.205510][ T584] loop0: rw=2049, want=131, limit=112 [ 810.231461][ T599] FAT-fs (loop4): bogus number of reserved sectors [ 810.237339][ T584] Buffer I/O error on dev loop0, logical block 130, lost async page write [ 810.333944][ T599] FAT-fs (loop4): Can't find a valid FAT filesystem [ 810.379605][ T599] FAT-fs (loop4): bogus number of reserved sectors [ 810.404153][ T584] attempt to access beyond end of device [ 810.412024][ T599] FAT-fs (loop4): Can't find a valid FAT filesystem 19:39:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x7d, 0x0) 19:39:41 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 810.437187][ T584] loop0: rw=2049, want=132, limit=112 [ 810.476019][ T584] Buffer I/O error on dev loop0, logical block 131, lost async page write 19:39:41 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x68000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @multicast1, @multicast1}, &(0x7f0000000180)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffd, r1}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r3, 0x28007d) sendfile(r3, r3, 0x0, 0x2008000fffffffe) [ 810.580870][ T584] attempt to access beyond end of device [ 810.586581][ T584] loop0: rw=2049, want=133, limit=112 19:39:41 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x7e, 0x0) [ 810.806787][ T584] Buffer I/O error on dev loop0, logical block 132, lost async page write [ 810.943368][ T584] attempt to access beyond end of device [ 811.028702][ T584] loop0: rw=2049, want=142, limit=112 [ 811.097297][ T584] Buffer I/O error on dev loop0, logical block 141, lost async page write [ 811.186732][ T584] attempt to access beyond end of device [ 811.199108][ T584] loop0: rw=2049, want=143, limit=112 [ 811.204535][ T584] Buffer I/O error on dev loop0, logical block 142, lost async page write [ 811.246787][ T584] attempt to access beyond end of device [ 811.293602][ T584] loop0: rw=2049, want=144, limit=112 [ 811.334112][ T584] Buffer I/O error on dev loop0, logical block 143, lost async page write [ 811.354680][ T584] attempt to access beyond end of device [ 811.361087][ T584] loop0: rw=2049, want=145, limit=112 [ 811.366548][ T584] Buffer I/O error on dev loop0, logical block 144, lost async page write 19:39:42 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000035) 19:39:42 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:42 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x82, 0x0) 19:39:42 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6730bf9864056b66732e6661740002040100", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x7) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000040)={{0x2, @loopback, 0x4e23, 0x2, 'fo\x00', 0x2, 0xfffffffa, 0x4f}, {@rand_addr=0x7, 0x4e20, 0x0, 0x58, 0xffffff02, 0x4}}, 0x44) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r6, 0x9}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={r7, 0x101, 0x1, [0x6]}, 0xa) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:39:42 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 811.669493][ T26] kauditd_printk_skb: 19 callbacks suppressed [ 811.669506][ T26] audit: type=1800 audit(1570909182.752:546): pid=660 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16597 res=0 [ 811.720075][ T656] FAT-fs (loop4): invalid media value (0x00) [ 811.777956][ T656] FAT-fs (loop4): Can't find a valid FAT filesystem [ 811.778035][ T660] IPVS: set_ctl: invalid protocol: 2 127.0.0.1:20003 19:39:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x83, 0x0) [ 811.886292][ T26] audit: type=1800 audit(1570909182.812:547): pid=667 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17169 res=0 19:39:43 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 812.089592][ T26] audit: type=1804 audit(1570909183.172:548): pid=673 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/647/file0" dev="sda1" ino=17169 res=1 [ 812.237362][ T660] IPVS: set_ctl: invalid protocol: 2 127.0.0.1:20003 [ 812.300760][ T26] audit: type=1804 audit(1570909183.312:549): pid=666 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/961/file0/file0" dev="sda1" ino=16597 res=1 19:39:43 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 812.348122][ T656] FAT-fs (loop4): invalid media value (0x00) [ 812.354144][ T656] FAT-fs (loop4): Can't find a valid FAT filesystem 19:39:43 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000036) 19:39:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x84, 0x0) [ 812.468766][ T26] audit: type=1800 audit(1570909183.312:550): pid=667 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=17169 res=0 [ 812.537147][ C1] net_ratelimit: 20 callbacks suppressed [ 812.537154][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 812.548651][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:43 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 812.680499][ T26] audit: type=1800 audit(1570909183.312:551): pid=673 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17169 res=0 [ 812.752483][ T706] attempt to access beyond end of device 19:39:43 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x8000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:43 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000400)='./file0\x00', 0x8980, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r2, &(0x7f0000000040)=""/48, 0x57b) prctl$PR_CAPBSET_READ(0x17, 0x21) statx(r1, &(0x7f0000000080)='./file0\x00', 0x4000, 0x200, &(0x7f0000000300)) getdents64(r2, 0x0, 0x0) write$UHID_CREATE(r2, &(0x7f0000000180)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000040)=""/50, 0x32, 0x1f, 0xfffffffa, 0x2, 0x5, 0x1000}, 0x120) sendfile(r1, r1, 0x0, 0x2008000fffffffe) [ 812.819042][ T706] loop0: rw=2049, want=130, limit=112 [ 812.855983][ T706] Buffer I/O error on dev loop0, logical block 129, lost async page write [ 812.872766][ T26] audit: type=1800 audit(1570909183.782:552): pid=699 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=81 res=0 19:39:44 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x85, 0x0) [ 812.974423][ T706] attempt to access beyond end of device [ 813.045634][ T712] FAT-fs (loop4): bogus number of reserved sectors [ 813.049583][ T706] loop0: rw=2049, want=131, limit=112 [ 813.088046][ T26] audit: type=1800 audit(1570909184.032:553): pid=715 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17425 res=0 [ 813.107095][ T706] Buffer I/O error on dev loop0, logical block 130, lost async page write [ 813.130668][ T712] FAT-fs (loop4): Can't find a valid FAT filesystem 19:39:44 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x86, 0x0) [ 813.239644][ T706] attempt to access beyond end of device [ 813.245336][ T706] loop0: rw=2049, want=132, limit=112 [ 813.275203][ T712] FAT-fs (loop4): bogus number of reserved sectors [ 813.327826][ T712] FAT-fs (loop4): Can't find a valid FAT filesystem [ 813.334513][ T26] audit: type=1804 audit(1570909184.412:554): pid=719 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/962/file0/file0" dev="sda1" ino=17425 res=1 [ 813.362154][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 813.362204][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 813.362288][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 813.362324][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 813.440329][ T706] attempt to access beyond end of device 19:39:44 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0xa002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:39:44 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 813.576729][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 813.582535][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 813.585243][ T706] loop0: rw=2049, want=133, limit=112 [ 813.629471][ T26] audit: type=1804 audit(1570909184.712:555): pid=739 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/648/file0/file0" dev="loop0" ino=81 res=1 19:39:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x87, 0x0) [ 813.687543][ T706] attempt to access beyond end of device [ 813.693210][ T706] loop0: rw=2049, want=142, limit=112 [ 813.855479][ T706] attempt to access beyond end of device [ 813.910625][ T706] loop0: rw=2049, want=143, limit=112 [ 813.944259][ T706] attempt to access beyond end of device [ 813.956770][ T706] loop0: rw=2049, want=144, limit=112 [ 813.962234][ T706] attempt to access beyond end of device [ 813.979507][ T706] loop0: rw=2049, want=145, limit=112 [ 814.003414][ T706] attempt to access beyond end of device [ 814.016003][ T706] loop0: rw=2049, want=257, limit=112 19:39:45 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000037) 19:39:45 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:45 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x88, 0x0) [ 814.160362][ T2798] attempt to access beyond end of device [ 814.166047][ T2798] loop0: rw=1, want=2497, limit=112 [ 814.216756][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 814.222624][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:45 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x89, 0x0) 19:39:45 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x40) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8, 0x1, 'htb\x00'}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in=@empty, @in6=@empty, 0x4e24, 0xb, 0x4e21, 0x0, 0x4, 0xe0, 0x1a0, 0x2f, r6}, {0x1f, 0x100000000, 0x2, 0x2, 0xa63f, 0x3f, 0x0, 0xfffffffffffff000}, {0x10000, 0x7, 0xfd3, 0x6}, 0x4, 0x6e6bb6, 0x3, 0x1, 0x3, 0x1}, {{@in6=@loopback, 0x4d4, 0x5d}, 0xa, @in6=@ipv4={[], [], @loopback}, 0x3505, 0x3, 0x2, 0x40, 0x8e, 0x400, 0x9a8}}, 0xe8) 19:39:45 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x8a, 0x0) 19:39:45 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:46 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000038) 19:39:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x8b, 0x0) 19:39:46 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:46 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 815.159182][ T805] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=805 comm=syz-executor.4 19:39:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x8c, 0x0) 19:39:46 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:46 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@empty}) creat(&(0x7f0000000040)='./file0/file0\x00', 0x5) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x40) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:39:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x8d, 0x0) 19:39:46 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:46 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x8000, 0x0, 0x0, 0x101}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000000140)=""/122) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f00000000c0)={0x5e, r2}) preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:46 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000039) 19:39:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x8e, 0x0) 19:39:47 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x10000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000080)={0x1, 0x1, &(0x7f0000000140)="23fb131552789b0bea738927be392d636f33075ae35493e36878051dc5face00f2104cd4318780f03dd7e13e39a64d4fbb998a59da22906e42b7a8965bc637405974ef17f534113e57b2a1c023752b9495ae5fb42e227c8d99b6d62fb60976f3e9394efc8b9c62a9d88738783e61e775f59c11a72938e9e461216bab0b9e1c20f3442b20cd5df31d4c0112f1e684a0f1803c1d8d4400b39803f6571e60d8aac934bb", {0x0, 0x7fffffff, 0x43353039, 0xf, 0x1, 0x3, 0x5, 0xaef}}) 19:39:47 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x8f, 0x0) 19:39:47 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x3f000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:47 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:47 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') prctl$PR_GET_FP_MODE(0x2e) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000080)) 19:39:47 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x40}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x9) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r4, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x400000, &(0x7f0000000300)={[{@xino_off='xino=off'}, {@metacopy_on='metacopy=on'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@metacopy_off='metacopy=off'}, {@upperdir={'upperdir', 0x3d, '.'}}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@xino_auto='xino=auto'}], [{@fowner_gt={'fowner>', r3}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_gt={'fowner>', 0xee01}}, {@fowner_eq={'fowner', 0x3d, r5}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:39:47 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000003a) 19:39:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x90, 0x0) 19:39:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 816.711081][ T26] kauditd_printk_skb: 24 callbacks suppressed [ 816.711094][ T26] audit: type=1800 audit(1570909187.792:580): pid=907 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17029 res=0 19:39:47 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000140)=@ax25={{0x3, @bcast}, [@null, @rose, @default, @bcast, @netrom, @bcast, @netrom, @default]}, 0x0, &(0x7f0000001480)=[{&(0x7f00000001c0)=""/4096}, {&(0x7f00000011c0)=""/228}, {&(0x7f00000012c0)=""/133}, {&(0x7f0000001380)=""/249}], 0x0, &(0x7f00000014c0)=""/189}, 0xfffffff7}, {{&(0x7f0000001580)=@can, 0x0, &(0x7f0000002800)=[{&(0x7f0000001600)=""/4096}, {&(0x7f0000002600)=""/235}, {&(0x7f0000002700)=""/194}], 0x0, &(0x7f0000002840)=""/144}, 0x5}, {{&(0x7f0000002900)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x0, &(0x7f0000002a80)=[{&(0x7f0000003180)=""/4096}, {&(0x7f0000002980)=""/74}, {&(0x7f0000002a00)=""/84}]}, 0x3}, {{&(0x7f0000002ac0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x0, &(0x7f0000002c00)=[{&(0x7f0000002b40)=""/186}], 0x0, &(0x7f0000002c40)=""/175}, 0x9}, {{&(0x7f0000002d00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0, &(0x7f0000004380)=[{&(0x7f0000002d80)=""/168}, {&(0x7f0000002e40)=""/130}, {&(0x7f0000002f00)=""/197}, {&(0x7f0000003000)=""/243}, {&(0x7f0000003100)=""/26}, {&(0x7f0000004180)=""/21}, {&(0x7f00000041c0)=""/150}, {&(0x7f0000004280)=""/100}, {&(0x7f0000004300)=""/55}, {&(0x7f0000004340)=""/55}], 0x0, &(0x7f0000004440)=""/136}, 0x2}], 0x400000000000031, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x40000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_rose_SIOCDELRT(r4, 0x890c, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2, @bcast, @rose={'rose', 0x0}, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) 19:39:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x91, 0x0) [ 816.856105][ T26] audit: type=1804 audit(1570909187.862:581): pid=919 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/966/file0/file0" dev="sda1" ino=17029 res=1 19:39:48 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r2, &(0x7f0000000040)=""/48, 0x57b) getdents64(r2, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000180)={{0x0, 0x8}, 'port1\x00', 0x20, 0x28, 0x4, 0x8, 0x5, 0x3, 0xffffff10, 0x0, 0x0, 0xf5}) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:39:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:48 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000003b) [ 817.009976][ T928] Unknown ioctl 1074025672 [ 817.083743][ T26] audit: type=1800 audit(1570909187.972:582): pid=915 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17297 res=0 [ 817.161370][ T928] Unknown ioctl 1074025672 [ 817.243005][ T26] audit: type=1804 audit(1570909188.042:583): pid=915 