[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 51.025538][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 51.025557][ T27] audit: type=1800 audit(1579846181.941:29): pid=7923 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 51.051617][ T27] audit: type=1800 audit(1579846181.951:30): pid=7923 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.57' (ECDSA) to the list of known hosts. 2020/01/24 06:09:52 fuzzer started 2020/01/24 06:09:54 dialing manager at 10.128.0.105:44321 2020/01/24 06:09:54 syscalls: 2861 2020/01/24 06:09:54 code coverage: enabled 2020/01/24 06:09:54 comparison tracing: enabled 2020/01/24 06:09:54 extra coverage: enabled 2020/01/24 06:09:54 setuid sandbox: enabled 2020/01/24 06:09:54 namespace sandbox: enabled 2020/01/24 06:09:54 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/24 06:09:54 fault injection: enabled 2020/01/24 06:09:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/24 06:09:54 net packet injection: enabled 2020/01/24 06:09:54 net device setup: enabled 2020/01/24 06:09:54 concurrency sanitizer: enabled 2020/01/24 06:09:54 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 72.786083][ T8091] KCSAN: could not find function: 'poll_schedule_timeout' 2020/01/24 06:10:08 adding functions to KCSAN blacklist: 'rcu_gp_fqs_loop' 'process_srcu' 'shmem_file_read_iter' 'd_instantiate_new' 'mm_update_next_owner' 'pid_update_inode' 'vm_area_dup' 'futex_wait_queue_me' 'tomoyo_supervisor' 'copy_process' 'wbt_issue' 'blk_mq_sched_dispatch_requests' 'blk_mq_free_request' '__add_to_page_cache_locked' 'ext4_es_is_delayed' 'n_tty_receive_buf_common' 'dst_alloc' 'tick_sched_do_timer' 'do_signal_stop' 'do_syslog' 'ext4_mb_good_group' 'do_nanosleep' 'enqueue_timer' 'generic_permission' 'wbt_wait' 'dd_has_work' 'ext4_free_inode' 'tick_nohz_idle_stop_tick' 'kauditd_thread' '__delete_from_page_cache' '__mark_inode_dirty' 'pipe_double_lock' 'xprt_connect' 'run_timer_softirq' 'find_get_pages_range_tag' 'ext4_free_inodes_count' '__nf_conntrack_alloc' 'file_update_time' 'iomap_dio_bio_actor' 'd_delete' 'find_next_bit' 'audit_log_start' 'blk_mq_run_hw_queue' 'generic_fillattr' 'wbc_detach_inode' 'commit_echoes' 'atime_needs_update' 'iput' 'unix_release_sock' 'pcpu_alloc' '__snd_rawmidi_transmit_ack' '__get_user_pages' 'generic_file_read_iter' 'echo_char' 'snd_seq_check_queue' 'timer_clear_idle' 'ext4_has_free_clusters' 'page_counter_charge' 'queue_access_lock' 'poll_schedule_timeout' 'ktime_get_real_seconds' 'blk_mq_dispatch_rq_list' 'ext4_sync_file' '__writeback_single_inode' 'kcm_rfree' '__skb_try_recv_from_queue' '__mnt_want_write' '__hrtimer_run_queues' 'ep_poll' 'xas_clear_mark' 'xas_find_marked' 'handle_irq_event' '__d_lookup_done' 'taskstats_exit' 'ext4_nonda_switch' 'blk_mq_get_request' 'sbitmap_queue_clear' 'tick_do_update_jiffies64' 'rcu_gp_fqs_check_wake' 'ext4_mark_iloc_dirty' 'snd_seq_prioq_cell_out' 'exit_signals' 'generic_write_end' '__ext4_new_inode' 'ext4_handle_inode_extension' 'smpboot_thread_fn' 06:13:58 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000300)) syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 06:13:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_buf(r0, 0x29, 0x14, &(0x7f00000000c0), 0x0) [ 308.064843][ T8095] IPVS: ftp: loaded support on port[0] = 21 [ 308.154000][ T8095] chnl_net:caif_netlink_parms(): no params data found [ 308.207933][ T8095] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.215031][ T8095] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.223542][ T8095] device bridge_slave_0 entered promiscuous mode [ 308.231312][ T8095] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.239287][ T8095] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.247059][ T8095] device bridge_slave_1 entered promiscuous mode [ 308.265086][ T8095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 308.275477][ T8095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 308.295520][ T8095] team0: Port device team_slave_0 added [ 308.302284][ T8095] team0: Port device team_slave_1 added [ 308.319233][ T8095] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 308.326205][ T8095] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 308.352602][ T8095] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 308.365339][ T8095] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 308.372644][ T8095] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 308.399682][ T8095] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 308.415832][ T8098] IPVS: ftp: loaded support on port[0] = 21 06:13:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x22, 0x829, 0x0, 0x0, {0x1, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) [ 308.459983][ T8095] device hsr_slave_0 entered promiscuous mode [ 308.518179][ T8095] device hsr_slave_1 entered promiscuous mode [ 308.648435][ T8100] IPVS: ftp: loaded support on port[0] = 21 06:13:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f0000000280), 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 308.780988][ T8098] chnl_net:caif_netlink_parms(): no params data found [ 308.808970][ T8095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 308.860199][ T8095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 308.922812][ T8095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 308.992306][ T8095] netdevsim netdevsim0 netdevsim3: renamed from eth3 06:14:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000480)=""/105, 0x69, 0x12000, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e23}, 0x6e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f00000002c0)='./bus\x00', 0x0) [ 309.057058][ T8103] IPVS: ftp: loaded support on port[0] = 21 [ 309.093003][ T8098] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.102328][ T8098] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.137869][ T8098] device bridge_slave_0 entered promiscuous mode [ 309.145342][ T8098] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.168962][ T8098] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.176895][ T8098] device bridge_slave_1 entered promiscuous mode [ 309.212154][ T8095] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.219243][ T8095] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.226495][ T8095] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.233554][ T8095] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.262106][ T3601] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.270494][ T3601] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.299149][ T8098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 309.326968][ T8100] chnl_net:caif_netlink_parms(): no params data found [ 309.343214][ T8106] IPVS: ftp: loaded support on port[0] = 21 [ 309.359746][ T8098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:14:00 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x23, 0x5, 0x0, 0x0) [ 309.443210][ T8095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.480285][ T8098] team0: Port device team_slave_0 added [ 309.505972][ T8095] 8021q: adding VLAN 0 to HW filter on device team0 [ 309.513283][ T8100] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.520699][ T8100] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.528678][ T8100] device bridge_slave_0 entered promiscuous mode [ 309.539127][ T8098] team0: Port device team_slave_1 added [ 309.545933][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 309.553640][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.570230][ T8100] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.577388][ T8100] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.585312][ T8100] device bridge_slave_1 entered promiscuous mode [ 309.611280][ T8111] IPVS: ftp: loaded support on port[0] = 21 [ 309.618904][ T8103] chnl_net:caif_netlink_parms(): no params data found [ 309.631469][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 309.640379][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.648888][ T3090] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.655907][ T3090] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.664708][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 309.673467][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 309.681862][ T3090] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.688917][ T3090] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.696845][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 309.706006][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 309.715001][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 309.723632][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 309.732545][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 309.741129][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 309.750573][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 309.763790][ T8098] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 309.771072][ T8098] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 309.797092][ T8098] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 309.814836][ T8100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 309.846817][ T8098] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 309.854166][ T8098] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 309.880657][ T8098] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 309.892913][ T8100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 309.904889][ T8103] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.912199][ T8103] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.920235][ T8103] device bridge_slave_0 entered promiscuous mode [ 309.950049][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 309.959105][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.969972][ T8103] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.977112][ T8103] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.985083][ T8103] device bridge_slave_1 entered promiscuous mode [ 310.007131][ T8103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.017264][ T8100] team0: Port device team_slave_0 added [ 310.024490][ T8100] team0: Port device team_slave_1 added [ 310.109677][ T8098] device hsr_slave_0 entered promiscuous mode [ 310.178117][ T8098] device hsr_slave_1 entered promiscuous mode [ 310.238079][ T8098] debugfs: Directory 'hsr0' with parent '/' already present! [ 310.246942][ T8103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 310.302543][ T8095] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 310.313804][ T8095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 310.323704][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 310.332114][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 310.344567][ T8100] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 310.351674][ T8100] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 310.377943][ T8100] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 310.400960][ T8103] team0: Port device team_slave_0 added [ 310.407182][ T8100] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 310.414372][ T8100] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 310.440752][ T8100] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 310.461931][ T8103] team0: Port device team_slave_1 added [ 310.484616][ T8103] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 310.491879][ T8103] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 310.518094][ T8103] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 310.530393][ T8103] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 310.537508][ T8103] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 310.563698][ T8103] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 310.580819][ T8106] chnl_net:caif_netlink_parms(): no params data found [ 310.670542][ T8103] device hsr_slave_0 entered promiscuous mode [ 310.708164][ T8103] device hsr_slave_1 entered promiscuous mode [ 310.747850][ T8103] debugfs: Directory 'hsr0' with parent '/' already present! [ 310.759086][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 310.766566][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 310.830025][ T8100] device hsr_slave_0 entered promiscuous mode [ 310.888253][ T8100] device hsr_slave_1 entered promiscuous mode [ 310.927886][ T8100] debugfs: Directory 'hsr0' with parent '/' already present! [ 310.959597][ T8095] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 310.966754][ T8098] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 311.030316][ T8098] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 311.098361][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 311.107166][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 311.128279][ T8098] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 311.176590][ T8106] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.184133][ T8106] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.192287][ T8106] device bridge_slave_0 entered promiscuous mode [ 311.201564][ T8106] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.208772][ T8106] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.216532][ T8106] device bridge_slave_1 entered promiscuous mode [ 311.238485][ T8106] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 311.247912][ T8098] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 311.314741][ T8111] chnl_net:caif_netlink_parms(): no params data found [ 311.332668][ T8106] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 311.356108][ T8106] team0: Port device team_slave_0 added [ 311.387733][ T8106] team0: Port device team_slave_1 added [ 311.403681][ T8095] device veth0_vlan entered promiscuous mode [ 311.439020][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 311.447320][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.456909][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.465030][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 311.476022][ T8111] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.483312][ T8111] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.493405][ T8111] device bridge_slave_0 entered promiscuous mode [ 311.503134][ T8111] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.510422][ T8111] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.517989][ T8111] device bridge_slave_1 entered promiscuous mode [ 311.540668][ T8095] device veth1_vlan entered promiscuous mode [ 311.558318][ T8106] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 311.565381][ T8106] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 311.591645][ T8106] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 311.604153][ T8111] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 311.615429][ T8111] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 311.628161][ T8103] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 311.669601][ T8103] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 311.710016][ T8103] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 311.770635][ T8106] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 311.777608][ T8106] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 311.806815][ T8106] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 311.829220][ T8100] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 311.881819][ T8100] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 311.942613][ T8100] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 312.000594][ T8100] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 312.039844][ T8103] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 312.140026][ T8106] device hsr_slave_0 entered promiscuous mode [ 312.198409][ T8106] device hsr_slave_1 entered promiscuous mode [ 312.257880][ T8106] debugfs: Directory 'hsr0' with parent '/' already present! [ 312.266172][ T8111] team0: Port device team_slave_0 added [ 312.299063][ T8111] team0: Port device team_slave_1 added [ 312.309429][ T8095] device veth0_macvtap entered promiscuous mode [ 312.323292][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 312.332465][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 312.342533][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 312.351444][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 312.360844][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 312.387859][ T8095] device veth1_macvtap entered promiscuous mode [ 312.396105][ T8111] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 312.403385][ T8111] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 312.429992][ T8111] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 312.442116][ T8111] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 312.449217][ T8111] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 312.475293][ T8111] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 312.546975][ T8098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 312.630655][ T8111] device hsr_slave_0 entered promiscuous mode [ 312.668318][ T8111] device hsr_slave_1 entered promiscuous mode [ 312.707877][ T8111] debugfs: Directory 'hsr0' with parent '/' already present! [ 312.718776][ T8095] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 312.734434][ T8103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 312.746046][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 312.755129][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 312.766031][ T8095] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 312.791690][ T8098] 8021q: adding VLAN 0 to HW filter on device team0 [ 312.802267][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 312.811582][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 312.820755][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 312.828656][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 312.838966][ T8100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 312.848764][ T8106] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 312.901014][ T8106] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 312.963440][ T8103] 8021q: adding VLAN 0 to HW filter on device team0 [ 312.984715][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 312.992528][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.001362][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 313.010346][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.019020][ T3601] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.026036][ T3601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.034041][ T8106] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 313.089748][ T8106] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 313.136580][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 313.147489][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 313.156345][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.165134][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.172253][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.195922][ T8100] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.204730][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 313.213495][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 313.222602][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.231231][ T8107] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.238299][ T8107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.246402][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 313.255349][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 313.264314][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.272296][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.280314][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 313.289543][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.298505][ T8107] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.305674][ T8107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.317890][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 313.326845][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 313.338507][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 313.347306][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 313.386498][ T8098] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 313.397327][ T8098] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 