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/652/file0/file0" dev="sda1" ino=17297 res=1 [ 817.436097][ T26] audit: type=1800 audit(1570909188.512:584): pid=949 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=82 res=0 [ 817.539944][ T26] audit: type=1800 audit(1570909188.562:585): pid=947 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=83 res=0 [ 817.603829][ T951] attempt to access beyond end of device [ 817.629876][ T951] loop0: rw=2049, want=130, limit=112 [ 817.637131][ T951] buffer_io_error: 6 callbacks suppressed [ 817.637142][ T951] Buffer I/O error on dev loop0, logical block 129, lost async page write [ 817.694050][ T951] attempt to access beyond end of device 19:39:48 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x64000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:48 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000000080)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x60, 0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000480)={0x1, 0x0, [{0xc000, 0x0, 0x3}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) r2 = semget$private(0x0, 0x0, 0x0) semctl$IPC_SET(r2, 0x0, 0x1, 0x0) semctl$IPC_INFO(r2, 0x0, 0x3, 0xffffffffffffffff) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000090000008000000000000000fbffffffffffffff0500000000000000000000000000000000000000000000000000000000000000ff010000020000000700000000000000e400000000000000390000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000170a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f65a306a00"/824]) prctl$PR_GET_FP_MODE(0x2e) 19:39:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x92, 0x0) 19:39:48 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x20) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r5, 0x28007d) sendfile(r5, r5, 0x0, 0x2008000fffffffe) [ 817.736814][ C1] net_ratelimit: 20 callbacks suppressed [ 817.736823][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 817.748312][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 817.763360][ T951] loop0: rw=2049, want=131, limit=112 [ 817.808104][ T951] Buffer I/O error on dev loop0, logical block 130, lost async page write 19:39:48 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 817.906476][ T951] attempt to access beyond end of device [ 817.922757][ T26] audit: type=1800 audit(1570909189.002:586): pid=969 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=84 res=0 19:39:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x93, 0x0) [ 817.967666][ T951] loop0: rw=2049, want=132, limit=112 [ 817.993111][ T951] Buffer I/O error on dev loop0, logical block 131, lost async page write 19:39:49 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f00000000c0)={0x7, 0x3, 0x81, 0x0, 0xb8, 0x7, 0x8, 0x43, 0xfe, 0x7, 0x2, 0x6, 0x0, 0x36b, 0x7, 0x7f, 0x5a, 0x2, 0x3}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000140)={0x4, 0x4}) [ 818.105832][ T951] attempt to access beyond end of device 19:39:49 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 818.167560][ T951] loop0: rw=2049, want=133, limit=112 19:39:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x94, 0x0) [ 818.251992][ T951] Buffer I/O error on dev loop0, logical block 132, lost async page write [ 818.291690][ T990] Unknown ioctl 1077980832 [ 818.372857][ T996] Unknown ioctl 1077980832 [ 818.377442][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 818.377495][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 818.377581][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 818.377623][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:49 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 818.377853][ T26] audit: type=1804 audit(1570909189.462:587): pid=992 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/653/file0/file0" dev="loop0" ino=83 res=1 [ 818.413442][ T951] attempt to access beyond end of device [ 818.459036][ T951] loop0: rw=2049, want=142, limit=112 [ 818.534621][ T951] Buffer I/O error on dev loop0, logical block 141, lost async page write [ 818.592600][ T26] audit: type=1800 audit(1570909189.522:588): pid=992 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="loop0" ino=83 res=0 [ 818.632236][ T951] attempt to access beyond end of device [ 818.675967][ T951] loop0: rw=2049, want=143, limit=112 [ 818.704643][ T26] audit: type=1804 audit(1570909189.522:589): pid=994 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/653/file0/file0" dev="loop0" ino=83 res=1 [ 818.750098][ T951] Buffer I/O error on dev loop0, logical block 142, lost async page write [ 818.777077][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 818.782905][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 818.814964][ T951] attempt to access beyond end of device [ 818.821134][ T951] loop0: rw=2049, want=144, limit=112 [ 818.826594][ T951] Buffer I/O error on dev loop0, logical block 143, lost async page write [ 818.835342][ T951] attempt to access beyond end of device [ 818.841217][ T951] loop0: rw=2049, want=145, limit=112 [ 818.846788][ T951] Buffer I/O error on dev loop0, logical block 144, lost async page write 19:39:49 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000003c) 19:39:49 executing program 2: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:49 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0x2c000) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r2, 0x28007d) sendfile(r2, r2, 0x0, 0x2008000fffffffe) 19:39:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x95, 0x0) 19:39:49 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) sigaltstack(&(0x7f0000ffd000/0x3000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x14, r2, 0x101, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r2, 0xab14b03de93f6885, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @remote}, @FOU_ATTR_PEER_V4={0x8, 0x8, @remote}]}, 0x30}}, 0x20000090) prctl$PR_GET_FP_MODE(0x2e) 19:39:49 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x94010000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:50 executing program 2: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x96, 0x0) 19:39:50 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:50 executing program 2: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x97, 0x0) 19:39:50 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 819.576747][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 819.582638][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:39:50 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000003d) 19:39:50 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000200), 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:50 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x50028007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:39:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x98, 0x0) 19:39:50 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:51 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') r3 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_S_FBUF(r3, 0x4030560b, &(0x7f0000000380)={0x0, 0xe, &(0x7f00000002c0)="2d8579ad95200c7f417883f6a4b38a10d66ccf6d42172dc18f96114f13c31b4cb02e9045e4e01a267e5d7cbb6ca917e2582449fca13445d7ea910f8edf8e29e1fbc9e3fabaeec6371f1f4f95365cd2df1e291114117ee068fc5a751d8550cd425427ce0d7844c6f4e94a07608a57038b69e3479de4057fddcaaab8f022568f54d1c294", {0x8b6, 0x5, 0x3017301, 0x1, 0x100, 0xad0, 0x2, 0x10000}}) getdents(r2, &(0x7f0000000040)=""/48, 0x57b) getdents64(r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0x9, @rand_addr="81e6c114a2f9471a7c52499302aa65e6", 0x9}}, [0x7f, 0x2, 0x7, 0xfffffffffffffab7, 0x0, 0x7, 0x3, 0x92fd, 0x2, 0x0, 0x1ffc, 0x401, 0xfffffffffffffffe, 0x3ff, 0x3]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000240)=0x8) preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:51 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:51 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0xfefdffff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:51 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000003e) 19:39:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x99, 0x0) 19:39:51 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:51 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/48, 0x57b) getdents64(r0, 0x0, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040)=0x7fff, 0x4) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r2, 0x28007d) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r3, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) sendfile(r2, r3, 0x0, 0x2008000fffffffe) 19:39:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x9a, 0x0) 19:39:51 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:51 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8995, &(0x7f0000000080)={'erspan0\x00', @ifru_ivalue=0x1c}) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') prctl$PR_GET_FP_MODE(0x2e) 19:39:51 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x9b, 0x0) 19:39:52 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000080)) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}}) sendfile(r1, r1, 0x0, 0x2008000fffffffe) r2 = creat(&(0x7f0000000140)='./file1\x00', 0x220) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000180)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x202100, 0x0) 19:39:52 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:52 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0xfeffffff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:52 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000041) 19:39:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x9c, 0x0) 19:39:52 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='Net/igm\x10') r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200005) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r2, &(0x7f0000000040)=""/48, 0x57b) getdents64(r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x1f, 0x0, 0x1, 0x1ff, 0x800}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={r3, 0x2, 0x0, 0x1e256a5e, 0x1ff}, &(0x7f0000000200)=0x18) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, &(0x7f0000000080)=0x120004, 0x4) prctl$PR_GET_FP_MODE(0x2e) 19:39:52 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 821.296736][ T1163] FAT-fs (loop4): bogus number of reserved sectors [ 821.370962][ T1163] FAT-fs (loop4): Can't find a valid FAT filesystem 19:39:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x9d, 0x0) 19:39:52 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffe74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f0000000080), 0x0, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:52 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 821.787309][ T1163] FAT-fs (loop4): bogus number of reserved sectors [ 821.811676][ T26] kauditd_printk_skb: 21 callbacks suppressed 19:39:52 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x190}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') pipe2$9p(&(0x7f0000000080), 0x800) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:39:52 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 821.811690][ T26] audit: type=1804 audit(1570909192.892:611): pid=1171 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/657/file0/file0" dev="sda1" ino=16769 res=1 [ 821.836900][ T1163] FAT-fs (loop4): Can't find a valid FAT filesystem [ 822.030300][ T26] audit: type=1804 audit(1570909192.892:612): pid=1179 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/657/file0/file0" dev="sda1" ino=16769 res=1 [ 822.141692][ T26] audit: type=1800 audit(1570909192.942:613): pid=1171 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=16769 res=0 [ 822.191971][ T26] audit: type=1800 audit(1570909192.942:614): pid=1179 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16769 res=0 19:39:53 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000040)=0x1, 0x4) fchdir(r0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r4, 0x28007d) sendfile(r4, r4, 0x0, 0x2008000fffffffe) 19:39:53 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000042) [ 822.218465][ T26] audit: type=1804 audit(1570909193.022:615): pid=1167 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/972/file0/file0" dev="sda1" ino=16785 res=1 [ 822.249138][ T26] audit: type=1800 audit(1570909193.222:616): pid=1175 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=16785 res=0 [ 822.278458][ T26] audit: type=1800 audit(1570909193.222:617): pid=1167 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16785 res=0 [ 822.407707][ T1232] attempt to access beyond end of device [ 822.445800][ T1232] loop0: rw=2049, want=130, limit=112 19:39:53 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0xfffffdfe}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x9e, 0x0) 19:39:53 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 822.446584][ T26] audit: type=1800 audit(1570909193.432:618): pid=1222 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=85 res=0 [ 822.554709][ T1232] Buffer I/O error on dev loop0, logical block 129, lost async page write 19:39:53 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 822.626309][ T26] audit: type=1800 audit(1570909193.562:619): pid=1233 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16721 res=0 [ 822.664745][ T1232] attempt to access beyond end of device [ 822.699007][ T1232] loop0: rw=2049, want=131, limit=112 19:39:53 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x9f, 0x0) [ 822.794303][ T1232] Buffer I/O error on dev loop0, logical block 130, lost async page write [ 822.833972][ T26] audit: type=1804 audit(1570909193.902:620): pid=1226 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/973/file0/file0" dev="sda1" ino=16721 res=1 [ 822.936744][ C1] net_ratelimit: 20 callbacks suppressed [ 822.936752][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 822.948269][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:54 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe800000"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 823.003835][ T1232] attempt to access beyond end of device 19:39:54 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 823.072416][ T1232] loop0: rw=2049, want=132, limit=112 19:39:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xa0, 0x0) 19:39:54 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 823.174964][ T1232] Buffer I/O error on dev loop0, logical block 131, lost async page write [ 823.192497][ T1232] attempt to access beyond end of device [ 823.205077][ T1232] loop0: rw=2049, want=133, limit=112 19:39:54 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x0, &(0x7f0000000140), 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000040)=0xe8) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000280)={r2, 0x1, 0x6, @remote}, 0x10) ftruncate(r1, 0x28007d) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r3, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) fcntl$notify(r3, 0x402, 0x20) sendfile(r1, r1, 0x0, 0x2008000fffffffe) [ 823.282577][ T1232] Buffer I/O error on dev loop0, logical block 132, lost async page write 19:39:54 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 823.360898][ T1232] attempt to access beyond end of device [ 823.377399][ T1274] FAT-fs (loop4): bogus number of reserved sectors [ 823.406787][ T1232] loop0: rw=2049, want=142, limit=112 [ 823.433672][ T1274] FAT-fs (loop4): Can't find a valid FAT filesystem [ 823.481186][ T1232] Buffer I/O error on dev loop0, logical block 141, lost async page write [ 823.576924][ T1232] attempt to access beyond