313.439374][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 313.447436][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 313.476455][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.485319][ T3090] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.492394][ T3090] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.503203][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 313.512115][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 313.523167][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.531989][ T3090] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.539132][ T3090] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.547298][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 313.555999][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 313.564910][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 313.573475][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 313.582427][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 313.590844][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 313.599390][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 313.607680][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 313.615947][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 313.624933][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 313.633608][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 313.642326][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 313.651006][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 313.659569][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 313.668020][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 313.676448][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 313.684980][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 313.694012][ T8111] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 313.707849][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 313.713633][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 313.729914][ T8111] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 313.770072][ T8111] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 313.820029][ T8111] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 313.827844][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 313.833711][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 313.875341][ T8100] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 313.886581][ T8100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 313.895885][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 313.903820][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 313.911965][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 313.920686][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 313.929475][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 313.937953][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 313.946263][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 313.954278][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 313.954300][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 313.966534][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 313.975098][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 313.983813][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 313.996942][ T8103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 314.004128][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 314.004169][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 314.041550][ T8098] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.058321][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 314.064104][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 314.076480][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 314.084678][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 314.093998][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 314.101465][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 06:14:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x400139}) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 314.138689][ T8103] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.148768][ T8100] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.193999][ T8106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 314.205741][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 314.216959][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 314.219365][ T8125] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 314.259060][ T8098] device veth0_vlan entered promiscuous mode [ 314.266081][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 314.275561][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.285711][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 314.294200][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.303045][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 314.312129][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.321045][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 314.336738][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.346040][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.356173][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.364819][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.375706][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.386170][ T8100] device veth0_vlan entered promiscuous mode 06:14:05 executing program 0: [ 314.417626][ T8111] 8021q: adding VLAN 0 to HW filter on device bond0 [ 314.441582][ T8098] device veth1_vlan entered promiscuous mode 06:14:05 executing program 0: [ 314.465171][ T8100] device veth1_vlan entered promiscuous mode [ 314.481344][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 314.493074][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 314.507687][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready 06:14:05 executing program 0: [ 314.542778][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.572746][ T8106] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.595130][ T8111] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.603964][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 314.631141][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 06:14:05 executing program 0: [ 314.648666][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 314.656983][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.674913][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 314.683214][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 314.695670][ T8103] device veth0_vlan entered promiscuous mode [ 314.716427][ T8098] device veth0_macvtap entered promiscuous mode [ 314.736674][ T8100] device veth0_macvtap entered promiscuous mode 06:14:05 executing program 0: [ 314.746197][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.758192][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.766039][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 314.779009][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 314.787719][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 314.799717][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.808799][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.815842][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.825247][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 314.834214][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 06:14:05 executing program 0: [ 314.844743][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.851827][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.863592][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 314.872447][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.884457][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.891750][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.900158][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 314.908834][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 314.922450][ T8103] device veth1_vlan entered promiscuous mode [ 314.940304][ T8098] device veth1_macvtap entered promiscuous mode [ 314.949083][ T8100] device veth1_macvtap entered promiscuous mode [ 314.957898][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 314.965967][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 314.975118][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 314.983590][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 314.991629][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 315.002039][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 315.010404][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 315.018902][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 315.027577][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 315.036555][ T8110] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.043786][ T8110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.053323][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 315.062313][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 315.071095][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 315.080270][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 315.088863][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 315.115796][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 315.123932][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 315.135444][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 315.144338][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 315.153019][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 315.162086][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 315.170924][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 315.179572][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 315.188004][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 315.196154][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 315.204714][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 315.213792][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 315.222333][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 315.231497][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 315.240161][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 315.248522][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 315.256909][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 315.265464][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 315.274742][ T8106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 315.292986][ T8100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 315.304470][ T8100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.315623][ T8100] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 315.335682][ T8106] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 315.345157][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 315.355048][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 315.364304][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 315.372511][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 315.380243][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 315.388866][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 315.398599][ T8100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 315.409328][ T8100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.420971][ T8100] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 315.428751][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 315.437692][ T8103] device veth0_macvtap entered promiscuous mode [ 315.445569][ T8098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 315.456317][ T8098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.467435][ T8098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 315.478298][ T8098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.489411][ T8098] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 315.497974][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 315.506001][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 315.515148][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 315.524303][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 315.533612][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 315.552914][ T8098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 315.563674][ T8098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.574331][ T8098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 315.585599][ T8098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.596772][ T8098] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 315.608901][ T8103] device veth1_macvtap entered promiscuous mode [ 315.618175][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 315.626876][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 315.651648][ T8111] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 315.679231][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 315.686848][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 315.700677][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 315.714999][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 315.726975][ T8103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 315.738713][ T8103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.749108][ T8103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 315.759889][ T8103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.770519][ T8103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 315.780988][ T8103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.792054][ T8103] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 315.804002][ T8103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 315.814646][ T8103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.825134][ T8103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 315.836040][ T8103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.845919][ T8103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 315.856996][ T8103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.868835][ T8103] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 315.876215][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 315.885784][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 315.894780][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 315.903868][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 315.995725][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 316.009271][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 316.018849][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 316.027343][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 316.027562][ T8158] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 316.044978][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 316.055257][ T8158] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 316.060064][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 06:14:07 executing program 1: 06:14:07 executing program 2: [ 316.092279][ T8106] device veth0_vlan entered promiscuous mode [ 316.141919][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 316.165730][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 316.207431][ T8106] device veth1_vlan entered promiscuous mode [ 316.219875][ T8111] device veth0_vlan entered promiscuous mode [ 316.241675][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 316.257721][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 316.291892][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 316.336278][ T8111] device veth1_vlan entered promiscuous mode [ 316.355856][ T8106] device veth0_macvtap entered promiscuous mode [ 316.363684][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 316.375325][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 316.383489][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 316.392268][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 316.400938][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 316.421645][ T8106] device veth1_macvtap entered promiscuous mode [ 316.433744][ T8111] device veth0_macvtap entered promiscuous mode [ 316.444417][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 316.452710][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 316.461143][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 316.469972][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 316.481971][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 316.491502][ T8111] device veth1_macvtap entered promiscuous mode [ 316.502682][ T8106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.513299][ T8106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.523183][ T8106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.533893][ T8106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.543730][ T8106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.554769][ T8106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.565036][ T8106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.576277][ T8106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.587288][ T8106] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 316.598343][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 316.607066][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 316.619184][ T8111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.629832][ T8111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.639902][ T8111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.651008][ T8111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.660943][ T8111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.672438][ T8111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.682453][ T8111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.692912][ T8111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.703013][ T8111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.713730][ T8111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.724801][ T8111] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 316.736099][ T8106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.747342][ T8106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.757656][ T8106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.769096][ T8106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.778998][ T8106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.789482][ T8106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.799331][ T8106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.810080][ T8106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.821069][ T8106] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 316.828765][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 316.839839][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 316.850387][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 316.859422][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 316.870730][ T8111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.881304][ T8111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.891896][ T8111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.903437][ T8111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.913318][ T8111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.923902][ T8111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.933923][ T8111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.944486][ T8111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.954402][ T8111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.964877][ T8111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.975843][ T8111] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 316.989575][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 316.998162][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 317.259295][ C1] hrtimer: interrupt took 23851 ns [ 317.957444][ T8187] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 317.966241][ T8187] FAT-fs (loop4): Filesystem has been set read-only [ 317.973441][ T27] audit: type=1804 audit(1579846448.891:31): pid=8181 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir270023662/syzkaller.PxKryS/0/file0/file0" dev="loop4" ino=23 res=1 06:14:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000480)=""/105, 0x69, 0x12000, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e23}, 