end of device [ 823.596051][ T1232] loop0: rw=2049, want=143, limit=112 [ 823.652394][ T1232] Buffer I/O error on dev loop0, logical block 142, lost async page write [ 823.736772][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 823.738243][ T1232] attempt to access beyond end of device [ 823.742574][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 823.754026][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 823.759820][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 823.769069][ T1274] FAT-fs (loop4): bogus number of reserved sectors [ 823.775807][ T1274] FAT-fs (loop4): Can't find a valid FAT filesystem [ 823.793275][ T1232] loop0: rw=2049, want=144, limit=112 [ 823.811735][ T1232] Buffer I/O error on dev loop0, logical block 143, lost async page write [ 823.855220][ T1232] attempt to access beyond end of device [ 823.871579][ T1232] loop0: rw=2049, want=145, limit=112 [ 823.882950][ T1232] Buffer I/O error on dev loop0, logical block 144, lost async page write 19:39:55 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000043) 19:39:55 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xa1, 0x0) 19:39:55 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 823.976762][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 823.982617][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:55 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:55 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r0}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r2, 0x28007d) sendfile(r2, r2, 0x0, 0x2008000fffffffe) 19:39:55 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:55 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xa2, 0x0) 19:39:55 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:55 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @window={0x3, 0x6, 0x100}, @timestamp, @sack_perm], 0x5) 19:39:55 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xa3, 0x0) 19:39:55 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 824.616748][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 824.622618][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:55 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000044) 19:39:55 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:55 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xa4, 0x0) [ 824.922695][ T1346] attempt to access beyond end of device [ 825.001570][ T1346] loop0: rw=2049, want=130, limit=112 [ 825.067080][ T1346] Buffer I/O error on dev loop0, logical block 129, lost async page write 19:39:56 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:56 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 825.227481][ T1346] attempt to access beyond end of device 19:39:56 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:56 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xa5, 0x0) [ 825.279018][ T1346] loop0: rw=2049, want=131, limit=112 [ 825.284491][ T1346] Buffer I/O error on dev loop0, logical block 130, lost async page write 19:39:56 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) utimensat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x0, 0x7530}, {0x77359400}}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r2, 0x28007d) sendfile(r2, r2, 0x0, 0x2008000fffffffe) [ 825.346859][ T1346] attempt to access beyond end of device [ 825.352744][ T1346] loop0: rw=2049, want=132, limit=112 19:39:56 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 825.423568][ T1346] Buffer I/O error on dev loop0, logical block 131, lost async page write 19:39:56 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xa6, 0x0) [ 825.515319][ T1346] attempt to access beyond end of device [ 825.542817][ T1346] loop0: rw=2049, want=133, limit=112 [ 825.603934][ T1346] attempt to access beyond end of device 19:39:56 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 825.732065][ T1346] loop0: rw=2049, want=142, limit=112 19:39:56 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xa7, 0x0) [ 825.817736][ T1346] attempt to access beyond end of device [ 825.823409][ T1346] loop0: rw=2049, want=143, limit=112 [ 825.891130][ T1346] attempt to access beyond end of device [ 825.941297][ T1346] loop0: rw=2049, want=144, limit=112 [ 825.990624][ T1346] attempt to access beyond end of device [ 826.043924][ T1346] loop0: rw=2049, want=145, limit=112 19:39:57 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000045) 19:39:57 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:57 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x292000, 0x0) getdents(r2, &(0x7f0000001580)=""/67, 0x43) getdents64(r2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x9, 0x81da, 0x1, 0x1000, 0x822e}, &(0x7f0000000100)=0x14) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r3, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) getpeername$unix(r2, &(0x7f0000001400)=@abs, &(0x7f00000001c0)=0x6e) ioctl(r3, 0x15be, &(0x7f0000000300)="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") r4 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r4, &(0x7f0000000040)=""/48, 0x57b) getdents64(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000180)={0x0, 0xffff, 0x9998, 0x9, 0x9, 0x10001}, 0x14) r5 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) membarrier(0x0, 0x0) ioctl$KVM_IRQ_LINE(r5, 0x4008ae61, &(0x7f0000000040)={0x0, 0x4}) syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x0, &(0x7f0000000140)=[{&(0x7f0000002000)="e3595f0aafcae801", 0x0, 0x1}], 0x40, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r6 = socket$inet_sctp(0x2, 0x5, 0x84) getsockname(r6, &(0x7f0000001480)=@xdp, &(0x7f0000000280)=0x80) r7 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r8, 0x28007d) r9 = syz_init_net_socket$ax25(0x3, 0x1, 0x67) setsockopt$ax25_int(r9, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) write(r9, &(0x7f0000001300)="584187f20242aa5ba8ef1d223fa699bd67f80a5892531736b84ad8b9fe213d7f8407ce5db59fae368c81a7aa83d7f4ba5d74031b8302f25137710312baf7d32de1d0d38a5e6ebb35389e53626659e804f306495ae2b0a4ae940fc075968c78bbf8c990181272aa94c8fe9e1c06793f2510ff41f8c7e0636081891c585399cb68cf06a8ba5abfdad7737ce41018dafce5e978c23c97396cffebbe520f9692d638c6123051a88077973c97d59edd622aca04befdabd1b1eb7af058de3a9322884508", 0xc1) sendfile(r8, r8, 0x0, 0x2008000fffffffe) 19:39:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xa8, 0x0) 19:39:57 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:57 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 826.262633][ T1409] FAT-fs (loop4): bogus number of reserved sectors [ 826.290645][ T1409] FAT-fs (loop4): Can't find a valid FAT filesystem 19:39:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xa9, 0x0) 19:39:57 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xaa, 0x0) 19:39:57 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55ee"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 826.823517][ T1409] FAT-fs (loop4): bogus number of reserved sectors [ 826.884586][ T26] kauditd_printk_skb: 33 callbacks suppressed [ 826.884601][ T26] audit: type=1800 audit(1570909197.962:654): pid=1422 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=16529 res=0 [ 826.925035][ T1409] FAT-fs (loop4): Can't find a valid FAT filesystem 19:39:58 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000046) 19:39:58 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xab, 0x0) [ 827.004154][ T26] audit: type=1800 audit(1570909198.002:655): pid=1417 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16529 res=0 19:39:58 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/48, 0x57b) getdents64(r0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e24, @loopback}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000180)='veth1_to_bond\x00', 0x7, 0xffffffffffffff81, 0xff}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000100)={0x3}) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r5, 0x28007d) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendfile(r5, r5, 0x0, 0x2008000fffffffe) [ 827.210863][ T26] audit: type=1800 audit(1570909198.292:656): pid=1465 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16929 res=0 19:39:58 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xac, 0x0) [ 827.395427][ T26] audit: type=1800 audit(1570909198.472:657): pid=1469 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16488 res=0 19:39:58 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x800000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:58 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 827.674210][ T26] audit: type=1800 audit(1570909198.752:658): pid=1489 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=16929 res=0 19:39:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xad, 0x0) 19:39:58 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000047) [ 827.735115][ T26] audit: type=1804 audit(1570909198.792:659): pid=1465 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/662/file0" dev="sda1" ino=16929 res=1 19:39:58 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:59 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@empty}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) [ 827.941217][ T26] audit: type=1800 audit(1570909198.792:660): pid=1465 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16929 res=0 19:39:59 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xae, 0x0) [ 828.074493][ T26] audit: type=1804 audit(1570909198.902:661): pid=1469 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/979/file0/file0" dev="sda1" ino=16488 res=1 [ 828.136740][ C1] net_ratelimit: 20 callbacks suppressed [ 828.136748][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 828.148247][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:59 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 828.327718][ T26] audit: type=1800 audit(1570909198.902:662): pid=1495 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=16488 res=0 19:39:59 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000048) [ 828.485718][ T26] audit: type=1800 audit(1570909198.912:663): pid=1469 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16488 res=0 19:39:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xaf, 0x0) 19:39:59 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:39:59 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 828.776722][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 828.782560][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 828.788398][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 828.794165][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:39:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xb0, 0x0) 19:39:59 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:00 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0x8000000}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x343080, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r1, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) sendmsg(r1, &(0x7f0000000540)={&(0x7f00000004c0)=@nfc={0x27, 0x1}, 0xfffffe1b, &(0x7f0000000280)=[{&(0x7f0000000300)="c5f2511787dd3d49022dfa973fd74cb39eac3b1ab78ffa86ca82e1d429c2b0f7b4283be51841d7e91a994576f0b40a33517c2b790db80c9f379db3af20d66ae7c3e9ae5074387825e3bed36528ea96185da5a3c6fa80cc1d377d0aced178124171ce4fe0df026d3314a556555c8831d911515d5132c0858910fffab4e86e40039ee18917bc62e486c3a2dae84182153298ce801d6582fc104664da7a739ec94fc9c62dadcd0a0490b485922ae1ff2bc0e33a1bf8e3319531ac194e8f86b09f0de1ae82fc3f2e822ff7c962e89d67b5bc455877f121e50170d0404436dc1c3b976c9c98f3f70c7803f1ba2b0018", 0xb0}, {&(0x7f0000000440)="3bbc9611158a1ec7f91baaf6707871936410efae60b9790b442c0b2e307a43a217608ea75a06e7b47b8668b8173d6734578555456f4ff24df3c0be4a6336f80335cc7769b92358e59231e260e3ce4af8dbf6bb59e8fce9ea1afe95cdb413aedfc8d1f5e80973705d94b5631d8641fa873d3692f958b400000000151f", 0xffffffffffffffef}], 0x2, 0x0, 0x1a2}, 0x40100) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0) ftruncate(r3, 0x28007d) sendfile(r3, r3, 0x0, 0x2008000fffffffe) 19:40:00 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 829.152448][ T1568] FAT-fs (loop4): bogus number of reserved sectors [ 829.176705][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 829.182537][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 829.204239][ T1568] FAT-fs (loop4): Can't find a valid FAT filesystem 19:40:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xb1, 0x0) 19:40:00 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000049) 19:40:00 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x4) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r2, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r3 = socket$can_raw(0x1d, 0x3, 0x1) ftruncate(r3, 0x28007e) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:40:00 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:00 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xb2, 0x0) 19:40:00 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:40:01 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:01 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000004a) 19:40:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xb3, 0x0) [ 829.977317][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 829.983843][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:40:01 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:01 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) r2 = socket(0xa, 0x80001, 0x0) io_setup(0xf6b7, &(0x7f0000000080)=0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r4, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r5, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r6 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r6, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r7 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r7, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r8 = dup2(r6, r7) r9 = syz_open_dev$sndctrl(&(0x7f0000001300)='/dev/snd/controlC#\x00', 0x8, 0x1001) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001380)='/dev/hwrng\x00', 0x67b02aa88f0e40a2, 0x0) r11 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r11, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r12 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001480)='/selinux/checkreqprot\x00', 0x4000, 0x0) io_submit(r3, 0x4, &(0x7f0000001500)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x1, r4, &(0x7f0000000300)="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", 0x1000, 0xfffffffffffffffb, 0x0, 0x0, r0}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x5, r5, &(0x7f00000001c0)="dc08e737ac72fe85e557d366118ff5e649ad5cb41e0a10ee2d072bfee91db2aef9188cc4f6c62ebfcf151ea84adcae4efa41707012a4bc8c0d7f7862b9bd9d42c8b3a709c7739c71976d22407869f33843bc11992aa35cb487e2e93447d5d4cb9dd8ffac5360d2af98513f54335629fb412bae2a870bf2fae65f981a51cd2989d11708fb7662325b3b70", 0x8a, 0x9, 0x0, 0x43e2befa1bef50df, r8}, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x3ccd, r9, &(0x7f0000001340)="c665bcf7f42266239496a77044fbcb7cbee5", 0x12, 0x5, 0x0, 0x1, r10}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x2, 0x0, r11, &(0x7f0000001400)="a100bba801a7983cdd37bd3d1a6382bde64cb11fd2c7d90be1790d9b98cacade6f82aa64efdf291b04aad3acda8465d7e26b456fd10b43c1734c766290296f2e55be1062688b04f40e3e01127416cca86f78a6e8bcaca2a9ec539064077e51a2ab6ed59a5c231409", 0x68, 0x7f, 0x0, 0x6, r12}]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0, 0x0}, &(0x7f0000b34ffc)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='gQd?', @ANYRESHEX=r13, @ANYBLOB=',\x00']) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, r13, 0x500) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:40:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xb4, 0x0) 19:40:01 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000004b) 19:40:01 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xb5, 0x0) [ 830.773140][ T1629] attempt to access beyond end of device 19:40:01 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 830.872196][ T1629] loop4: rw=2049, want=130, limit=112 [ 830.890400][ T1629] buffer_io_error: 5 callbacks suppressed [ 830.890412][ T1629] Buffer I/O error on dev loop4, logical block 129, lost async page write 19:40:02 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x3f00000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 830.975186][ T1629] attempt to access beyond end of device [ 830.986854][ T1629] loop4: rw=2049, want=131, limit=112 [ 831.007873][ T1629] Buffer I/O error on dev loop4, logical block 130, lost async page write 19:40:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xb6, 0x0) 19:40:02 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 831.166766][ T1629] attempt to access beyond end of device 19:40:02 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000004c) [ 831.221646][ T1629] loop4: rw=2049, want=132, limit=112 [ 831.286681][ T1629] Buffer I/O error on dev loop4, logical block 131, lost async page write 19:40:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xb7, 0x0) [ 831.348769][ T1629] attempt to access beyond end of device [ 831.385396][ T1629] loop4: rw=2049, want=133, limit=112 [ 831.430597][ T1629] Buffer I/O error on dev loop4, logical block 132, lost async page write [ 831.506837][ T1629] attempt to access beyond end of device [ 831.512617][ T1629] loop4: rw=2049, want=142, limit=112 [ 831.546391][ T1629] Buffer I/O error on dev loop4, logical block 141, lost async page write [ 831.587927][ T1629] attempt to access beyond end of device [ 831.613063][ T1629] loop4: rw=2049, want=143, limit=112 [ 831.627850][ T1629] Buffer I/O error on dev loop4, logical block 142, lost async page write [ 831.636409][ T1629] attempt to access beyond end of device [ 831.686740][ T1629] loop4: rw=2049, want=144, limit=112 [ 831.695690][ T1629] Buffer I/O error on dev loop4, logical block 143, lost async page write [ 831.727659][ T1629] attempt to access beyond end of device [ 831.733334][ T1629] loop4: rw=2049, want=145, limit=112 [ 831.776245][ T1629] Buffer I/O error on dev loop4, logical block 144, lost async page write [ 831.793977][ T1629] attempt to access beyond end of device [ 831.818827][ T1629] loop4: rw=2049, want=209, limit=112 19:40:03 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@empty, 0x4e}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) process_vm_readv(r2, &(0x7f0000001480)=[{&(0x7f0000000080)}, {&(0x7f0000000180)=""/237, 0xed}, {&(0x7f0000000300)=""/210, 0xd2}, {&(0x7f0000000400)=""/82, 0x52}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x5, &(0x7f0000000100)=[{&(0x7f0000001500)=""/196, 0xc4}, {&(0x7f0000001600)=""/92, 0x5c}], 0x2, 0x0) 19:40:03 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xb8, 0x0) 19:40:03 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000004d) [ 831.925242][ T2798] attempt to access beyond end of device [ 831.968626][ T2798] loop4: rw=1, want=433, limit=112 19:40:03 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 832.027041][ T26] kauditd_printk_skb: 27 callbacks suppressed [ 832.027060][ T26] audit: type=1800 audit(1570909203.112:691): pid=1698 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17537 res=0 19:40:03 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x6400000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:40:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xb9, 0x0) [ 832.235796][ T26] audit: type=1800 audit(1570909203.312:692): pid=1708 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17473 res=0 19:40:03 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:03 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000004e) [ 832.366881][ T26] audit: type=1804 audit(1570909203.432:693): pid=1693 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/669/file0/file0" dev="sda1" ino=17537 res=1 19:40:03 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000040)={0x80414efeac298592, 0x8}) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0xfa78df835f53ff3) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) [ 832.495625][ T26] audit: type=1800 audit(1570909203.432:694): pid=1693 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=17537 res=0 19:40:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xba, 0x0) 19:40:03 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 832.576745][ T26] audit: type=1804 audit(1570909203.432:695): pid=1715 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/984/file0/file0" dev="sda1" ino=17473 res=1 [ 832.649405][ T26] audit: type=1804 audit(1570909203.442:696): pid=1698 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/669/file0/file0" dev="sda1" ino=17537 res=1 19:40:04 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 832.876488][ T26] audit: type=1800 audit(1570909203.442:697): pid=1698 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17537 res=0 19:40:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xbb, 0x0) [ 833.028305][ T26] audit: type=1800 audit(1570909203.702:698): pid=1729 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16488 res=0 [ 833.089253][ T26] audit: type=1800 audit(1570909203.982:699): pid=1742 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17568 res=0 19:40:04 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 833.149816][ T26] audit: type=1804 audit(1570909204.142:700): pid=1729 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/670/file0/file0" dev="sda1" ino=16488 res=1 19:40:04 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000004f) [ 833.336715][ C1] net_ratelimit: 20 callbacks suppressed [ 833.336724][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 833.348217][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:40:04 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:04 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x9401000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:40:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xbc, 0x0) 19:40:04 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="ef8ea0f9efda5b696a1ba037d9d06e153358841073b93f55260838b34ede6d42d2cbc7489662874b91358093e4b38d04351fb278b9b7055a2e051ae26537699964869f8c5b5f4a7a226e1d067e00b3de5aa40739d94e6fb6b38e3e6293a699961818df26fb", 0x65, 0x10000}], 0x80, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x8c, r3, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf996}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x47}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x10}, 0xe8000) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) acct(0x0) fchdir(r4) getpeername$unix(r0, &(0x7f0000000400)=@abs, &(0x7f00000003c0)=0x3f9) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r5, 0x28007d) sendfile(r5, r5, 0x0, 0x2008000fffffffe) 19:40:04 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xbd, 0x0) [ 833.878525][ T1794] FAT-fs (loop4): bogus number of reserved sectors [ 833.957819][ T1794] FAT-fs (loop4): Can't find a valid FAT filesystem 19:40:05 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000050) 19:40:05 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:05 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r2, &(0x7f0000000040)=""/48, 0x57b) getdents64(r2, 0x0, 0x0) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x200e) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') lseek(r4, 0x0, 0x1) getdents(r5, &(0x7f0000000040)=""/48, 0x57b) getdents64(r5, 0x0, 0x0) ioctl$KVM_GET_ONE_REG(r5, 0x4010aeab, &(0x7f0000000200)={0xa53, 0xfff}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x9d8, 0x80) statx(r4, &(0x7f00000001c0)='./file0\x00', 0xaf965b02e09b1f1d, 0x1, &(0x7f0000000440)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0x7ff}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000140)={r9, 0x0, 0x8}) write$selinux_user(r8, &(0x7f0000000080)={'system_u:object_r:update_modules_exec_t:s0', 0x20, 'staff_u\x00'}, 0x33) 19:40:05 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d7a14d1f8ae1ab2e00204010002000270fff8", 0x16}], 0x420, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x80, 0x4e) ftruncate(r1, 0x28007d) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x90000041) sendfile(r1, r1, 0x0, 0x2008000fffffffe) [ 834.136928][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 834.142773][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 834.148649][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 834.154411][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:40:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xbe, 0x0) 19:40:05 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 834.376723][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 834.382530][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:40:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xbf, 0x0) 19:40:05 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0xfefdffff00000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:40:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r4, &(0x7f0000000040)=""/48, 0x57b) getdents64(r4, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000040)=0x212000, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000140)={{0x4, 0x3, 0x2800000, 0x3, 'syz1\x00', 0x7ff}, 0x1, [0x0, 0x6, 0x200, 0x7ff, 0x3c5, 0x100000001, 0x3, 0x3, 0x7, 0x80, 0x80000000, 0x71, 0xb36e, 0x4, 0x0, 0x8, 0x0, 0x7, 0x6, 0x7, 0xffffffff, 0xfacd, 0x0, 0x1, 0x27, 0x7fffffff, 0x38a, 0xffffffffa1fc3f4a, 0x74e, 0x5, 0xffff, 0x7, 0x7, 0x40, 0xbe, 0x7ff, 0x6c1, 0xcfc3, 0x7, 0x80000001, 0x3, 0xf9, 0x400, 0x40, 0x3, 0x20, 0xfffffffffffffff7, 0xffffffffffffefff, 0x32, 0x8, 0xffffffff, 0x8, 0x20, 0xe82a, 0x5, 0x0, 0x5c0, 0xf849, 0xade2, 0x0, 0x0, 0x8, 0x3, 0x200, 0x6, 0x800, 0x3, 0x6, 0x1, 0x8, 0x100000001, 0x1000, 0xfffffffffffffff8, 0x8000, 0x200, 0x7, 0x100000001, 0x10001, 0x70, 0x7fffffff, 0x200, 0x703, 0x9, 0x3, 0x20, 0x8, 0xf474, 0x20, 0x7fffffff, 0x1, 0x4, 0x3b08, 0xfffffffffffffc00, 0xff0, 0x80, 0x6c817660, 0x1, 0x2, 0xffffffff7fffffff, 0x5, 0x0, 0x100000000000005, 0x4, 0xffffffffffffffa3, 0x1, 0x608, 0x6, 0x7, 0xffffffffffffffc0, 0x8000, 0x2, 0x100000001, 0x7, 0x3, 0x1, 0x71b, 0xffff, 0x9, 0x80000001, 0x7fffffff, 0x2, 0x9b1e, 0xffffffff, 0x7, 0x6, 0x7, 0x9, 0x6], {0x0, 0x989680}}) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r5, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002d80)={&(0x7f0000000640)=@generic={0x4, "c60f938d10a7e724ff44ef059068524dbf303480d93d573a70d37b4da0d4a8b9ccc43aae888baec8bafc302bb731c8a5eaf2237f0b93615f655a5355b83068ee1d6c590ea57a21b692eb5110b2c43fd7113f7f42b80d40c74dada1e3335ca09034ca7514694a15ab74b2c4e5e0d1861b52530d9c285ea79bd0b2b6190b10"}, 0x80, &(0x7f0000002a00)=[{&(0x7f00000006c0)="8a9a80f3081f3012dfffe0184631d7db4e84119fb9c60210ef042a105385479292ee661ceb27da753d4cd412edf1f38a0aac96ab0abef8f393d6cb4889775c17bb4fedfba1cd1980eb06f55013703cd50fac63d9c38ea3c369a42cb5ee", 0x5d}, {&(0x7f0000000740)="43ba9c056abd329f28b89c10d97707a0fde67129ed0a36c9f896fb31c8e026588faea0f059e430a2ee53677c76ac6b3565778ca5c67fa7f90bce2753f94b01bf41c2582b80a32d96ea1f6f196b7081d07a48e563d1ff2195284c7952d6085cdad333c3d4b1fb0281750466d776bcf3f5622bbc5d22b4a873fad58550949dc89beeb1050bece21cda672c1e9f6251bddce5a791680367a77fbfc20b9d19c3e359dda6839105fe9ffadb5394c97795f97172418011bd5f8291e7bfe410d2426d265131eaf26b8384b2ba67739a3a0f8d69cffc7bf8c2a5e912b19143c033c175845825967c44de396520a1cbc451c09bab55baa84086228c4750b02758b579c3920183d58f6954fddc86c4618014053d34a2d83b26a3a6af9f17847e16150ba57e15eb644e5672232ec1155f2ed8c27a3796786149d526e65c303b437c5ae7a8adefb0dbd396093b4f12d0dc610b669dc8007719cc86caa6107ed64a30892b88afafb216670033549c3827aaf8c90798aaeb59901a951ffe1f1c210d019d854f80060912e05d67a3ae046327d210c5d149742b083f7cbf5e697a3bd5d76c268b6c6470555922ff97d236f18ab1870ce662647007e2f66052f4b30bbb83e7e3ee0716ed6237a4a9b09243acffbc2211c1afde5f71b23f192568e5170704cf0484a2d21a12266c7569cff283175e1287cf11acb6cd324cf794527031ee97d91b1d2546d6adb060b6356c4731c96d898c54111613228e556c65ede1b0d4b4055b97d02208f4264e7d1cedebec976b070995af2aac966e0d4f65b7058d5ee9a635da368683740317efa6d263268b56ec97bcb75953899e6139cca4f33e86ca8d46e6e1839c7d8389b96acfc91ae724a891cb869520db037237fd4c33345972d8ef5f28598b49eafec5c1ed72849d84ad09bbb5f892afd95f0561af7c2bb6201e1184120bcc5789e2a9564988ea554047edf705b54ad427594395c01fb04360bae4e7ba952745b9ddf9e1c7f919e3313fdad85132d24b85eb4d1dab68c8fd9359eaadaf61e36a5e955bf38c9504b769558de1694a6382158e13f42991fe213122f5e0adb82f48d231ecf16fa505fb652cd28c9067c7e76b0fe2471c2b2c419bb0f7b3a64201058e12da1e2054544b0fc393c467cd9d00b6cc3790ce7e2faccb2d7d8dedd4c028da4d46b48659d052b0a941e030f02fc4fa25a336f7838a7e41d0af29be3b2ee2f2f35f15536955be9ad0ca7a88b9bec3202a395881534730fd2f4e0fe171f96f32769666be62926331355326f6a0bad41f10e521f228b600f86b56b7aa65d46545e39b547380588dc187bcd9848a2599de5389b9d41fd31bde6cd09ca6b7cbb2d55bade0cde7caa80c68538ed2132642dad8dc18fee9061b81b78f5bdf5b45b2a8ed8efb210e909b0d582b3321db6923e71ef3c56ec76adc2390e0fa45daa0bda51525e62b1a1cb0a93d0857451dbf123f3283e0a47b6088e3491bdaa37dc9fe8c14c0758ac92ae963ad71a79106b4b444a7374304375c581a1448369781dfc46c2b36078251968dbf52fc8f3aa4a1f375d1e19824b747682ccbc76727069ddf24b15b107e294cf708ce25c140d15ebd385e594cf6033e09c4f5679b9c90aee5129e4727446eebb33806c5fd398d08687c82db4d6b4cc17b09660f89ad7a15bdec0fb7b88518b40ced8f280e10feef73c77eaf4048b206231a076d9d5c2107a92297bd5882ef07f7c470385732c793cf240c58fa1302403c81fcc87be75d5d1141a099c98b83868bc98a724454710b1e12ae4f3e774dc4b1b91edc3d3fee32f20690743c4d581cab241087e6af90afc717e9abe606db5e7c6a8d24c2ed6d6378ef38144bdabe5e92c8bd216d0c75c84fe9d9316bde53c6bd434e5a210875701349a09bc4d808efc6ada8f5b280fa04f55280205f988172c8b0b432aa476aed742461c3513e29b3ad95ff5857ceeeed08ef07f9773baa6be7a7ff81cc0442d6edcf137c79a14b4e4dcd57b9cf683a9065b24a2e15a6731ab6e0b593b3d1fab6e2b5c33662a63c9e71254b473f7add3e10e38f46af3b0f97f5dd9cb8e7493fe1e167279402a99e71a0f3e581f6571be528d35cf03facca1f0427128019c92c36c645bb72175da6657272d523bf1ca2327d2126c28bf241837ff61f411daa28d75001ad03c2bed0da863876f861c8648810468f4a495c2173fb17f4ad2d9e7b428422c4c979ced0846be5bd1cf7d614af3e51cc501334e1dadf49571901c85128713c78d4537a6eeed4166e827cfc719858313d65098c42e412568ea23b8d21b8aa0b78674b7ab4311c05b80c78c7077c2ca6a74268cc9fb296f6b1d9fcd598ec7a1db07c84416693cf9519a612d2b9f61b94075681b0fda46961168d515148fffd91e851b0673c01da08dd44ce5873ed2cb4975c5b1aeea4ca3decb26e4518bd62c13e9fc4d887079fc3025ef9b8a8fd1940c0738b06e7a735965b801e860600f8c61b8334ad977d570aec0fbaa7d194b3482108de631e226ed9825fd13931601e8cd8de47a4a64e700e1f2d521b999b9ecfb1ed4b75c5f4f58da6145583d00daba804e7cd386318386c504cdff4324a67907abfdc7b0f0d0667ae3804543325f1deeb96db96bb6ca36abb9c6d72d3703b1f8bb64ca03e1fa8f3f2acc26b2f649ee9a679b361a9ed0823dd7552cb3ce9cf93b65f6d26d8319ba92a7bfae52b806c65bbf31c272b317a54181ee6719ee8d5534f1b5bd70824d61def3baf8843cc3fbc2fcb2e89a0c3521257c80e4b563d517eb148ea32da04b18e3b878c3845e7118d78e89a85cd9b3ac99644815c3321ad69bab6db6e436faf9f45cf633b8f95cc2dbd3914d75535758d502ae959176bb342f53029a8c84e5e0d9e9fe1b45eb44a767e83af1a019047b921c1d9ae784144aed2871a573b9c2b0dc7067692fc7b02c563b497e9e765e8db0f9c6c7068f9e1079843949858673f4aec69150b2bf88f2203911c82e1817fdb8a6d55a687b04717a176881d193a63c2acd94796492472e8224e751d7bc4581eeb547426f33faa2e33efd6d4d5a405fdd00b13cd0ec00b935c302d3eab431759c522510f956ad138b5cf27fd010b7bd26d19e7389a10244e27a296c9c5dc3a44a06c3821219bfe7d223857706eb219e0b492552f040049cae5fcc29e63f60a6a9bb34f93b5728eb9d0e1b539376491eba292191949ad3e5de63ef842021204c94658a11c31ab2ad3833eea127bbe978b1ba17c315815fc9b94a69866aaa2563b526cf754a28a69e1d3da9e9ebfcbcd336c9007f16bda03834e965fa15edb602e6bc0bf1f8f16bbc339efbb7f911dfb445b2e23727161bffc8accf12b15b0712c5aa611e7a0df40b02be2f53ba4505b013a5ba78607a53d1ff6e91b2f6b8a4982effff5e032e8f324d66ec43a117052fe3341d745349ee7ae15012839ed0d11554ab0ff45177551865339ab3c4bb1abc592c97685358649bccf9165e36aa575376edb8cbba8d530b0057442d4e96dcf2df162d86785c084a5f7d59a015e77d5f756075d9218d393ff2953239bd0ffa035e696997b1321d74aaded08e06bb2b8aa098904b7011f018d7941160066d830f404f5e0e5e971675a9fb2c88ad5ced0ee5329ecd26faa93ade37ed8726b5c3192c3dea53d3cb417e1c96d5f6b39fa956377eded3b121844be392905a3100e7aa5fecffb4eb45c4378fc4ec610b506aa4c6e45873bde24a3b52db475ba7973be10cb3b5b6f9bea55bf34dafdf6cbec097cc314091fc84b530fa6104057cc979710896691f25c34ae57d96e58aba0fa4b619b9fb1403e15a680f2a99981a12d58fdbf60bb2b3ea69855186fbb8cbecb8c3532e770fe367c9eea3358ae7f1dcd672110b572d5df1bbe53ff7a91be99418cbb816589cba72feeb895cdaa70a66375a60269d46c532467ef2f5691cfdfe759655738a52ee5e5598d19d4eb0aece78426c3f1c19ec7266d28300f0bdbdca11dd0603c160180e8ee8a93f723363cefaf8580a959f1d2b87479aaa61d3c6975c6cd4513725aafcb6ee8c27fa796d0cbe538f6910736e951752afd326c07b515d7c0fd9feb2dfade2fc7b7e66042ce4c92c5edeb76e051dac0375bc51a1f5dd0af107dc390fdf904cc289ad278bcc2991f760ccb0675f9cccea1a606b29e322cc503d04886210817f7e84794edeac89c3ea78fbe1123a1fd12304de4d5af311359b2a4d0475c0a7f57c3370dab60dc19cdc791d96e77a3739b94d34f871a0a665057210596a4bed34095c1c3b5a22eeb40bffc58aabd6a8fde04babd07987eb7b8bf5602afebe2a4abba28db93dd808aacec2fcebddbb42ea2291f7fb855af611ef2024fac6a74f7d7729d73e4f449acce0f3338a39bc2058de5602df881ae12e7058dde3b71c465b89eccce42ed3c09abac63df8e867b86151bd5cb5f13488975efc1fa480955eadeef6c1332d3e0e509dbb6de85d59e6238cf797f7036109f3be5efdabde68ae488a3b63338857b8f6273ef2200cdb111e69696f93eb2b758fd9764f906188e3e8a08cbaba9c2adadd2c3d2cc973a7d4c90f4360da4a2f172e8adec17faef4745b33fe5c29e4f22ef2325eeff3fe247603e8b9e3404764ce69691db9bf837c3f78342a513a654b1a177dabeb2f7f2d96c2b19031a6e559d7a4ddb5ead99e8d3100fd0ae533fa8c6d6b5771f122eed927afac32ae46851a80dc0dfd3a0ccf4575219d581cdfed52317832fa874258b85324ad6ed2e317d36d5675074bc044acbb0be22b30a9d9ee523b9e96e614b8f952b55e7f45e9d21d4956f02e4090d746cd5142ef0c0d54bfacdb039e082981030c2130ffe77ee0f74feb66a17cce005bd8deccbc69db6ad26bf25bb8f48cb8f9eff5e334ad36fa2fb425da886617daf9820f9a9153d900e7e9c90f3286b2ff06a0369873a38b35fd7846dd063bef99119ad1447da974f73ef8338d59863f74bca087d0e05ffe2fc1fd200a0e87ffc39e71389d85d17f1c70f6c5da25ce110f20391992a4957b2d88177a5482344d3000ad15572aef10437f1db22dd9a70d13ae6e5415cb4830270bc1f895948676e386ce93e31d1d544456b76d551b942177068f3e7ed2409e7083c746fa4343f19e35fc6c70c9aa2d16069769463a91f7a6ed9a9b478e0baa31b569de30fec1e4d2d3441e67dc3883b1eab81819fd1a2e4c2a30efe33ada81585ad19bfb2888cec0c080735b082e26c38bb430de9a3bb68a20b4b734cf9bf1e64bf0dc4b29acbb98ff5569d2b018cc0ababa6efc08715e8f836ae3bcf747551d897f48b52ed717585da48f3d59a6c0b9344e15f23aee89398f4517c8ec74bce5f132a6828af554a813053ac33413e855e8b8246efc3e94cae4bcda91fd29bcaa81f0d04c19c63fa9e308e9965d6f21a6086533a7714ba7f514d9bc58b7f5294f5aad9880ff49460197f9925261f53d32560df4478588849b598ab74dd65d64c912c0107b1edb27ada67eb358d01cb5d99aab44e2e572c31f2508adfcb2709f76edab652f31142084d7fe97962cc1f6369f20b1503221a0bdfa82e0510622bd9e42b6b60553f9d963c15bce37f01ac7e399c31486827ae18723f53de22deb35fa20d229382a5a7063352ca6d2657975e038879f63314e55a4fbb4a3e92899fad95411ba9d4ca958954ce4adc2c8f49c14ba5472d6bd58682a547ed58f14d897c7f91fa4b77f08fee5125e01d432b7df8f41e38e6f8707be5e8818e86f606b1e081a0e92bcc514098e5cf4477be5d62aa4844b0002d2dcc5364", 0x1000}, {&(0x7f0000001740)="d49d8951f2e4f3249e350e4c98fe61e3a023cfc583", 0x15}, {&(0x7f0000001780)="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", 0x1000}, {&(0x7f0000002780)="7fcd8f89f796ccfd4fa6ba", 0xb}, {&(0x7f00000027c0)="e27982d8e54001becdee1ce73e9b2bb54906e90629c710bb9666a448b4dad754c35569b21e13212e9dff59b05ccdc8119d4b245337eefd14a5b617c8df8406a8665bad6933edf42c3fb1ae66a941e8ba793b73b5105b46357f374c152eef5e8475b0d5742f1ee7cef067bb26b7fd9832fc90446cb82e7362c8025b5b782f5b463f227f812b096b7691a25d2c6ebbfb21a783727ec15a540df22e183b", 0x9c}, {&(0x7f0000002880)="683d034c6cc4acdc36b13a04b75ec6a2ac68d62643c7efc7b8bb82b89f8e5a37eaf2eff97546df59444046a036306f36625e6e37a3efc2f0b259db55a1df82f37eb1e589299da566132631a2983b69c93a6e5b8c4e26efe1d9deb366379d14d5a5a2d0dc97701f6dbe36f30d4efc3cde3afc", 0x72}, {&(0x7f0000002900)="89a74fe3440a3052e9fcb0924fa849496dda7a2c6b2e9f0b3495424e75b486029b0ea73bc9b222bc68c23662fd34a6512b129c95bcb97e704d91acbd2967b1a34dc42eb8bc430ce3c378428cd76105f28955bd0068abc39d1b2f88b97dc24d2ff49663534cfcb08ee07660c28f9fb897b7ed72ff511e2411a8f0768e22bed145ff6912ce243a492ccae01fa85797f6769a962927c4d2336e0e13a317e5c155cceab22fab53c1639fe1163d1f67bbc40ab388ad58267df7c3f48580badca8f58bd3e25818379e68fb5805ca7e35db22d396379804a363929f834f87e337a7493f58e1771068438396014544", 0xeb}], 0x8, &(0x7f0000002a80)=[{0xc0, 0x10d, 0x2, "f0b46e55aaf892e85ceec6bfd46cf5b5976a75f98da1eb3f3fde5cac089b92b1bb07b17612d8e84892d850b38d7342b5eb075bae567d803a7499d70b7768a38df92d02206d7c0236da23a869920b5f38a1d02e8e36ac3f97e44f82fca7d92a4b7eef2d8c92c1682fb9991054670df37778f3834b0ee6746c4315c40153a5ad0d5ca988fd0db3f3f085b50117b669e70496af98dce9cf280433f395517fd2a0f36eb29a99e4cb4c06d2e1cba95e"}, {0x48, 0x110, 0x7, "84ead2811f130ee81b9c7a4839afab277d3827ea765b82d970f34fcbc0dc5c2a20953f59eaba94cbd7b654277202a85ae42eea448b33"}, {0x28, 0x88, 0x0, "0eec3417284b6dfbe15ca3f2ad049876211de2"}, {0x78, 0x111, 0x4, "45a36dd9c8b532070675a32525cdcdd368c444da023090b6875d3c7133ae86635b9c0286edf8ec76e4300c7e1fb442ca0ae3cba7295572b5bedea041a2cfd3a5f04a14725548e1de5c9f595c74800b2b845398c93e3333c606d82c13482f817d34"}, {0x20, 0x107, 0x86, "ba42f8ff94e9107beb508eb375"}, {0x30, 0x0, 0x5, "02224abdd134d93496436cc1449b7276c861ac52948cb5646bb13e72fbe9bd"}, {0xf0, 0x5ee76c342aa3b724, 0x1f, "15ea2a1b4d26cd1cc39dc891fd3dd7d86842df6aab263c958094816069deee7eaea12a8aa70d7d2504c195b8d6fd7e09f81ef47a5811085d662aad34450e9d873c50fec11be06beaae0dddf799c25969c9a22aa9ca3b1aedd89291bc88e17b093a2f41bc21ce6aa56e70fb2bf04c03af8a98db119a3433191afcc0c1bb92be0aa5dc5a67650954ba67c60dc464e2b4fd6411e6e2ddb389b2668b90f510257d9d833271601b07b64b5155f1c7ea7998cc6f93d8a79be03b629889e81bf9a593551c249cae5ae754efc4bc04306969987680ce5ea952f6c7f756035b"}], 0x2e8}, 0x4004) prctl$PR_GET_FP_MODE(0x2e) 19:40:06 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:06 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000051) [ 835.016732][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 835.022542][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:40:06 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xc0, 0x0) 19:40:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000003c0)) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x4000) r3 = getpid() r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r6, 0x40a85321, &(0x7f0000000300)={{0x8, 0x2}, 'port0\x00', 0x40, 0x1, 0x6311, 0x2, 0x3f, 0x1ff, 0x80, 0x0, 0x1, 0x9}) prctl$PR_SET_PTRACER(0x59616d61, r3) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000001c0)={{0x9, 0x6, 0xc4f, 0x5509, 'syz0\x00', 0x2}, 0x1, 0x30, 0x1, r3, 0x6, 0x2, 'syz1\x00', &(0x7f0000000140)=[':p}md5sum\\#]lo\\[procuser(self\x00', 'net/igmp6\x00', 'net/igmp6\x00', 'net/igmp6\x00', '-\x00', 'posix_acl_access:\x00'], 0x50, [], [0x1, 0x0, 0x3, 0x8]}) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x10800) 19:40:06 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:06 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000052) 19:40:06 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) clock_adjtime(0x7, &(0x7f0000000180)={0x400000000000, 0x5, 0x1f, 0x7, 0xff, 0x0, 0x6, 0x1, 0x5, 0x6, 0xfffffffffffffffe, 0x100, 0xb737, 0x80000001, 0x9, 0x8001, 0x40, 0x4, 0x3, 0x3, 0x0, 0x3, 0xcf, 0x2, 0x8f0}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x1c, r2, 0x11, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x14408010}, 0xc, &(0x7f0000000300)={&(0x7f0000000080)={0x24, r2, 0x20, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0xef3}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x24008000}, 0xcd) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r3, 0x28007d) r4 = syz_open_dev$vcsn(&(0x7f0000000480)='/dev/vcs#\x00', 0x2, 0x40) r5 = memfd_create(&(0x7f00000004c0)='wlan1trusted\x00', 0x1) r6 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r6, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) r8 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r8, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r9 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r9, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r10 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r10, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r11 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r12 = fcntl$getown(0xffffffffffffffff, 0x9) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r14) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r17 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r17, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r18 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000b40)='cgroup.procs\x00', 0x2, 0x0) r19 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r19, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)=0x0) r21 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0, 0x0}, &(0x7f0000b34ffc)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@gid={'gid', 0x3d, r22}}]}) r23 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r24) getresgid(&(0x7f0000000c40), &(0x7f0000000c80)=0x0, &(0x7f0000000cc0)) r26 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r27) sendmsg$unix(r0, &(0x7f0000000e40)={&(0x7f0000000340)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000400)="d1f5e4043d4caa9ade9c8dd3c32bac2c65bcac936c52bf5c160e34ece6580c3c5b09e3041b874d3a367d52dc866908a5dc72be2d4e9a3029103ea45976a29844b253188d2d8f8d01b367979f78b64a0cdbacfd9772a9a4c9df384f6bca21c87828", 0x61}], 0x1, &(0x7f0000000d00)=[@rights={{0x24, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r4, r5]}}, @rights={{0x30, 0x1, 0x1, [r0, r3, 0xffffffffffffffff, r0, r6, r7, 0xffffffffffffffff, r8]}}, @rights={{0x20, 0x1, 0x1, [r9, 0xffffffffffffffff, r10, r11]}}, @cred={{0x1c, 0x1, 0x2, {r12, r14, r15}}}, @rights={{0x2c, 0x1, 0x1, [r16, 0xffffffffffffffff, r17, 0xffffffffffffffff, 0xffffffffffffffff, r18, r19]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r20, r22}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r24, r25}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r27, 0xee00}}}], 0x128, 0x4000}, 0x404) sendfile(r3, r3, 0x0, 0x2008000fffffffe) 19:40:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xc1, 0x0) 19:40:06 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:07 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0xfeffffff00000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:40:07 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0, 0xffffffffffffffcd}}], 0xdf, 0x60000000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/48, 0x57b) getdents64(r0, 0x0, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:40:07 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xc2, 0x0) 19:40:07 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:07 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000180)={r2, 0x1000, 0xda35, "9a76b7249bd592f04067c758ac72ac5cb91a73799e9fed60b226082538125f8cdb5d63e186aa5e111e8ec2a0eeb7610127990b29d722e0f03eb89d9895b8aa5dc29134690ad26600ca8c9459fd1553666d599f3242a16cc7e2ee9011424c233d2c9f2f6d8f52bd503eacb56d1313a5607a81f00e64f14438080e9762e9aaa8c355e4f27c7075a4547bb6ea8031ab34a25193963f2aed823bda0fd749116b44aad6dd5532bbcbb974ed991a5d08173b202e05b616061f61e0938e06772e1f5af82942a27d1275248b"}) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:40:07 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:40:07 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000053) 19:40:07 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:07 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xc3, 0x0) 19:40:07 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:07 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') socket$nl_generic(0x10, 0x3, 0x10) getdents(r1, &(0x7f0000000040)=""/48, 0x57b) getdents64(r1, 0x0, 0x0) mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x8, 0x36, r1, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:40:07 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xc4, 0x0) [ 836.711902][ T1952] attempt to access beyond end of device [ 836.761473][ T1952] loop0: rw=2049, want=130, limit=112 [ 836.820889][ T1952] Buffer I/O error on dev loop0, logical block 129, lost async page write [ 836.922405][ T1952] attempt to access beyond end of device [ 836.998916][ T1952] loop0: rw=2049, want=131, limit=112 [ 837.023570][ T1952] Buffer I/O error on dev loop0, logical block 130, lost async page write [ 837.041308][ T1952] attempt to access beyond end of device [ 837.047072][ T1952] loop0: rw=2049, want=132, limit=112 [ 837.052673][ T1952] Buffer I/O error on dev loop0, logical block 131, lost async page write [ 837.089132][ T1952] attempt to access beyond end of device [ 837.140042][ T1952] loop0: rw=2049, want=133, limit=112 [ 837.145505][ T1952] Buffer I/O error on dev loop0, logical block 132, lost async page write [ 837.168542][ T1952] attempt to access beyond end of device [ 837.174345][ T1952] loop0: rw=2049, want=142, limit=112 [ 837.180493][ T1952] Buffer I/O error on dev loop0, logical block 141, lost async page write [ 837.189650][ T1952] attempt to access beyond end of device [ 837.195405][ T1952] loop0: rw=2049, want=143, limit=112 [ 837.202160][ T1952] Buffer I/O error on dev loop0, logical block 142, lost async page write [ 837.226329][ T1952] attempt to access beyond end of device [ 837.232449][ T1952] loop0: rw=2049, want=144, limit=112 19:40:08 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:40:08 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x0, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0xfffffffffffffde1}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) write$P9_RREADLINK(r1, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 19:40:08 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') r2 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r2, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x1d, &(0x7f00000003c0)=0x1ff, 0x4) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20000, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x202083, 0x0) sendto$inet(r3, &(0x7f0000000140)="c6193c18f3ed4227cd25b25152229dd0fbf32bc552ed781739fcaf0d48b25df911ba284e72498d2dbb6b59da70a5343d241abeead9ce87396d7dbaaff685caf0c3ece92db112f8aac3c29482a049dbbfb21ae0ee2b6acb", 0x57, 0x64004043, &(0x7f00000000c0)={0x2, 0x4e22, @multicast2}, 0x10) preadv(r1, &(0x7f00000017c0), 0x315, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, r4, 0x1, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x2000016) prctl$PR_GET_FP_MODE(0x2e) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:40:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xc5, 