0x6e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f00000002c0)='./bus\x00', 0x0) 06:14:10 executing program 0: 06:14:10 executing program 2: 06:14:10 executing program 1: 06:14:10 executing program 5: 06:14:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="24c962f61000dc1b8dbed23edc5c1209e779be407a026439e05cea9f12c99e02e71686ccdc4063eab291b8f6d6a2974f4f00e5c2c1c3b4e965f1ab582bd5769ed07f6f596a3c5c7348fab3f7777da163d5f4a250225c5edc2cec414d82f3723cce68e0405736c3146653131e2ac940b1186b726d62a2c4e2ea37bf4429407607630c91aeecea1a928ea2a6f49dfa04819bf90fa92c6b0ae62decee79cb4d27e8d4a916d4f161faab91f486570100f06dfd7a83d7b2921b83902fb10210edc4d10a2d77a197c4dd5096aa8c33347e2f67c6f274ac777346dbf7984a8c5f2ba3e91467a2db7f804e0da7e9d7ce3861bf2888f60e8fd5b4d4226dc73d92d606d51aa691d2b11dc637443e6e8dabef65adbc4b403d61484323be1eff9da82615038526ab978b4c3fcfc109622f10ca69fb472d5076de0dd435afa8ea4ba6de875a4a91fc0a6e7c42c202916efef7db55eac69cd2813caeb1e92bb0b36dea"], 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000480)=""/105, 0x69, 0x12000, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e23}, 0x6e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f00000002c0)='./bus\x00', 0x0) 06:14:10 executing program 0: 06:14:10 executing program 2: 06:14:10 executing program 1: 06:14:10 executing program 5: 06:14:10 executing program 2: 06:14:10 executing program 5: 06:14:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x7]}, 0x5c) 06:14:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000480)=""/105, 0x69, 0x12000, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e23}, 0x6e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f00000002c0)='./bus\x00', 0x0) 06:14:11 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) accept4(r2, &(0x7f00000000c0)=@alg, 0x0, 0x0) 06:14:11 executing program 2: unshare(0x400) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/tty/drivers\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$TEAM_CMD_OPTIONS_SET(r0, 0x0, 0x0) 06:14:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() getgid() socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80041270, 0x0) tkill(r1, 0x9) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r4 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x2f) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e21, @loopback}, 0x10) 06:14:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000480)=""/105, 0x69, 0x12000, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e23}, 0x6e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f00000002c0)='./bus\x00', 0x0) [ 320.144092][ T579] attempt to access beyond end of device [ 320.151156][ T8115] attempt to access beyond end of device [ 320.156802][ T8115] loop3: rw=1, want=39, limit=38 [ 320.163842][ T579] loop4: rw=1, want=78, limit=38 [ 320.180469][ T8115] Buffer I/O error on dev loop3, logical block 38, lost async page write 06:14:11 executing program 1: vmsplice(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000200)="612e3ece5b", 0x5}], 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed024c0a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001ff0ffff60000005f42485266535f4d", 0x23b, 0x10000}], 0x3, 0x0) [ 320.190349][ T579] Buffer I/O error on dev loop4, logical block 77, lost async page write 06:14:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fff, 0x0, [{}, {}, {}, {}, {}, {}, {0x0, 0x80}, {}, {}, {}, {}, {}, {0x0, 0x2}]}}) [ 320.222375][ T8115] attempt to access beyond end of device [ 320.228731][ T579] attempt to access beyond end of device [ 320.245732][ T8115] loop3: rw=1, want=40, limit=38 [ 320.253268][ T579] loop4: rw=1, want=79, limit=38 06:14:11 executing program 2: tkill(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x44}}, 0x0) [ 320.271248][ T8115] Buffer I/O error on dev loop3, logical block 39, lost async page write [ 320.279410][ T579] Buffer I/O error on dev loop4, logical block 78, lost async page write [ 320.291982][ T8243] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop1 scanned by syz-executor.1 (8243) [ 320.306802][ T8115] attempt to access beyond end of device [ 320.315902][ T8115] loop3: rw=1, want=41, limit=38 [ 320.324523][ T8243] BTRFS error (device loop1): unsupported checksum algorithm: 91 [ 320.332202][ T579] attempt to access beyond end of device [ 320.332826][ T8115] Buffer I/O error on dev loop3, logical block 40, lost async page write [ 320.346875][ T8115] attempt to access beyond end of device [ 320.356427][ T8115] loop3: rw=1, want=78, limit=38 [ 320.361626][ T8115] Buffer I/O error on dev loop3, logical block 77, lost async page write [ 320.367122][ T579] loop4: rw=1, want=80, limit=38 [ 320.377678][ T8115] attempt to access beyond end of device [ 320.387840][ T8243] BTRFS error (device loop1): open_ctree failed [ 320.401229][ T8115] loop3: rw=1, want=79, limit=38 [ 320.405576][ T579] Buffer I/O error on dev loop4, logical block 79, lost async page write [ 320.416799][ T8115] Buffer I/O error on dev loop3, logical block 78, lost async page write 06:14:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xdc020000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000002000000030000003fffffff2001000000000000200100002001000000000000f0010000f0010000f0010000f0010000f001000003"], 0x1) 06:14:11 executing program 2: unshare(0x400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, 0x0, 0x1) [ 320.491038][ T579] attempt to access beyond end of device [ 320.522484][ T8115] attempt to access beyond end of device [ 320.533021][ T579] loop4: rw=1, want=81, limit=38 06:14:11 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) [ 320.564154][ T8115] loop3: rw=1, want=80, limit=38 [ 320.572918][ T579] Buffer I/O error on dev loop4, logical block 80, lost async page write [ 320.589196][ T8115] Buffer I/O error on dev loop3, logical block 79, lost async page write [ 320.597639][ T8115] attempt to access beyond end of device [ 320.623372][ T579] attempt to access beyond end of device [ 320.643167][ T8115] loop3: rw=1, want=81, limit=38 [ 320.645517][ T579] loop4: rw=1, want=130, limit=38 [ 320.662633][ T579] attempt to access beyond end of device [ 320.666864][ T8115] attempt to access beyond end of device [ 320.674421][ T8115] loop3: rw=1, want=130, limit=38 [ 320.687332][ T8115] attempt to access beyond end of device [ 320.688944][ T579] loop4: rw=1, want=131, limit=38 [ 320.710262][ T8115] loop3: rw=1, want=131, limit=38 [ 320.721092][ T8115] attempt to access beyond end of device [ 320.730622][ T579] attempt to access beyond end of device [ 320.735525][ T8115] loop3: rw=1, want=132, limit=38 [ 320.748464][ T579] loop4: rw=1, want=132, limit=38 [ 320.755761][ T579] attempt to access beyond end of device [ 320.768122][ T579] loop4: rw=1, want=133, limit=38 [ 320.781491][ T8115] attempt to access beyond end of device [ 320.790729][ T579] attempt to access beyond end of device [ 320.797725][ T8115] loop3: rw=1, want=133, limit=38 [ 320.803167][ T579] loop4: rw=1, want=150, limit=38 [ 320.809152][ T8115] attempt to access beyond end of device [ 320.814920][ T579] attempt to access beyond end of device [ 320.820972][ T8115] loop3: rw=1, want=142, limit=38 [ 320.826072][ T579] loop4: rw=1, want=151, limit=38 [ 320.831511][ T8115] attempt to access beyond end of device [ 320.842226][ T579] attempt to access beyond end of device [ 320.848212][ T8115] loop3: rw=1, want=143, limit=38 [ 320.857344][ T579] loop4: rw=1, want=152, limit=38 [ 320.862987][ T8115] attempt to access beyond end of device [ 320.868865][ T579] attempt to access beyond end of device [ 320.874630][ T579] loop4: rw=1, want=153, limit=38 [ 320.880052][ T8115] loop3: rw=1, want=144, limit=38 [ 320.881972][ T579] attempt to access beyond end of device [ 320.885102][ T8115] attempt to access beyond end of device [ 320.885123][ T8115] loop3: rw=1, want=145, limit=38 [ 320.897603][ T579] loop4: rw=1, want=182, limit=38 [ 320.903879][ T8115] attempt to access beyond end of device [ 320.907101][ T579] attempt to access beyond end of device [ 320.913169][ T8115] loop3: rw=1, want=153, limit=38 [ 320.923953][ T8115] attempt to access beyond end of device [ 320.927068][ T579] loop4: rw=1, want=183, limit=38 [ 320.929990][ T8115] loop3: rw=1, want=182, limit=38 [ 320.934887][ T579] attempt to access beyond end of device [ 320.940209][ T8115] attempt to access beyond end of device [ 320.948414][ T579] loop4: rw=1, want=184, limit=38 [ 320.951526][ T8115] loop3: rw=1, want=183, limit=38 [ 320.956303][ T579] attempt to access beyond end of device [ 320.961660][ T8115] attempt to access beyond end of device [ 320.970692][ T579] loop4: rw=1, want=185, limit=38 [ 320.978299][ T579] attempt to access beyond end of device [ 320.982547][ T8115] loop3: rw=1, want=184, limit=38 [ 320.984010][ T579] loop4: rw=1, want=206, limit=38 [ 320.989014][ T8115] attempt to access beyond end of device [ 320.994852][ T579] attempt to access beyond end of device [ 321.006538][ T579] loop4: rw=1, want=207, limit=38 [ 321.012007][ T579] attempt to access beyond end of device [ 321.016103][ T8115] loop3: rw=1, want=185, limit=38 [ 321.017683][ T579] loop4: rw=1, want=208, limit=38 [ 321.025756][ T8115] attempt to access beyond end of device [ 321.033760][ T8115] loop3: rw=1, want=206, limit=38 [ 321.037814][ T579] attempt to access beyond end of device [ 321.042263][ T8115] attempt to access beyond end of device [ 321.044436][ T579] loop4: rw=1, want=209, limit=38 [ 321.044451][ T579] attempt to access beyond end of device [ 321.044461][ T579] loop4: rw=1, want=258, limit=38 [ 321.044471][ T579] attempt to access beyond end of device [ 321.044545][ T579] loop4: rw=1, want=259, limit=38 [ 321.051631][ T8115] loop3: rw=1, want=207, limit=38 [ 321.066676][ T579] attempt to access beyond end of device [ 321.075434][ T8115] attempt to access beyond end of device [ 321.096221][ T8115] loop3: rw=1, want=208, limit=38 [ 321.097851][ T579] loop4: rw=1, want=260, limit=38 [ 321.101571][ T8115] attempt to access beyond end of device [ 321.106407][ T579] attempt to access beyond end of device [ 321.115266][ T8115] loop3: rw=1, want=209, limit=38 [ 321.117629][ T579] loop4: rw=1, want=261, limit=38 [ 321.123679][ T8115] attempt to access beyond end of device [ 321.137536][ T8115] loop3: rw=1, want=258, limit=38 [ 321.142852][ T8115] attempt to access beyond end of device [ 321.151627][ T8115] loop3: rw=1, want=259, limit=38 [ 321.154073][ T579] attempt to access beyond end of device [ 321.156681][ T8115] attempt to access beyond end of device [ 321.156733][ T8115] loop3: rw=1, want=260, limit=38 [ 321.162473][ T579] loop4: rw=1, want=12629, limit=38 [ 321.171406][ T8115] attempt to access beyond end of device [ 321.184176][ T8115] loop3: rw=1, want=261, limit=38 [ 321.192159][ T8115] attempt to access beyond end of device [ 321.198199][ T8115] loop3: rw=1, want=270, limit=38 [ 321.217894][ T8115] attempt to access beyond end of device [ 321.223585][ T8115] loop3: rw=1, want=271, limit=38 [ 321.232815][ T8115] attempt to access beyond end of device [ 321.238925][ T8115] loop3: rw=1, want=272, limit=38 [ 321.243965][ T8115] attempt to access beyond end of device [ 321.252717][ T8115] loop3: rw=1, want=273, limit=38 [ 321.278288][ T8115] attempt to access beyond end of device [ 321.284066][ T8115] loop3: rw=1, want=12641, limit=38 06:14:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000480)=""/105, 0x69, 0x12000, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e23}, 0x6e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f00000002c0)='./bus\x00', 0x0) 06:14:13 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000240)='tmpfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@size={'size', 0x3d, [0x6b]}}]}) 06:14:13 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed024c0a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001ff0ffff60000005f42485266535f4d", 0x23b, 0x10000}], 0x3, 0x0) 06:14:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xff44) recvmmsg(r1, &(0x7f0000009040)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000001c40)=""/144, 0xf}, {&(0x7f0000001e00)=""/65, 0x41}, {&(0x7f0000001e80)=""/204, 0x20001f4c}], 0x3}}, {{0x0, 0x0, &(0x7f0000003380)=[{0x0}, {&(0x7f0000009280)=""/154, 0x9a}, {&(0x7f00000021c0)=""/93, 0x5d}, {0x0}, {&(0x7f0000002380)=""/4096, 0x1000}], 0x5}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) 06:14:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() getgid() socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80041270, 0x0) tkill(r1, 0x9) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r4 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x2f) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e21, @loopback}, 0x10) 06:14:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000480)=""/105, 0x69, 0x12000, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e23}, 0x6e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f00000002c0)='./bus\x00', 0x0) [ 322.221374][ T184] attempt to access beyond end of device [ 322.227171][ T184] loop4: rw=1, want=78, limit=38 [ 322.233381][ T184] attempt to access beyond end of device [ 322.239407][ T184] loop4: rw=1, want=79, limit=38 [ 322.244452][ T184] attempt to access beyond end of device [ 322.251008][ T184] loop4: rw=1, want=80, limit=38 [ 322.256018][ T184] attempt to access beyond end of device [ 322.278298][ T184] loop4: rw=1, want=81, limit=38 [ 322.283475][ T184] attempt to access beyond end of device [ 322.289454][ T184] loop4: rw=1, want=130, limit=38 [ 322.294536][ T184] attempt to access beyond end of device [ 322.300760][ T184] loop4: rw=1, want=131, limit=38 [ 322.305914][ T184] attempt to access beyond end of device [ 322.311914][ T184] loop4: rw=1, want=132, limit=38 [ 322.317049][ T184] attempt to access beyond end of device [ 322.325636][ T184] loop4: rw=1, want=133, limit=38 [ 322.333036][ T184] attempt to access beyond end of device [ 322.344066][ T184] loop4: rw=1, want=150, limit=38 [ 322.350290][ T184] attempt to access beyond end of device [ 322.355985][ T184] loop4: rw=1, want=151, limit=38 [ 322.356267][ T8115] attempt to access beyond end of device [ 322.364476][ T184] attempt to access beyond end of device [ 322.372867][ T184] loop4: rw=1, want=152, limit=38 [ 322.380783][ T8115] loop3: rw=1, want=78, limit=38 [ 322.381290][ T184] attempt to access beyond end of device [ 322.391518][ T184] loop4: rw=1, want=153, limit=38 [ 322.396603][ T184] attempt to access beyond end of device [ 322.396959][ T8115] attempt to access beyond end of device [ 322.405633][ T184] loop4: rw=1, want=182, limit=38 [ 322.414382][ T184] attempt to access beyond end of device [ 322.423701][ T184] loop4: rw=1, want=183, limit=38 [ 322.428854][ T184] attempt to access beyond end of device [ 322.434561][ T184] loop4: rw=1, want=184, limit=38 [ 322.443220][ T184] attempt to access beyond end of device [ 322.449688][ T184] loop4: rw=1, want=185, limit=38 [ 322.454974][ T184] attempt to access beyond end of device [ 322.457541][ T8300] BTRFS error (device loop2): superblock checksum mismatch [ 322.460799][ T184] loop4: rw=1, want=206, limit=38 [ 322.476322][ T184] attempt to access beyond end of device [ 322.482141][ T184] loop4: rw=1, want=207, limit=38 [ 322.487228][ T184] attempt to access beyond end of device [ 322.496551][ T184] loop4: rw=1, want=208, limit=38 [ 322.501817][ T184] attempt to access beyond end of device [ 322.507526][ T184] loop4: rw=1, want=209, limit=38 [ 322.516176][ T184] attempt to access beyond end of device [ 322.519258][ T8115] loop3: rw=1, want=79, limit=38 [ 322.521987][ T184] loop4: rw=1, want=258, limit=38 [ 322.532031][ T184] attempt to access beyond end of device [ 322.537712][ T184] loop4: rw=1, want=259, limit=38 [ 322.542966][ T184] attempt to access beyond end of device [ 322.546391][ T8115] attempt to access beyond end of device [ 322.548762][ T184] loop4: rw=1, want=260, limit=38 [ 322.557319][ T8300] BTRFS error (device loop2): open_ctree failed [ 322.560003][ T184] attempt to access beyond end of device [ 322.571872][ T184] loop4: rw=1, want=261, limit=38 06:14:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() getgid() socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80041270, 0x0) tkill(r1, 0x9) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r4 = socket$inet(0x2, 0x80001, 0x0) socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x2f) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e21, @loopback}, 0x10) [ 322.593252][ T8115] loop3: rw=1, want=80, limit=38 06:14:13 executing program 1: futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000), &(0x7f0000048000), 0x0) exit(0x0) [ 322.622436][ T8115] attempt to access beyond end of device [ 322.630400][ T184] attempt to access beyond end of device [ 322.636199][ T184] loop4: rw=1, want=26013, limit=38 [ 322.661818][ T8309] BTRFS error (device loop2): superblock checksum mismatch [ 322.717603][ T8115] loop3: rw=1, want=81, limit=38 [ 322.741809][ T8115] attempt to access beyond end of device [ 322.774505][ T8115] loop3: rw=1, want=130, limit=38 [ 322.781460][ T8309] BTRFS error (device loop2): open_ctree failed [ 322.797091][ T8115] attempt to access beyond end of device [ 322.813965][ T8115] loop3: rw=1, want=131, limit=38 [ 322.823846][ T8115] attempt to access beyond end of device [ 322.847172][ T8115] loop3: rw=1, want=132, limit=38 [ 322.862762][ T8115] attempt to access beyond end of device [ 322.871582][ T8115] loop3: rw=1, want=133, limit=38 [ 322.876808][ T8115] attempt to access beyond end of device [ 322.882803][ T8115] loop3: rw=1, want=150, limit=38 [ 322.887988][ T8115] attempt to access beyond end of device 06:14:13 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed024c0a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001ff0ffff60000005f42485266535f4d", 0x23b, 0x10000}], 0x3, 0x0) [ 322.893869][ T8115] loop3: rw=1, want=151, limit=38 [ 322.916807][ T8115] attempt to access beyond end of device [ 322.930582][ T8115] loop3: rw=1, want=152, limit=38 [ 322.952874][ T8115] attempt to access beyond end of device [ 322.995225][ T8115] loop3: rw=1, want=153, limit=38 06:14:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() getgid() socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80041270, 0x0) tkill(r1, 0x9) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r4 = socket$inet(0x2, 0x80001, 0x0) socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x2f) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e21, @loopback}, 0x10) [ 323.018391][ T8115] attempt to access beyond end of device [ 323.040514][ T8115] loop3: rw=1, want=182, limit=38 [ 323.112288][ T8115] attempt to access beyond end of device [ 323.154331][ T8115] loop3: rw=1, want=183, limit=38 [ 323.160783][ T8115] attempt to access beyond end of device [ 323.170689][ T8115] loop3: rw=1, want=184, limit=38 [ 323.176655][ T8336] BTRFS error (device loop2): superblock checksum mismatch [ 323.205620][ T8115] attempt to access beyond end of device [ 323.232624][ T8115] loop3: rw=1, want=185, limit=38 06:14:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x33c, &(0x7f0000000380)={&(0x7f00000004c0)={0xdc, 0x2, 0x6, 0x741882de26a818e7, 0x2, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0xc8, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0xe300}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_SIZE={0x48}, @IPSET_ATTR_PROTO, @IPSET_ATTR_MARK]}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}]}, 0xdc}}, 0x0) [ 323.282411][ T8115] attempt to access beyond end of device [ 323.307833][ T8336] BTRFS error (device loop2): open_ctree failed [ 323.325475][ T8115] loop3: rw=1, want=206, limit=38 [ 323.340255][ T8115] attempt to access beyond end of device [ 323.351803][ T8115] loop3: rw=1, want=207, limit=38 [ 323.380522][ T8351] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.5'. [ 323.382791][ T8115] attempt to access beyond end of device 06:14:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7ffc, 0x0, [{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0xff}]}}) [ 323.423997][ T8115] loop3: rw=1, want=208, limit=38 [ 323.441004][ T8115] attempt to access beyond end of device [ 323.454421][ T8115] loop3: rw=1, want=209, limit=38 [ 323.471819][ T8115] attempt to access beyond end of device [ 323.504258][ T8115] loop3: rw=1, want=258, limit=38 [ 323.522696][ T8115] attempt to access beyond end of device [ 323.537137][ T8115] loop3: rw=1, want=259, limit=38 [ 323.545572][ T8115] attempt to access beyond end of device [ 323.557636][ T8115] loop3: rw=1, want=260, limit=38 [ 323.578431][ T8115] attempt to access beyond end of device [ 323.587493][ T8115] loop3: rw=1, want=261, limit=38 [ 323.658141][ T8115] attempt to access beyond end of device [ 323.677958][ T8115] loop3: rw=1, want=4669, limit=38 [ 323.778089][ T8115] attempt to access beyond end of device [ 323.783888][ T8115] loop3: rw=1, want=26749, limit=38 [ 323.857244][ T8323] attempt to access beyond end of device [ 323.863048][ T8323] loop4: rw=1, want=78, limit=38 [ 323.868385][ T8323] attempt to access beyond end of device [ 323.874153][ T8323] loop4: rw=1, want=79, limit=38 [ 323.880545][ T8323] attempt to access beyond end of device [ 323.886264][ T8323] loop4: rw=1, want=80, limit=38 [ 323.891672][ T8323] attempt to access beyond end of device [ 323.897380][ T8323] loop4: rw=1, want=81, limit=38 [ 323.902465][ T8323] attempt to access beyond end of device [ 323.908303][ T8323] loop4: rw=1, want=130, limit=38 [ 323.913328][ T8323] attempt to access beyond end of device [ 323.919003][ T8323] loop4: rw=1, want=131, limit=38 [ 323.928080][ T8323] attempt to access beyond end of device [ 323.933736][ T8323] loop4: rw=1, want=132, limit=38 [ 323.945979][ T8323] attempt to access beyond end of device [ 323.951740][ T8323] loop4: rw=1, want=133, limit=38 [ 323.956822][ T8323] attempt to access beyond end of device [ 323.970601][ T8323] loop4: rw=1, want=150, limit=38 [ 323.979172][ T8323] attempt to access beyond end of device [ 323.985217][ T8323] loop4: rw=1, want=151, limit=38 [ 323.993971][ T8323] attempt to access beyond end of device [ 324.000270][ T8323] loop4: rw=1, want=152, limit=38 [ 324.005634][ T8323] attempt to access beyond end of device [ 324.016809][ T8323] loop4: rw=1, want=153, limit=38 [ 324.022482][ T8323] attempt to access beyond end of device [ 324.032132][ T8323] loop4: rw=1, want=182, limit=38 [ 324.037279][ T8323] attempt to access beyond end of device [ 324.056957][ T8323] loop4: rw=1, want=183, limit=38 [ 324.069827][ T8323] attempt to access beyond end of device [ 324.075494][ T8323] loop4: rw=1, want=184, limit=38 [ 324.099205][ T8323] attempt to access beyond end of device [ 324.105226][ T8323] loop4: rw=1, want=185, limit=38 [ 324.117397][ T8323] attempt to access beyond end of device [ 324.123421][ T8323] loop4: rw=1, want=206, limit=38 [ 324.131656][ T8323] attempt to access beyond end of device [ 324.137320][ T8323] loop4: rw=1, want=207, limit=38 [ 324.142860][ T8323] attempt to access beyond end of device [ 324.152479][ T8323] loop4: rw=1, want=208, limit=38 [ 324.157559][ T8323] attempt to access beyond end of device [ 324.163648][ T8323] loop4: rw=1, want=209, limit=38 [ 324.175761][ T8323] attempt to access beyond end of device [ 324.184293][ T8323] loop4: rw=1, want=258, limit=38 [ 324.194325][ T8323] attempt to access beyond end of device [ 324.202450][ T8323] loop4: rw=1, want=259, limit=38 [ 324.207858][ T8323] attempt to access beyond end of device [ 324.213854][ T8323] loop4: rw=1, want=260, limit=38 [ 324.222120][ T8323] attempt to access beyond end of device [ 324.227829][ T8323] loop4: rw=1, want=261, limit=38 [ 324.244771][ T8323] attempt to access beyond end of device [ 324.250479][ T8323] loop4: rw=1, want=4533, limit=38 [ 324.275721][ T8323] attempt to access beyond end of device [ 324.284527][ T8323] loop4: rw=1, want=10949, limit=38 [ 324.302728][ T8323] attempt to access beyond end of device [ 324.308429][ T8323] loop4: rw=1, want=13013, limit=38 06:14:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x33c, &(0x7f0000000380)={&(0x7f00000004c0)={0xdc, 0x2, 0x6, 0x741882de26a818e7, 0x2, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x70, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0xe300}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_SIZE={0x48}, @IPSET_ATTR_PROTO, @IPSET_ATTR_MARK]}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}]}, 0xdc}}, 0x0) 06:14:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000400)=[{&(0x7f00000000c0)='=', 0x1}], 0x1, 0x0) 06:14:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1, 0x803, 0x0) shutdown(r0, 0x0) 06:14:15 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x12e) read$snddsp(r0, &(0x7f0000000100)=""/176, 0xb0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) 06:14:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000480)=""/105, 0x69, 0x12000, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e23}, 0x6e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:14:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() getgid() socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80041270, 0x0) tkill(r1, 0x9) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r4 = socket$inet(0x2, 0x80001, 0x0) socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x2f) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e21, @loopback}, 0x10) [ 324.846551][ T8107] hid-generic 0000:0000:0000.0001: ignoring exceeding usage max [ 324.853450][ T8115] attempt to access beyond end of device [ 324.876652][ T8115] loop3: rw=1, want=78, limit=38 [ 324.890941][ T8115] attempt to access beyond end of device [ 324.911368][ T8107] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on sz1 [ 324.917594][ T8115] loop3: rw=1, want=79, limit=38 [ 324.940953][ T8115] attempt to access beyond end of device [ 324.947154][ T8115] loop3: rw=1, want=80, limit=38 06:14:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd000000100001000c081000418e00000004fcff", 0xfed1}], 0x1) 06:14:15 executing program 2: gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001400)=[{0x0}], 0x1) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0xf1, 0x3}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000a00)='./file0\x00', 0x90000, 0xc0) ftruncate(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x8000000000006000, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) syz_mount_image$reiserfs(&(0x7f0000000240)='reiserfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x3, &(0x7f0000000600)=[{&(0x7f0000000480)="87", 0x1, 0x2000000000}, {&(0x7f00000004c0), 0x0, 0xffffffffffffffe0}, {&(0x7f0000000580)="312433ff5f9915fb26662763c086b8ac7b5f7483921fcdfeb4a0c31d4fff6839328d613b6cd489f0c9629d3e7c96a55a933ca0c07c623c68c2eb", 0x3a, 0x1}], 0x800, &(0x7f0000000740)=ANY=[@ANYBLOB='noquota,user_xattr,block-allocator=noborder,appra']) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000840), &(0x7f0000000880)=0x8) [ 324.966955][ T8107] hid-generic 0000:0000:0000.0002: ignoring exceeding usage max [ 324.984850][ T8107] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on sz1 [ 324.999871][ T8115] attempt to access beyond end of device [ 325.059684][ T8115] loop3: rw=1, want=81, limit=38 [ 325.097896][ T8115] attempt to access beyond end of device [ 325.103651][ T8115] loop3: rw=1, want=130, limit=38 06:14:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000a00)='./file0\x00', 0x0, 0xc0) fchdir(r0) r1 = open(&(0x7f00000009c0)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3f", 0x101) sendfile(r1, r2, 0x0, 0x10000) 06:14:16 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x19, 0xffffffffffffffff, 0x0, 0x0, {0x6}, [@typed={0x8, 0x3, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 325.167549][ T8402] FAT-fs (loop2): bogus number of reserved sectors [ 325.189053][ T8115] buffer_io_error: 121 callbacks suppressed [ 325.189092][ T8115] Buffer I/O error on dev loop3, logical block 129, lost async page write [ 325.189817][ T8402] FAT-fs (loop2): Can't find a valid FAT filesystem [ 325.231039][ T8115] attempt to access beyond end of device [ 325.236703][ T8115] loop3: rw=1, want=131, limit=38 [ 325.341453][ T8115] Buffer I/O error on dev loop3, logical block 130, lost async page write [ 325.350093][ T27] audit: type=1804 audit(1579846456.261:32): pid=8410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir055699506/syzkaller.AwzWRI/17/file0/file0" dev="loop0" ino=38 res=1 [ 325.410694][ T8115] attempt to access beyond end of device [ 325.419232][ T8115] loop3: rw=1, want=132, limit=38 [ 325.425339][ T8115] Buffer I/O error on dev loop3, logical block 131, lost async page write [ 325.434446][ T8115] attempt to access beyond end of device [ 325.440179][ T8115] loop3: rw=1, want=133, limit=38 [ 325.446774][ T8115] Buffer I/O error on dev loop3, logical block 132, lost async page write 06:14:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xb01001f1}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000000)=@buf={0x0, &(0x7f0000000280)}) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 06:14:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000a00)='./file0\x00', 0x0, 0xc0) fchdir(r0) r1 = open(&(0x7f00000009c0)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x101) sendfile(r1, r2, 0x0, 0x10000) [ 325.455577][ T8115] attempt to access beyond end of device [ 325.461406][ T8115] loop3: rw=1, want=150, limit=38 [ 325.466500][ T8115] Buffer I/O error on dev loop3, logical block 149, lost async page write [ 325.475358][ T8115] attempt to access beyond end of device [ 325.485261][ T8115] loop3: rw=1, want=151, limit=38 [ 325.513729][ T8115] Buffer I/O error on dev loop3, logical block 150, lost async page write [ 325.527835][ T27] audit: type=1800 audit(1579846456.261:33): pid=8410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=38 res=0 [ 325.560404][ T8115] attempt to access beyond end of device [ 325.578312][ T8115] loop3: rw=1, want=152, limit=38 [ 325.593140][ T8115] Buffer I/O error on dev loop3, logical block 151, lost async page write [ 325.603668][ T8115] attempt to access beyond end of device [ 325.630743][ T8115] loop3: rw=1, want=153, limit=38 [ 325.648617][ T8115] Buffer I/O error on dev loop3, logical block 152, lost async page write [ 325.687932][ T8115] attempt