0x0) [ 837.238168][ T1952] Buffer I/O error on dev loop0, logical block 143, lost async page write 19:40:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xc6, 0x0) [ 837.360180][ T1952] attempt to access beyond end of device [ 837.371052][ T26] kauditd_printk_skb: 28 callbacks suppressed [ 837.371064][ T26] audit: type=1800 audit(1570909208.452:729): pid=1985 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17587 res=0 [ 837.380809][ T1952] loop0: rw=2049, want=145, limit=112 [ 837.501325][ T26] audit: type=1804 audit(1570909208.582:730): pid=1945 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/675/file0/file0" dev="loop0" ino=88 res=1 [ 837.536496][ T1952] Buffer I/O error on dev loop0, logical block 144, lost async page write [ 837.632734][ T26] audit: type=1804 audit(1570909208.612:731): pid=1987 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/675/file0/file0" dev="loop0" ino=88 res=1 [ 837.725324][ T26] audit: type=1800 audit(1570909208.632:732): pid=1945 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="loop0" ino=88 res=0 19:40:08 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000054) 19:40:08 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:08 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0x400, 0x1b7) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000140)=""/85) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:40:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xc7, 0x0) [ 837.763892][ T26] audit: type=1800 audit(1570909208.662:733): pid=1987 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=88 res=0 19:40:09 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xc8, 0x0) [ 838.050776][ T26] audit: type=1800 audit(1570909209.132:734): pid=2018 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17572 res=0 [ 838.173298][ T26] audit: type=1804 audit(1570909209.242:735): pid=1989 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/990/file0" dev="sda1" ino=17587 res=1 19:40:09 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:40:09 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/48, 0x57b) getdents64(r0, 0x0, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000140)={0x7fffffff, 0x6, 0x9, 0x88, 0x3, 0x3dd, 0x7ff, 0x401, 0x8, 0x9, 0xeb, 0x5, 0x19ec, 0x0, &(0x7f0000000080)=""/68, 0x200, 0x7, 0xb6e}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1115, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) 19:40:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xc9, 0x0) 19:40:09 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x4) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:40:09 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 838.536724][ C1] net_ratelimit: 20 callbacks suppressed [ 838.536732][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 838.548214][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 838.551604][ T26] audit: type=1804 audit(1570909209.632:736): pid=2044 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/676/file0" dev="sda1" ino=17572 res=1 [ 838.592690][ T26] audit: type=1800 audit(1570909209.662:737): pid=2046 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16530 res=0 [ 838.618831][ T26] audit: type=1800 audit(1570909209.672:738): pid=2018 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=17572 res=0 19:40:09 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000055) 19:40:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xca, 0x0) 19:40:09 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0, 0x0, 0x0, 0xffffff11}}], 0x1, 0x0, 0x0) getpeername$netlink(r0, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$rose(r4, &(0x7f00000001c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') futimesat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}, {0x0, 0x2710}}) preadv(r5, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r6, &(0x7f0000000040)=""/48, 0x57b) getdents64(r6, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000240)={0x4, 0x20, 0x0, r6}) splice(r1, &(0x7f0000000200), r7, &(0x7f0000000280), 0x400, 0x8) 19:40:10 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xcb, 0x0) 19:40:10 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) gettid() r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000000)=0x80000000, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000000940)=[{{&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)=""/63, 0x3f}, {&(0x7f0000000180)=""/63, 0x3f}, {&(0x7f00000001c0)=""/232, 0xffffffffffffffcb}, {&(0x7f00000002c0)=""/30, 0x1e}], 0x4, &(0x7f0000000340)=""/24, 0x18}, 0x8}, {{&(0x7f0000000380)=@x25, 0x80, &(0x7f0000000880)=[{&(0x7f0000000400)=""/156, 0x9c}, {&(0x7f00000004c0)=""/242, 0xf2}, {&(0x7f00000005c0)=""/173, 0x4d}, {&(0x7f0000000680)=""/25, 0x19}, {&(0x7f00000006c0)=""/15, 0x1d}, {&(0x7f0000000700)=""/234, 0xea}, {&(0x7f0000000800)=""/75, 0x4b}], 0x7, &(0x7f0000000900)}, 0x9}], 0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) [ 839.176741][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 839.182581][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 839.188443][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 839.194210][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:40:10 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:40:10 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xcc, 0x0) 19:40:10 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@remote, 0x4}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r4, &(0x7f0000000040)=""/48, 0x57b) getdents64(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = dup3(r10, r9, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000001680)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001780)=0xe8) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000001940)={0x0, @loopback, @broadcast}, &(0x7f0000001980)=0xc) r14 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) r16 = dup3(r15, r14, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) getpeername$packet(r16, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a00)=0x14) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000001a40)={0x0, @multicast2, @initdev}, &(0x7f0000001a80)=0xc) r19 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) r21 = dup3(r20, r19, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) getpeername$packet(r21, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b00)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000001dc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001d80)={&(0x7f0000000300)=ANY=[@ANYBLOB="38020000", @ANYRES16=r5, @ANYBLOB="000326bd7000fbdbdf250100000008000100", @ANYRES32=r12, @ANYBLOB="780002003c00010024000100656e61626c6564000000000000000000000000000000000000000000000000000800030006000000da0904000800060003d0117164b9e46cff940934ababf9c3d98493d02ca309a2476ddfde1b4144a79ab992d6fc9a963259899a929303b0981911ae815094ef3280bb81f991dd26ca166d50d3a204c58f445ca4", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000800000008000100", @ANYRES32=r13, @ANYBLOB="e00002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000000000008000600", @ANYRES32=r18, @ANYBLOB="64000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000340004000800818e01000080200008ed09000000090020017f0000000500010504000000ff000009ffff0000ff0fa4c30900000008000100", @ANYRES32=0x0, @ANYBLOB="b400020040000100240001006c625f686173685f737461747312fedc08df747a480000000000000000000000080003000b00000008000400415c0000080007000000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000200000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000df000000"], 0x238}, 0x1, 0x0, 0x0, 0x8000}, 0x4c01) ftruncate(r3, 0x28007d) sendfile(r3, r3, 0x0, 0x2008000fffffffe) 19:40:10 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) prctl$PR_GET_FP_MODE(0x2e) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents(r1, &(0x7f0000000040)=""/48, 0x57b) getdents64(r1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 19:40:10 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000056) [ 839.576729][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 839.582547][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:40:10 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xcd, 0x0) [ 839.789855][ T2114] attempt to access beyond end of device 19:40:10 executing program 5: [ 839.838859][ T2114] loop4: rw=2049, want=130, limit=112 [ 839.862628][ T2114] Buffer I/O error on dev loop4, logical block 129, lost async page write 19:40:11 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 839.932435][ T2114] attempt to access beyond end of device [ 840.005659][ T2114] loop4: rw=2049, want=131, limit=112 19:40:11 executing program 5: 19:40:11 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 840.093659][ T2114] Buffer I/O error on dev loop4, logical block 130, lost async page write [ 840.186977][ T2114] attempt to access beyond end of device [ 840.232271][ T2114] loop4: rw=2049, want=132, limit=112 [ 840.292563][ T2114] attempt to access beyond end of device [ 840.309260][ T2114] loop4: rw=2049, want=133, limit=112 [ 840.333477][ T2114] attempt to access beyond end of device [ 840.350979][ T2114] loop4: rw=2049, want=142, limit=112 [ 840.376729][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 840.382539][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 840.438385][ T2114] attempt to access beyond end of device [ 840.489605][ T2114] loop4: rw=2049, want=143, limit=112 [ 840.505132][ T2114] attempt to access beyond end of device [ 840.511574][ T2114] loop4: rw=2049, want=144, limit=112 [ 840.518444][ T2114] attempt to access beyond end of device [ 840.524326][ T2114] loop4: rw=2049, want=145, limit=112 19:40:11 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:40:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xce, 0x0) 19:40:11 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000057) 19:40:11 executing program 5: 19:40:11 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:11 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xfffffffffffffffd, 0x103480) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'gre0\x00', 0x4}, 0x18) fchdir(r0) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000100)=@rose={'rose', 0x0}, 0x10) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) connect$unix(r2, &(0x7f0000000200)=@file={0x2, './file0\x00'}, 0x6e) ftruncate(r2, 0x28007d) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000180)={{0x2, 0x4e23, @multicast1}, {0x5f76ebd2d33521f6, @remote}, 0x64, {0x2, 0x4e21, @multicast1}, 'lo\x00'}) 19:40:11 executing program 5: 19:40:11 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:12 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xcf, 0x0) 19:40:12 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='v\xdb\x1d\xf8\x1d', &(0x7f00000002c0)='./file0\x00', 0x7, 0x2, &(0x7f0000000080)=[{&(0x7f0000000040)="cbd43c887e4d48c186755759c1e101ff667d30d836ab010f0601677096b4c78259e0c1c962358bff2e9cfa64cbd48bd3ab2e448c89ee257c5979e96589ef619a", 0x40, 0x81}, {&(0x7f0000000300)="f447b89bbef068b51a52e9f25931e716138c1e6db6642cbda5522e61eb45aa49805c6ace3845362cba291a7e9ba7abdaa71b1eeece5fd9a0147c5cdff5b9b1827801e978462d3385e6a50f45f5704d03139e032171d263c0a3bff24326c95ab274cc3d14d61a4db14aae1b99464958a60718fc263007ef468f80ac8b5738e5c15162f1c6f85d3741357ef96f5b82d9147d6716c9da291fa424a3520e86776867f31b8036b678faaeb98133947f5a6334e15e6506ad7fc3e549f0a9a8bdc7fbb0e3760d77440c62267f40b70e2b25b6cab5eb2541e4997ecf225ceaa0c5096d0eb8b3fb0110cd951b302964a155395b109f00b44937d420dcdfdaf0864cc8a90f29a68c6f2c36cf7aae5a3153cdb54aad3af1e24ece177a0248ad55998b7343969763200e9f3720aeb63730542c01b3fa1c23612f5d7da2da1405bfdc169e26de42878e8216744eb9c5f992e757f1525d5f1ed646d81f77c0868dfca2be94066b5f9eb25dbf3d788f3d346a737059f43845eba75546a3103f0fc424dff91d8a76d257b4cfab74ba9a290252515c01dda4da2403a808b9bffc37daaf8843c1ec415fa1a82997b407d06640bbaa7c3c69bc335fc0c2b06d241103b6d8086ee35bd5f858998162734cca07bf7aa0d75fdceb55449d8ec14d3e90ff28d51625cbdf3121e026a9aab009a3ba5b420e8a0ef89d1c76e415e0f4808840e690f5ca3bc1f5b7c4c41ccc391e7d24d293e5b8952481c303d44f766c02a3b736d87f9c8f3bbf0494b3c350ce7df83321e4019b9a7a44fd08fad5d62190016f809965df2b304ff581ee35bb3028d11fa08fae0192f8a0c7a7117de3b0438caad51fad78725547a417ba943740d59213708056d4a6aa19f77e0c69c1ecfa1ee26b9556b81ba27494afb9e09a7cd0ca682942bf86a5f73291f046832e8414cf1685e1480a0e8355a6c49c4ad53b3ea6a2461fa4f891c4ffe063c219fcfa75ab905983e174d6eedd89717497ddfe1f6fc01f501f51c68a63edf47ec98952b9db4bb44ad1d8bd202e4d470b95ebf88e740ef8983198fedf5c9937a901d3c9552e470c69c985f375ebb89cad9b8edba23909747b10502e70a2541dcb729b8f1f676dcd7a51acb34508f7d17b185cd89381e46e4504a4525af1ab2ad6975cce9d9f541dc1a90a08a932f8f8090aa26b3dc02bd422ef9f3b3ccf50aaca2509db0c07ab0f26db76aaa1224653163db3b22bf1e6db28ed63c2209038866688abb1431e3f69090cc9183c427d188caca0e29bb15612bfc2586c16bf98f5de175d3c57e5d02806585ead8439b91f735cf77c3edac9a96c39395d6be3737c0a756a4dfcc5349ee9de39fffd249e92c082577589b2dffbccf43b680f34c831c6ba3aed3d2e33e4fe4a3cdc3d5dbaa2c3293e44ece3de9d05a7d3b562fb5251ef144faaf5c64ebe80dcf284403efe416041b5da9abb6f03b6e606eeb0a84b785f5d08b3eca6f0e27ce9f4ab0368faed9f2ee5e85a2627e76e51b0899f9b4d945f3d659b6992aaba846acf83847bd1d1d38048667258fb972c4cb803a5c5a8dc0ee9fe22f37ea7bccaed2a6031f39414c6965f285831d93ff5df719b2c65261aa38daab556e228bf5ac47d9e822424eb4ab65629a9773f246aa4a7435d394a78ed62ce30e30b32ef789eed88bb0c41862b9948850d778660d607ea574d4be1cb9c560d3b09e8afe957e5ac8fa410fb2e1142b63fdf0f35b4f5bd85e419f4a2aafc826f52946c1d75518410dedda3e3821161360bb8a55875a485f0330ece4e0126f2ae52130368c0e510b5560b08bfef9bc5508d50970c6e63796db78420a1c05b5d3b2a862b14f2e52abcf5cc3a1abf0f3c5b2722adc54101cdb07f0ef15c79b728809fc4a5da71b9460fd1b7ede2592a4b35f40f788a43eb1c69aee01eb27bd3a64a9d95b9646560b13f2def5d6255789dc5a15cfdf222cc1a1b9a0385115f8662267f8fc5ff5390a192b7a32437a13300653d373a516dc4ff17d78f2d4ffb83a685f4c9fe9500ce75ad50765532538390ce0bf10fdf55de17da29570cb60cac3474548db987ad3b4cb28c79949ff7085009392df0c4d8d7baa7cc20dd9761b6bdf4f95d1f793ec0bed6c127960d2f569c640b04ea7edc37aaf1269e7599c29a6e9e8df089cd5ece0332746dc8eec15e1d6fec2dddadd5f91f6e20397f85ca6405124d528436f64c9d786adb22b36243b2d2c5dc6626e0e72093cc29956be1794a2a98565691c48b3eaaeddcc99420a2f66d6d82a242e0198cfc71cd0a3ed16d79f62bba5d360a1fdda1a9edde5f13bd8881e55904bc1b4b67a0efd63bd6c2b38050b2474cdf6f0cc1c61e02fd73b18e6c4a80a5b7ad6da5412a3253f0b897de999bcfcfe1f4d5d793829c5361ff227bcc0df74cc495c14c867952161f32413d81b3c18999cbaa4209770b1dec217ca30c5ccd8567f87c8cade7def29fae4385b205601c55b01e9d54582af145c9e1180de69d719d44e3e3670233fb710efa9224cd481636d9f67b2532ad32dffbc55be2f4ac0476e9a465b85a7fc04e938b186b5978d5ddc604baa5ae133134ad960d1b45f25c88392bb4d181915f7ecdafe4b3056631fadb7865f7fe70700d187c42b056e23eaecc364a7c71b8bc2acaba1350488171ea6328f1cee3077a8cf9da97bd0746c2c7cb9a838c9425c98f9fba70f8b307106ef7a145085c6d29f0fbe5ff0ea8735f0d8de13dbc40d4105f762bda0f0b0e25802967b4b512e2203549e3e2148dab475925e0f2414163ba05ddd2c8c56aa2b1b12af6738bb368af7974aade02230fbf7bbc97c55da37a902f4ca8dec98bec9285bb881e1e658b022940e243ebf03d9a6dc3741eb52ce85740404d889d01af9c069d125990b879882ec5918b6030be57f68bb80e554f8ab9e9eca8fad03781658c2325f11845d3135f469bdb22a4866999b69ebe6272cef1c89663530115a312d6c6faea8a93a9286cad244b49be0950b0d71322571d9ce509cfb2ebe13e476b0c0c9a397cf1de80aaec28d8823d765e1fc05c475fef1d86ff575edfa90b5acbf9be1837fcf670487df1e36d42be8f6d374fdec2d8d4860295d2753029a7ffc9f0d2191fe7a91c9ea47f1921477d8db1686042f3b026dfec5f07b75dd93f48097e6344bd93ea2f421a199a5b49aac3a66ecc755d137b8aa3863c272b2fb46a5b9febc8598b7ca57804e0da14294a30a440f261c94851b87cbbc11f7bdfbabf1f8f439b07a1527f495762bb1995954e7431c8e998d2e2cf98bb6f03133e21b95823a1cec186616d76da658fb4579dbde95e08afd2d9f63773c2a2cb4ee182c0db19b854f2178c6313baa9ae713a9f864056b9aa61edbd8f1a376740481992d5402aa753395404507ce1cf2b95e08d43bd54b0725394fcb12d1436049431fa125425237a02f673205234966479259c68e2042572eab98e56ee152cd69672a9f08949afb4d5c04944931b121425860ce5ad96271c95919f6547685e92696ac8ee7814905210d7b8a06ce5399e75641f0210d518e7d052b9b4bee1d489930e51bb329d10127eba80a57b9e6b3b36d4a21478e980288499608c04ef2fbae91f376fb1cda7a616dc2a71eec69fa433098b0118446f36dc49040c85272a2b81833747ff9e283b754c3b92490d654d05374de13514bb662b6401f29cc38244593f433042a4e726ce3864f961b4a4e6b63e1f1c2e9f8dd60a1fffe4a35407324c72ea3b8ddd68133a1a6646bde0c9f2a079d7e9cccbe3b5a988debd39688ac9fbcc62f3cfe179a18a99670f1173af122639b763ac0ac3e2dc74c564e8e898ea668ec8ae3ea9fe10fc7e62b7c29c39781f557cf9a1615cd20bf35d2e4e63cefdf663cd77f1ba3160998670201034913615a7e0260e3871d7b1fff43ea0c444194880bfebfccfee4fe4c7c30232b0c542cc529dbff2817cd2eb5241833a4d139c65ddd36c044a03a00f2db6fe308408510166ade8d7110f9b563cbc17d1f67dfc7d7352947f7c882dcac77946279ec185752c47deb5cb14864ff1d6de188535917cbaa1a98020dc14f1a80a79f67c9d976da370e8713405b06f20f1e0b522d320c670fe3eac713a95775c9e493b050f20c7e2c05f6d55c701e61deaff022ce3dd31c2322f0d6d9aa43c0af655989ff83e2099894b51d7914c7a81d0dad2b43ffef4a8fa927d645fb6fa69d8d81e9297092405150804f85360fdba0d7cee2adc8291b12abc2448b496261044da101d8e63dd83a68bcca22d84f595389d34473826670fb9344c31b374cd242046723629be3ee4e8a1f02141d808721db2175e865cb575422708a13651923497d59f4c62392371c380022c679831af93fe678e1772bbc95525fc676320730edd29fd0a95f3619d75636a9864597f837c3728fc285493c6e7797cc5de9240d097517d84c16b651fce1a93004860ad52340f69263687b6a51222b518db1b8d9a92dfa754c60729517217821ba716df7c692470653191a4ff2ac0fd95913d4d21b0330c677ae8147ea36843c8d3c5093dfc92181be4517e64cacbef38fd6085df7b328f779af53d13c528320b3b69d5fa4d7b2c26c4e47b0f40a2e66c0b8e7b6401ca5cb81d7dfc699bf68807fe5d1e05cd7e429ae789303f77756d4643b81d5ca54911e4595f5f1e73653f0f148fe99289092f0a218f4c0792264aef313e566a29e04e51d7a6b1326fe38965734245f063e6386d4a589df1e9b53b338d001fa1cfa332f9c52c199cf0635e6e3f1520674d7ded4124dd732188713258e748204385aee8ee3ef4a73185d9faf898c9e58254d29f91212649388bd36496a0588d64506594717738ee648dea33c5b4315849b163d52551447a7be5f2930a4871de58c390c331eba6bdebdee08c121be02e24ffc9b841f8f7a3b628238820dcc56d14b7f30fb6b252f4ef4c3b00f4e96d8176bf3054629760663b5171996ca1b3c6744389813c478cc73c6eadf8ad6ef1ac656403f73f954e3f2e99a86422ac3a67155b661e3ad90723b98ac84dff93be39ee3778fe50e34d0859b1f1ca9ec50ff9c16ba79bc6134694620f961e9e502ff864e7180a2bd46858dcee932c3dfb9a528aca7303c6d128dc437cb55768b88296583f04ea6b1f2c3cd3d13d9511e20d3a40aec0b417ff63c25cc279937330f0bb3ef59d0c6e4af46ae9598e7a304a2afd7d57f31f01ca44970cb98effcb2fd2072162b7f3ace43302448a8a5297e627403672ae6e6a18b3e1f0de4f8af863c8f55a90ec8ceb867e6da4645aa66aa45cb0c6767d4e79ad5d1672d0bb24d1808a17a2242019463d69f707110253db107707135667841b69c0b2d952d38d4183802f2f98b4efb3cdeb8bf1fc6b428aeabc125c98706b7128aacde296dd7137e8b67764a77481028c576bed857a014b5f189db420c7ef98462061ce81e3fc05089b09463d98cd60ab8f55d504f6032a2ccb94fa2e44d027a9d0d2f3d3779b2a9a1aa020080d0deb50016853b9eafc9a20d6df3ba250e844ca7e4bb039114caaa1cba0c349ddcbd5a64c6a54820d69c5b1875be41e44efe415fc26dacde2f4ee72901b606390616959673581c1f4c28ccc4f74d6c495b0b9d9fdcff2a7e8f992ad068f8eb460ef92488cd46a6210a87240840c7b0878dacbe02eb0f37d5e533e338ade0498150e70a0f696a2463452c5290eee6807b891917e2ccd85f245c7080d69c1b8772c8cd65fe43c97cbe6ded6b261d9f3c05be5da598ad669d1897e5e6a19e0122651b26368cc60f5061ffd4dfd56ca2f57b72a34", 0x1000, 0xbd}], 0x8000, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:40:12 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x810, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000080)=0x800, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)={0x0, 0x5, [], [0xc1]}) 19:40:12 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 841.328485][ T2199] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 19:40:12 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x64}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:40:12 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000058) 19:40:12 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xd0, 0x0) 19:40:12 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_PARM(0xffffffffffffffff, 0xc0cc5615, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$chown(0xb, 0x0, 0x0, 0x0) 19:40:12 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) ftruncate(0xffffffffffffffff, 0x28007d) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2008000fffffffe) 19:40:13 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) rmdir(&(0x7f0000000380)='./file0\x00') dup2(r1, r0) 19:40:13 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r2, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r2}) r4 = socket$netlink(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, r5, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xd3d38f3baff106e9}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x58, r5, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1dc0}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffb}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x998}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x400c000}, 0x4000) sendfile(r1, r1, 0x0, 0x2008000fffffffe) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) timerfd_gettime(r6, &(0x7f0000000280)) 19:40:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xd1, 0x0) 19:40:13 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xd2, 0x0) [ 842.385577][ T26] kauditd_printk_skb: 30 callbacks suppressed [ 842.385592][ T26] audit: type=1804 audit(1570909213.462:769): pid=2235 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/680/file0" dev="sda1" ino=17598 res=1 [ 842.522630][ T26] audit: type=1804 audit(1570909213.462:770): pid=2266 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/680/file0" dev="sda1" ino=17598 res=1 [ 842.658185][ T26] audit: type=1800 audit(1570909213.462:771): pid=2235 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=17598 res=0 [ 842.680984][ T26] audit: type=1800 audit(1570909213.482:772): pid=2266 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17598 res=0 19:40:13 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x194}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:40:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) rmdir(&(0x7f0000000380)='./file0\x00') dup2(r1, r0) 19:40:13 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:13 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x200800000000059) 19:40:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xd3, 0x0) [ 842.779040][ T26] audit: type=1804 audit(1570909213.862:773): pid=2271 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir927553424/syzkaller.jICU00/996/file0/file0" dev="sda1" ino=17572 res=1 19:40:14 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046df72f6b203c89dc1e20cf57c26af91000000000000001deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca93547080000458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000001000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) rmdir(&(0x7f0000000380)='./file0\x00') dup2(r1, r0) 19:40:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xd4, 0x0) [ 842.954903][ T26] audit: type=1800 audit(1570909213.992:774): pid=2289 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=90 res=0 [ 842.978672][ T2296] attempt to access beyond end of device [ 843.044222][ T2296] loop0: rw=2049, want=130, limit=112 19:40:14 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x7d, 0x8, &(0x7f0000000780)=[{&(0x7f0000000180)="a71202c7febf649bfe8b60cb94c050fbd5667352bcc44c2920abd315effa3846a4df9476dd0321e8528a424eebdbb48d38205b0851f8b8677a087fb6d14a0a3cbb2a3b07e0daa4d6276d464d862e0ba1e7d39488cf0867689a1252c087e3e2e6f413d8a3a399e28ec51e8644ca392b6321ec2618eae0164bc1849dd252fe3c5bc7be006722544d3b89c561c862246e950b748f8e6f6dedcd2683367b407c204d80b1e09b5a38be649b", 0xa9, 0x1000}, {&(0x7f0000000300)="accbded0dc3c61e8f4b7eacd06e3422f4b297827db2b2c884b8a6b3afbae2f386e8968aa9841ed3723c84f57c88d81cb22050137f22718bea9ba4ea65e1a1375c23a97d8894840022f705268682a7115f24f49541375b4741dde5818e43347cc587c61c8bad7c5124020f6975dd7104cde4cdb6d834fdd824c556c4c1ffbcb7b7ba535323fb68ce6ef253604d45c7685a8484d5f3bed585589bf289f10d00f8b7ea3bdb05d0fcead89a99ba5d514f587cba70558d126da0728be0dc03e27523d468e4d0efd24c0de9f1d15d7e918354a1ae33bb8b29be2235e7b3e2b187bae8a9572", 0xe2, 0x9}, {&(0x7f0000000240)="dbfb2418194210c5a2cde4bc77a89f9d2830461cba03272fa0b20800be7f5cef1c64cf0989ad44370c00b80e776ff87bd85cc6149a4e46deb8b95ed47b8511c9bcb3da3874831194f9363c767a8779c5d22cc95b80973be52e688c5318", 0x5d, 0xfffffffffffffffe}, {&(0x7f0000000400)="0148ffc15b5ba47f97a761d70085da9dc800f913d042b700b77673614c3b69653a77f8af7c949bdbc79d2458cfb734e2548f25e43d6b31858e8fa412dfb65afb6568", 0x42, 0x4}, {&(0x7f0000000480)="d16f5cd03985479309579b67a8cee54ea6b432089148b8e211527d62214c5c9b2f791d6aeca1aa7b68d9886c5181f2d1ae1c17b94507e206e6b323916ef650ae032c8bf8c965223890536bdcf3202ca362d930c64868d4a5ea92754dcdd1374f5f45e40a07c6ffecd79894ab354c5789fb5f240c122c10cedbcad3399596c5dc06a0b95590332b76d45d22ec1703d0fb0dcbced69822dc594fae000c079a5d41e6d92be1216f44e913a00466230a9dfebdf4", 0xb2, 0x2}, {&(0x7f0000000540)="d73f6727f0efb467b30c8926325824ae14dd92389706688c5f4ca406691dcd132a723aab6ee4880201df9b48e9989ea900615914d58813eb6573af9745b6ad7695261c2f9249433749f3b83ed16d7127a278b39fd46b87e241c1c43863f65c8659a0f07b1e835a6c840d4aedc58f853b8eb4451df8126f", 0x77}, {&(0x7f00000005c0)="f759b4b5f5f0a15f741d048963d841d35e828be856d12583379e28638fcd25dba8e1d9a0ca17e178822d2202cfd7197760238d5026abdda0e4d808e089df1cbb86b87e9eed7d5b275eb1ba6de54a397e4e146917e237b957a47c23b5913fa9687690b899da9fb2e6f35a8909f9ef13d167efc2d7fc1de9b3569fc2d54ff93ab155afb66ee8229bb33c9be5244b6b07190260188a4867e56f4ba48317db92b0e09c5cba1495a0af07fee464bb13b8a1b864", 0xb1, 0x8}, {&(0x7f0000000680)="f651bfb4b9d4bd6daa33a2379ed08f5c01d8bd913c0a17dcf292a5fdb26f48e1e989ee703d0780d2b670e8fed3581f6c13e9b941479ed62cf6569929e3a87cd6f9cdcdd148b35300077dea0a48e0f9c0af93341e27e9aa17411c3ef120267530ef1930e43fbed4a63b405da2758157d754a6faf89c1414b9e5ff7c414899fd2f1f37602b93188ffc89b3a1f072730779d05ef673cd2b8a97236040ebf06f6f2cd67ac973b2ec2c40650138fb86d987685ad0071c7ef661e1f9c9fc948dfbcb5649cc8a4f5261c3b9bbfa640fa5ce5438129b83ccdd16f92788ed4461a3357924ae9cbff237787cd5f5cd34521fdf2cc276eb5d", 0xf3, 0x2}], 0x2002010, &(0x7f0000000900)={[{@session={'session', 0x3d, 0x6}}, {@type={'type', 0x3d, "69dacf7d"}}, {@gid={'gid'}}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@measure='measure'}, {@appraise='appraise'}, {@subj_role={'subj_role', 0x3d, 'wlan0'}}, {@pcr={'pcr', 0x3d, 0x36}}, {@euid_eq={'euid', 0x3d, r2}}, {@dont_appraise='dont_appraise'}]}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r4, 0x28007d) sendfile(r4, r4, 0x0, 0x2008000fffffffe) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans\x00', 0x1, 0x0) [ 843.120350][ T2296] buffer_io_error: 6 callbacks suppressed [ 843.120362][ T2296] Buffer I/O error on dev loop0, logical block 129, lost async page write [ 843.141650][ T26] audit: type=1800 audit(1570909214.012:775): pid=2261 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=17572 res=0 [ 843.204702][ T2296] attempt to access beyond end of device [ 843.227932][ T2296] loop0: rw=2049, want=131, limit=112 19:40:14 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 843.244178][ T26] audit: type=1800 audit(1570909214.012:776): pid=2271 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17572 res=0 [ 843.273515][ T2296] Buffer I/O error on dev loop0, logical block 130, lost async page write 19:40:14 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00'}, 0x45c) ppoll(0x0, 0x0, 0x0, &(0x7f0000000580)={0x9}, 0x8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r0, &(0x7f0000000000)={{0x77359400}}, 0xfe4f) [ 843.324802][ T2296] attempt to access beyond end of device [ 843.355914][ T2296] loop0: rw=2049, want=132, limit=112 [ 843.388408][ T2296] Buffer I/O error on dev loop0, logical block 131, lost async page write 19:40:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xd5, 0x0) [ 843.449967][ T2296] attempt to access beyond end of device [ 843.480952][ T26] audit: type=1800 audit(1570909214.562:777): pid=2315 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17584 res=0 [ 843.528302][ T2325] input: syz1 as /devices/virtual/input/input7 [ 843.596094][ T2296] loop0: rw=2049, want=133, limit=112 [ 843.678787][ T2296] Buffer I/O error on dev loop0, logical block 132, lost async page write [ 843.717343][ T2296] attempt to access beyond end of device [ 843.736430][ T2296] loop0: rw=2049, want=142, limit=112 [ 843.746773][ C1] net_ratelimit: 20 callbacks suppressed [ 843.746781][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 843.756741][ T2296] Buffer I/O error on dev loop0, logical block 141, lost async page write [ 843.758221][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 843.834726][ T2296] attempt to access beyond end of device [ 843.843048][ T2296] loop0: rw=2049, want=143, limit=112 [ 843.845401][ T26] audit: type=1804 audit(1570909214.922:778): pid=2334 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir278868084/syzkaller.Vv2Y5V/681/file0/file0" dev="loop0" ino=90 res=1 [ 843.856887][ T2296] Buffer I/O error on dev loop0, logical block 142, lost async page write [ 843.886356][ T2296] attempt to access beyond end of device [ 843.892752][ T2296] loop0: rw=2049, want=144, limit=112 [ 843.898637][ T2296] Buffer I/O error on dev loop0, logical block 143, lost async page write [ 843.907438][ T2296] attempt to access beyond end of device [ 843.913174][ T2296] loop0: rw=2049, want=145, limit=112 [ 843.919688][ T2296] Buffer I/O error on dev loop0, logical block 144, lost async page write 19:40:15 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:40:15 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, 0x0, 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:15 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x0, &(0x7f0000000140), 0xcb130292fb0dd0f9, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x3ff) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) 19:40:15 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xd6, 0x0) 19:40:15 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000005a) 19:40:15 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, 0x0, 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:15 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0xd7, 0x0) 19:40:15 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xee229282, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}}, 0x5) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r2}]}, 0x0, 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:40:15 executing program 5: write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000580)={0x8, "c0c814a55b6300d28afc61ac7dd1ffb869b761e8e53ee36e4be89e9fea175523e4468dec44bf8b5473c7a5062b4ede67dcb24cb9484ccfff2b3a70befc56e8ab2eee3483f5bf78c16beac035b700eb84e2216f268d02b717d2046c273814475b412437f7dc08a13a55d3c02132999dfd9fe80b750eff4d7c1da975b3835602728ae09e72527fcee19377e29c6c19e1ccce0f75e0e54001e3e83e473fa3d37eca8be1b3de565571e0e84f310c11fa8616068113b038aaa5c69967699fc2aa41c6f26fc22cf68e3577242c9b4ca20fab9de5885e0648fbd7af089b05f38f152d2f8144461608733c567b6dc5d2a07022c3764565c85abcfd99dd7a85e58939278235d50e8b321be7dbaa5141e097c28364fad2f713d666ca94f4e429687fcabb72aceeaf8abe5b506d98dc393b6e97492d785ead0ca2953f92c4d2b2c9f616e3d98b36be55a923fc5892413f7a3b615cec89b52e0ecdcee0aa5af72bcbb91b4bade7435dd8b529feaf13f8b48fcaca5952235d2e909f8831d8ca05a0daa3f6c581f388e0c1879b41fe63ef3d122bd0c5acd4fb07b96797918791075ae7383bb1bbdea574b31301ff37ecc45671ee2e7fc55bf6244025d1fd82dca56a42a23aa826a0b1e102bd87893ddc05649304eb1866c796e46e0d57f552bd572891ef892918bb2e7f2c6bcf68f388ea0c50f48c06de1b46b1434cdf25ca1288ebabe2a33d1c6effb77f91ef75471e93952caeda8ac2b2677e46d62b8366922d093832bccb949e177b4417864812d22972d81d89158288b5318d017329d4e8f66273abf74c434f318ebf32c7629342a85336387231b1e579d57cff0b125bef9dddf0fc33f71cb59d5a8972cda06ba6bba4a89cb8d3b465492c431698984998b2979ea61fed3d99b049724f2bdda5a0700ccb28825da1343f41290e569a6d38d4ae3968147cf39b097efd78e058fc71523c12e724bf93dc4ecc02b5cb18d13b59ec8f85368ac1ea93ed0149c60c53569dc69cdb3f37470eab26ef010b03a7e651b9e8e9065da347660836eddb3988c9a0f394aad055f727310f646d6cb35131d02aaf24735792bfce250798bebf0d1a4495fca568b9449e81afef2937b50faf873257d7efa07d31759474d50ca2a7922e79ab47dd59b11dfd1ec43fef3551aed81d01ee4ab997c6cecc39013dcaa442aec803e4cebbc288b4f9e87b30613f0ec88ddc6f60f56787f4040897e6e6bdac317d74b27f97f2efadb031f03c61954fd0232373582b7fa315d3eb9f67053126d2ed0636f04d669c47bdeb078fbda177533902e20b5ce9d8f395ea4c0aaf2cae774fe99bc40105a9ca184bcb598ab2f49c1df62d32d1a6d73a26812cb47a2ccaf0e9b759df89ad1e18238d897b9fd658f6786a92a0c12bd0ee6dad8a430a67962363e5b9afb3329e4f1f6fcd7e63cb8f24872bcf5b8c349d9ce423666ca39f16884219dea338b388e40f4ad996419cb3858637364d8e5af67f846d77b2749115131a3642ef56681315e4a2cbca5e60febabf693570f515e09c2a8994a8e2be3cba28118ef429d4de781118182607dd2c2d5aaba621ea29c140338bd8f1787fd2a3f43bb7fa22a8ce053adb331a4c78eab569af317e14360a6bf1c8b7394f34bfc1a941ac88dab334d5a2d45fc83bee28884698fd82339c972a06efb369220049ca89727513bd4262ad6f94f55f659ec98b684b1d92e1b6a303548a196cc5316e9845baaf01e737ef047d3d1ac4fe13de618e8fd6471c225e688b73b866213f4765c1a1ecf041f66a11177b0425b0423c455dccfa35a34f3b1c4c9850267bd41dcc366f4f8fef6982699e9aee7f3edff90217c84f6865234676e65911e5e99739792161766e959d061d6e86797b595ae3cffc043da0929dce1b4bd27e04532800f14f69398a681d46f00197f547fa138e676a4c84e586e9a2037faad7d7342221c229ff13606688ab70305dc28d01270604fbcb2b5777541e637a10e7d6c2dfa76461b18c8b303234282f31b7ed8afd0cdcc3978c6520a182000ea312296c7d9df08c2a67b944bc519113822014a831c8d6a7f8d26a7a443666b6077bdc1c11cf47001bcbb484d163543445c77a02140191bbb813da818b4dc3ef1ca420f624e5cb67c48024aeb8691b549202750899938067a3ad49da19e9fffc6486b3525fba8b2ff991fb3b4c1a536818f2dad96f713ac264a22136c6a3a9eacb4f69ab08cfe2b971a7d916833c6a0370d4b0bc428db2e4b4013899668b73caf9c983e2f07e46b4b5b4f0d231edee8b1951e1d0e34c881d1fc5c6be05b92b13680398e7109bd18048f0bd980fceb24e59411873e7a8a7f95f4da2ba5c082fdda710361e163a213a3dbb82c08a69020545da4636c09a67cd962182a011cf5eb1c3d999abc7b834ee518bb53afe19941927ca190699abf79c334c52e206fc851deb7398947ad5bd125ef3f51349497142e921c85506c739f6319ae0eb8e3c551ceb7e16afc2d6aad36841ed8eb560ef984ee5e00f1ead2c646546b3c145e3700b07fc257551641cf3dcb76a8b3cc75994f2c3eb521cea22d64c8b72b2de506fde8185b70b4707b7f571668a5925ca21e605904d7c896a5d7290b9c4fc75ecc7ddbbd7f6f003a74f53d1a5432e0377a3efce1e7ac61e36dc13aeea57400d4d3986db3fccb6edaf83f86daeb42f416f58c502e74178e013b399d0b155e0df86b40b5f3f2ab0ad61c90870cee340c07977b55622699101e5372677dd4e208fa6b5d4834a2d6f37b2ead107218aa0e702d1f6a60bd4ad3a2e22807237129fdc02993ef1fffe3c285bd4f7b093b2da8d772ce2df7874bf9b7fd0893eb66a4931acc38129bfe4a8fc6b28ea83bcca1220b66c86d4d90914bb9e9a425fce618f11b66f93aa78515eac0f3956cb1e8b6f12d7f6f22c1ca5563e280b15c64732aec2a37d6010cee0fd2263ea3ea2011043153284b4a5fc87cc0dd8c36f084ce715a6e9ba3e8b2586726255d122f2b5677d6590405ae031df8f83840ef3011a7f5d18037407758270d980aa65d5a4aa26a35a61b65178b6183b282771e89a8fe47bd3ea5a23146b924a47c3cc2540a9c8d91d4a8924e010fb6d3e60457e0aa86749cc3444707fda055a0f489aecda68af7f0d7d31cf25641a10bcc0d00996cddf9059121639fa3ff2e5490bae6b702fcf226d8e50f27f0973e5e4cf543445524d0fe3bd55d3f215978bfabcba0d44c076f5b333b2095c70f6a5426338bf0c065ddce27f6730606d84d1ccef8cebcd15085fa8a5d0975dc47eeb09a4ab6da21d01916c97f4e266c4b01f2bfb3b6a08bb5a7cf834e56782d824e7c55b591cd883ed9e806a4f7033bbab49a2b8ab2cb0f6da9d76968208236b35a51f8eba3769a676ad60d69c475706a630f3a078ebaa6ba5bc25719867cb61d48cc3a381b261165c04f3c93f37d72fc15f43df1de34e24e80a46f5d15fb362e71cb4a5365dde04a53dc5e42745fbd601ff148db416244dd76ac16f24138ef9a02491eb5b48d731a8bdcd46040d0ff11a07c040b83db84bfd21ffb1d818203cb7d3f8fca47f1dc510afa8219ab031aaba2147aed7c50228930e895a72abf55ca6997131e231ea92e0059b680735548adf2d572c3540e096a644deb3750e3b341bbeffee70ff22e0b4e56142e4c1965c01a646dd9b5b0055f88f08987ad45adb844b9ffc84792073048c28bcb60f2666802052ee45dcd9a2950d55ecf0234a3dcf67e83cfa0bfb1285eb54e6292d8075c9e1b459e48556f416898557c9c864fc5de459feb53e33dd1a6860a2d1a836ab5ff6efaee123b3715a7137787ee4345efbce38074e262f363a8ff400345c8539d44a7286c7291246810bce063f0877db6585842380b530a4aaef6e36779a95fed220cef6c1fff2fdd5031f83987dc3282d432f322852cc9dc6d00c59d5ed83b386ff97c521e528e59f2df932467ac02d17f8818c2de26d69725f42cecaf186fab7b6e10b1ebd9a9a12ed83cd382d9a6f9a9bed2736cb0ec0260057f5ec704d2e1a64caad59e02ff2022174b23564cb0942e6769b12e0ae4d65dc4c5e6b6ceaf2667e085909c93a9768b7bfdac612801c0bc3848bad51e2367f788cbd1c5091ce0e9c567528c72003712e91247d87f1ff60d3865fc687a35886822079392f8d151b89e09469bef98e59139c460a53805a93245148cbb9a6a010dadc87e9b1a0e0a89e87e433ff1c0ad4b125760858c8badff4d82cbd31cf88f3e2e16a4e960e1e0b5825fc0f2b21d660cf60069d43fb6a8a96c44fa922164f02c9cd5ebb6fad848871224d157777b5a70dc6deb988506bd03aa4ce2200e9ce23641221784250c22d2c8635a3512f45d433cf66e158eb261f48a23d54f5ef4358df3487da471eb5775bdba565ee170be126b2300d0dad050212606f2d77a63fa2ab430e62670e852b89944e611509415bee36bf0961c8918bd8b0eb8af45b1a9d0420c7101a9c5f4a63efb9cc8de7897b5e2b02cb5885ad8d0d8ac7754ba8d4e9d37175e614e3f3a6a7b122bbc6dd9ce78f1b9a4e940a1160bb85650d8932fe1a82d0525630ba017be5129625a45c3cae66c7cdaa33ee704791db81ef2e11a2f528974fa388cd929c934dbdb21425e6117839ab33b2926b036457db3a43083c3ec17231aed4ee5b607a45a5735c9470c03a424b43efcea953c078717344aeb1449c0dfa3a3ec224b542c16cf735466bdaf26b522aef1db547b14f07ebd4f5da34426a46007757be47ed3f643c47f2c4467762cd049d6f4cf8a78d04f8318bdedcee80871e91c0330499d88254555c456d9bde8a892394267eac15c230cf7e7ba19ebc01b1905c80476de3cea8258f6d0820d159f4aa8a37fb378b2685da4e0e89d253187219869f1157bbe4a8a43eabf65e86a6d9b21e25d91c43c3036914427833ed87073886719069148e2e47219bb5da5d9664d64dc5c4ff71c0e808dadbb53a23e41e3c02fd0c9e0704490f3283d1864d15d795882e6522f31445556cab6832f273dac0c7aef4e3f8c09a34d1624fdb087d852f2e827fb2c3105f1afda54b9dc12cfde3cf7747daa5ac70904e82636a13155303f9a1198d6e7f9dc7be394ebc5db9e8380e290e6cae5f320caa56aa94490789fce2e2540b3de8865396f58e14d61d3cb122f7bd1af5a27c6fe733eba3cc39106efc906ea967fb833e2480aa80bd56ccd9e5c25304e2b8135f1453af70059e599cb67bc8eaaa38c39768e74d3da8aba0135f0192d7ddf0149ce62f353b0360251f1f88b272c6e85b4ee4e0563a6de80de83749af6e6aa4d80cab7031aff3f7e8d0c9114940549f828a62be9fd6a16db001369728b4b93d4ecf91563ae03def3ca4e9900a97657c4ff1e41c5742fb3329ba882ed61645aedb22f2543b83cd4007e5d228697a48064acc32ece41f2d5ead3f31a9689249e8b4bb57ac0b136b6c60ec531708235b94db823344aafbb9b79e21959635664b2193c3add0b28767906b7ba4118e6548e9a23b49e9181dc6f7dc7857425c9ab1b1451bc4572fd060190d0b5a76b8368b68e72a212bd0f89d0778d293b1d32f155f30c9aafe7215d2e746ea8f2c73a30bcd8c093a489519b60616b15afe69074ee77fb65caf5faf0aad49106057a91fdcd622a07ac21eb5c221f2e65323228af41b3eb894517c34c4f60ba20fb6f6c4309a7357884c0eeeb0a4874550107f2d0ffdc412f86bdf712f96183b3932cfb4da3f179cde1a288df9af09c243fae8c67b0d208d9cdb7adde8d5e548e0624b19da4818ef656b88280a", 0x1000}, 0x10000005c) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") getdents64(r0, &(0x7f00000005c0)=""/4096, 0x1000) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 844.536743][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 844.542550][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 844.548411][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 844.554184][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 844.655678][ T2384] ------------[ cut here ]------------ [ 844.661504][ T2384] WARNING: CPU: 0 PID: 2384 at fs/readdir.c:110 verify_dirent_name+0x67/0x80 [ 844.670267][ T2384] Kernel panic - not syncing: panic_on_warn set ... [ 844.676867][ T2384] CPU: 0 PID: 2384 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 844.684669][ T2384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.694725][ T2384] Call Trace: [ 844.698029][ T2384] dump_stack+0x172/0x1f0 [ 844.702891][ T2384] ? iterate_dir+0x570/0x5e0 [ 844.707479][ T2384] panic+0x2e3/0x75c [ 844.711379][ T2384] ? add_taint.cold+0x16/0x16 [ 844.716066][ T2384] ? printk+0xba/0xed [ 844.720054][ T2384] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 844.725517][ T2384] ? __warn.cold+0x14/0x35 [ 844.729949][ T2384] ? verify_dirent_name+0x67/0x80 [ 844.734973][ T2384] __warn.cold+0x2f/0x35 [ 844.739213][ T2384] ? report_bug.cold+0x63/0xad [ 844.744018][ T2384] ? verify_dirent_name+0x67/0x80 [ 844.749052][ T2384] report_bug+0x289/0x300 [ 844.753389][ T2384] do_error_trap+0x11b/0x200 [ 844.757986][ T2384] do_invalid_op+0x37/0x50 [ 844.762401][ T2384] ? verify_dirent_name+0x67/0x80 [ 844.767440][ T2384] invalid_op+0x23/0x30 [ 844.771682][ T2384] RIP: 0010:verify_dirent_name+0x67/0x80 [ 844.776719][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 844.777313][ T2384] Code: 16 b6 ff 44 89 e0 5b 41 5c 5d c3 e8 43 16 b6 ff 0f 0b e8 3c 16 b6 ff 41 bc fb ff ff ff 5b 44 89 e0 41 5c 5d c3 e8 29 16 b6 ff <0f> 0b 41 bc fb ff ff ff eb ca 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 19:40:15 executing program 0: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x20080000000005b) [ 844.783093][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 844.802601][ T2384] RSP: 0018:ffff88807961fad0 EFLAGS: 00010216 [ 844.802614][ T2384] RAX: 0000000000040000 RBX: 000000000000000c RCX: ffffc900109fe000 [ 844.802622][ T2384] RDX: 0000000000003812 RSI: ffffffff81bcfbd7 RDI: ffff88807961fcd3 [ 844.802630][ T2384] RBP: ffff88807961fae0 R08: ffff88805955e000 R09: 0000000000000004 [ 844.802637][ T2384] R10: fffffbfff120d9b8 R11: ffffffff8906cdc3 R12: 0000000000000000 [ 844.802645][ T2384] R13: 0000000000000000 R14: 0000000000000004 R15: ffff88807961fe50 19:40:15 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x7, &(0x7f00000015c0)=[{&(0x7f0000000180)="a2a2746799e03021db6590d9d66bf8a9a5", 0x11, 0x5}, {&(0x7f00000001c0)="2c461cc2bee6c5a5acf70e018e832ec04a774e78e75f257289b8f791b852c26262b140b6e68f1dc7e63bc9d97dfea59412fe703cf81928093868b152ddd6b9832a79c699d77f2ed993e572604fbda67cde2ba9c722bbb8a5f61c19a74f7b82c621e4b23e8224180cd45e37a2b7fb60bf94ac8736d53e5db06021154a26f6401f19e19c8ad99692b368aba711c5e6e958e7ad5903b9ac2178eb6c069db6b9735c32ffebbe6062c193473968e2fa57745e324827e720710de30794658f622c877e0499cac3b4f6f0b98dff81431c3bfe2d91b592483cd4798cb585d6bd", 0xdc, 0x7b1}, {&(0x7f0000000300)="915327a571f354271126da7de1766c9d0dd553c462696e2164aea78f9d658c6ac77da91a9aef3dbcb6e7f09bb56fb1071ba6b74358250155d2a63eb8219344820bd02ff761c1934f121a", 0x4a, 0x5}, {&(0x7f0000000380)="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", 0xfe, 0x3}, {&(0x7f0000001680)="4cdc63e21942acd3d579d9a1c7", 0xd, 0x7}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="3c76bde141a96bcdee2046d0a7303d5d7ed2e1185eac52cfe834a4410189156d1dff356dc87248967f8d0cc90d40541f2eadc6bebd1340531ccbc2a37c13c6b601ba83eb3f91bcbdc6231ba149d18d6d2c4c9358f3d012e0f211894f39b73da4ce4a1d350783df0d15de860676bc540823ce63829c3b9dc597f0bb77ae299da38792b3ec21858cf2013e66c422965387c3ce58e7d6be31004eb28a371a004a5c2671089f4b773afaa47dfd0818c3fdd33692876eadc20f9974c0da323ff1d826177a54d3fb904837258bfee64b884c9a9dfb3551f8", 0xd5, 0x8}], 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x3b9a42, 0x100) sendfile(r1, r1, 0x0, 0x2008000fffffffe) r2 = syz_open_procfs(0x0, &(0x7f0000000100)) getdents(r2, &(0x7f0000000040)=""/48, 0x57b) getdents64(r2, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f0000001740)=0x7d) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000000080)={0x2, 0x1, 0x2}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') r4 = creat(&(0x7f00000016c0)='./file0/file0\x00', 0xcc) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r5, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) fsconfig$FSCONFIG_SET_FD(r4, 0x5, &(0x7f0000001700)='&@d.\x00', 0x0, r5) getdents(r3, &(0x7f0000000040)=""/48, 0x57b) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0xe1, 0x28e, 0x754bc96}) getdents64(r3, 0x0, 0xe7030218dbf1dd97) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000040)={0xb442, 0x8b0, 0x4fa5}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000480)) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r6, 0x0, 0x0) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3c) ptrace$cont(0x18, r7, 0x0, 0x0) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r7, 0x0, 0x0) r8 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r8, 0x101, 0x3, &(0x7f00000000c0)=0x1, 0x4) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001780)='/dev/sequencer\x00', 0x44c2e669ba5127ae, 0x0) kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r8, &(0x7f00000017c0)={r9, r1, 0x7}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x8001) [ 844.802673][ T2384] ? verify_dirent_name+0x67/0x80 [ 844.802694][ T2384] filldir64+0x40/0x670 [ 844.851465][ T3891] kobject: 'loop4' (000000007768daa4): kobject_uevent_env [ 844.854250][ T2384] ? _raw_spin_unlock+0x2d/0x50 [ 844.873126][ T3891] kobject: 'loop4' (000000007768daa4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 844.875308][ T2384] ? iunique+0x19f/0x1e0 [ 844.875335][ T2384] __fat_readdir+0xd9e/0x1cb0 [ 844.894350][ T2384] ? trace_hardirqs_on_caller+0x6a/0x240 [ 844.900004][ T2384] ? fat_search_long+0x1350/0x1350 [ 844.905124][ T2384] ? __lock_acquire+0x293a/0x4a00 [ 844.910152][ T2384] ? lock_acquire+0x20b/0x410 [ 844.914856][ T2384] ? __kasan_check_write+0x14/0x20 [ 844.920264][ T2384] ? down_read_killable+0x10c/0x490 [ 844.925466][ T2384] ? selinux_file_permission+0x9b/0x580 [ 844.931016][ T2384] ? rwsem_down_read_slowpath+0xfb0/0xfb0 [ 844.936745][ T2384] fat_readdir+0x44/0x60 [ 844.940996][ T2384] iterate_dir+0x47f/0x5e0 [ 844.945429][ T2384] ksys_getdents64+0x1ce/0x320 [ 844.950178][ T2384] ? __ia32_sys_getdents+0x3b0/0x3b0 [ 844.955445][ T2384] ? preempt_schedule_irq+0xf3/0x160 [ 844.960716][ T2384] ? compat_filldir+0x3a0/0x3a0 [ 844.965557][ T2384] __x64_sys_getdents64+0x73/0xb0 [ 844.970566][ T2384] ? do_syscall_64+0x5b/0x760 [ 844.975226][ T2384] do_syscall_64+0xfa/0x760 [ 844.979717][ T2384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.985592][ T2384] RIP: 0033:0x459a59 [ 844.989472][ T2384] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 845.009057][ T2384] RSP: 002b:00007f05a21f6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 845.017451][ T2384] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 845.025406][ T2384] RDX: 0000000000001000 RSI: 00000000200005c0 RDI: 0000000000000003 [ 845.033360][ T2384] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 845.041312][ T2384] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05a21f76d4 [ 845.049268][ T2384] R13: 00000000004c0535 R14: 00000000004d2c58 R15: 00000000ffffffff [ 845.058793][ T2384] Kernel Offset: disabled [ 845.063236][ T2384] Rebooting in 86400 seconds..