to access beyond end of device [ 325.696903][ T8115] loop3: rw=1, want=182, limit=38 [ 325.716088][ T8115] Buffer I/O error on dev loop3, logical block 181, lost async page write [ 325.766896][ T8115] attempt to access beyond end of device [ 325.775459][ T27] audit: type=1804 audit(1579846456.691:34): pid=8428 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir055699506/syzkaller.AwzWRI/18/file0/file0" dev="loop0" ino=39 res=1 [ 325.801164][ T8323] attempt to access beyond end of device [ 325.817105][ T8323] loop4: rw=1, want=78, limit=38 [ 325.820037][ T8115] loop3: rw=1, want=183, limit=38 [ 325.837345][ T8115] Buffer I/O error on dev loop3, logical block 182, lost async page write [ 325.845557][ T8323] attempt to access beyond end of device [ 325.853720][ T8323] loop4: rw=1, want=79, limit=38 [ 325.861876][ T8323] attempt to access beyond end of device [ 325.863517][ T27] audit: type=1800 audit(1579846456.691:35): pid=8428 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=39 res=0 [ 325.867705][ T8115] attempt to access beyond end of device [ 325.896665][ T8323] loop4: rw=1, want=80, limit=38 [ 325.902027][ T8323] attempt to access beyond end of device [ 325.911346][ T8323] loop4: rw=1, want=81, limit=38 [ 325.916408][ T8323] attempt to access beyond end of device [ 325.922159][ T8323] loop4: rw=1, want=130, limit=38 [ 325.927688][ T8323] attempt to access beyond end of device [ 325.932816][ T8115] loop3: rw=1, want=184, limit=38 [ 325.940086][ T8115] attempt to access beyond end of device [ 325.944500][ T8323] loop4: rw=1, want=131, limit=38 [ 325.951065][ T8115] loop3: rw=1, want=185, limit=38 [ 325.956736][ T8115] attempt to access beyond end of device [ 325.960639][ T8323] attempt to access beyond end of device [ 325.963677][ T8115] loop3: rw=1, want=206, limit=38 [ 325.968841][ T8323] loop4: rw=1, want=132, limit=38 [ 325.973738][ T8115] attempt to access beyond end of device [ 325.981876][ T8323] attempt to access beyond end of device [ 325.984111][ T8115] loop3: rw=1, want=207, limit=38 [ 325.990741][ T8323] loop4: rw=1, want=133, limit=38 [ 325.995086][ T8115] attempt to access beyond end of device [ 326.003364][ T8323] attempt to access beyond end of device [ 326.005859][ T8115] loop3: rw=1, want=208, limit=38 [ 326.013861][ T8323] loop4: rw=1, want=150, limit=38 [ 326.016745][ T8115] attempt to access beyond end of device [ 326.024184][ T8323] attempt to access beyond end of device [ 326.027936][ T8115] loop3: rw=1, want=209, limit=38 [ 326.033944][ T8323] loop4: rw=1, want=151, limit=38 [ 326.038379][ T8115] attempt to access beyond end of device [ 326.045973][ T8323] attempt to access beyond end of device [ 326.057044][ T8115] loop3: rw=1, want=258, limit=38 [ 326.061334][ T8323] loop4: rw=1, want=152, limit=38 [ 326.067345][ T8323] attempt to access beyond end of device [ 326.072341][ T8115] attempt to access beyond end of device [ 326.073966][ T8323] loop4: rw=1, want=153, limit=38 [ 326.086374][ T8323] attempt to access beyond end of device [ 326.092203][ T8115] loop3: rw=1, want=259, limit=38 [ 326.092361][ T8115] attempt to access beyond end of device [ 326.103608][ T8323] loop4: rw=1, want=182, limit=38 [ 326.104652][ T8115] loop3: rw=1, want=260, limit=38 [ 326.109421][ T8323] attempt to access beyond end of device [ 326.120010][ T8323] loop4: rw=1, want=183, limit=38 [ 326.122819][ T8115] attempt to access beyond end of device [ 326.125098][ T8323] attempt to access beyond end of device [ 326.136807][ T8323] loop4: rw=1, want=184, limit=38 [ 326.142137][ T8323] attempt to access beyond end of device [ 326.145595][ T8115] loop3: rw=1, want=261, limit=38 [ 326.147914][ T8323] loop4: rw=1, want=185, limit=38 [ 326.158332][ T8323] attempt to access beyond end of device [ 326.160735][ T8115] attempt to access beyond end of device [ 326.164080][ T8323] loop4: rw=1, want=206, limit=38 [ 326.169680][ T8115] loop3: rw=1, want=2717, limit=38 [ 326.175597][ T8323] attempt to access beyond end of device [ 326.187035][ T8323] loop4: rw=1, want=207, limit=38 [ 326.192403][ T8323] attempt to access beyond end of device [ 326.198395][ T8323] loop4: rw=1, want=208, limit=38 [ 326.203188][ T8115] attempt to access beyond end of device [ 326.203625][ T8323] attempt to access beyond end of device [ 326.213010][ T8115] loop3: rw=1, want=9453, limit=38 [ 326.215461][ T8323] loop4: rw=1, want=209, limit=38 [ 326.225775][ T8323] attempt to access beyond end of device [ 326.231793][ T8323] loop4: rw=1, want=258, limit=38 [ 326.232608][ T8115] attempt to access beyond end of device [ 326.236895][ T8323] attempt to access beyond end of device [ 326.245847][ T8115] loop3: rw=1, want=12869, limit=38 [ 326.248714][ T8323] loop4: rw=1, want=259, limit=38 [ 326.259043][ T8323] attempt to access beyond end of device [ 326.264760][ T8323] loop4: rw=1, want=260, limit=38 [ 326.269887][ T8323] attempt to access beyond end of device [ 326.276188][ T8323] loop4: rw=1, want=261, limit=38 [ 326.289210][ T8323] attempt to access beyond end of device [ 326.295085][ T8323] loop4: rw=1, want=3549, limit=38 [ 326.301219][ T8115] attempt to access beyond end of device [ 326.307086][ T8115] loop3: rw=1, want=31285, limit=38 [ 326.330765][ T8115] attempt to access beyond end of device [ 326.336421][ T8115] loop3: rw=1, want=33077, limit=38 06:14:17 executing program 3: bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() getgid() tkill(r0, 0x9) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 06:14:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd000000100001000c081000418e00000004fcff", 0xfed1}], 0x1) 06:14:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000a00)='./file0\x00', 0x0, 0xc0) fchdir(r0) r1 = open(&(0x7f00000009c0)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x101) sendfile(r1, r2, 0x0, 0x10000) 06:14:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000480)=""/105, 0x69, 0x12000, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e23}, 0x6e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:14:17 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r0, r0, &(0x7f0000000240)=0x1301, 0x7fff) creat(0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) 06:14:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xb01001f1}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000000)=@buf={0x0, &(0x7f0000000280)}) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) [ 326.554853][ T8439] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 06:14:17 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',nodevmap']) [ 326.790882][ T27] audit: type=1804 audit(1579846457.701:36): pid=8450 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir359453352/syzkaller.bf64Li/12/file0/file0" dev="loop2" ino=42 res=1 06:14:17 executing program 0: creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'L-', 0xffffffff}, 0x16, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f00000005c0)=ANY=[], 0xfffffcaa) r2 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x00') ioctl$TIOCGPTPEER(r3, 0x5441, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bind$alg(r2, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') write(0xffffffffffffffff, &(0x7f0000002000)='/', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x7c8) [ 327.016750][ T27] audit: type=1800 audit(1579846457.731:37): pid=8450 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=42 res=0 [ 327.047657][ T27] audit: type=1804 audit(1579846457.901:38): pid=8472 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir055699506/syzkaller.AwzWRI/20/file0" dev="sda1" ino=16608 res=1 06:14:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xb01001f1}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0x9b, &(0x7f0000000280)="a701edae407bc491ccdc386b67bc088f39bd14ec8051c3e4949c85e238c375327fa2a3dc2aeccccfa70d51eebc40332302abc1d0a6de463c16291c8508f9977a7a5e7d9cd36bc75db28dca5987ff3685dd81917951f76ee7dfb4e6210166be16944994685dd87390fdb77f5a832bc5f2d6aa832e8e490bbab59ab5ac0d9e680c76f94c4de03bb818665a961bab6bf6cffa295f10f72867338a3098"}) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 06:14:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd000000100001000c081000418e00000004fcff", 0xfed1}], 0x1) 06:14:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xb01001f1}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x19, 0xffffffffffffffff, 0x0, 0x0, {0x6}, [@typed={0x8, 0x3, 0x0, 0x0, @u32=0x4}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xbb, &(0x7f0000000280)="a701edae407bc491ccdc386b67bc088f39bd14ec8051c3e4949c85e238c375327fa2a3dc2aeccccfa70d51eebc40332302abc1d0a6de463c16291c8508f9977a7a5e7d9cd36bc75db28dca5987ff3685dd81917951f76ee7dfb4e6210166be16944994685dd87390fdb77f5a832bc5f2d6aa832e8e490bbab59ab5ac0d9e680c76f94c4de03bb818665a961bab6bf6cffa295f10f72867338a3098a6932bf98d7a46638d2663c7687bd5207917024e425e4f20e98640d4922a72a2"}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 06:14:18 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10646}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(0x0, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', r1, 0x0, 0x2) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r4) ioctl$sock_inet_SIOCGARP(r4, 0x8954, &(0x7f0000000180)={{0x2, 0x4e20, @empty}, {0x1, @link_local}, 0x0, {0x2, 0x4e20, @local}, 'macvlan1\x00'}) creat(&(0x7f0000000000)='./bus\x00', 0x0) r5 = openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) 06:14:18 executing program 1: perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() getgid() tkill(r0, 0x9) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10) socket$inet(0x2, 0x0, 0x0) 06:14:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="24c962f61000dc1b8dbed23edc5c1209e779be407a026439e05cea9f12c99e02e71686ccdc4063eab291b8f6d6a2974f4f00e5c2c1c3b4e965f1ab582bd5769ed07f6f596a3c5c7348fab3f7777da163d5f4a250225c5edc2cec414d82f3723cce68e0405736c3146653131e2ac940b1186b726d62a2c4e2ea37bf4429407607630c91aeecea1a928ea2a6f49dfa04819bf90fa92c6b0ae62decee79cb4d27e8d4a916d4f161faab91f486570100f06dfd7a83d7b2921b83902fb10210edc4d10a2d77a197c4dd5096aa8c33347e2f67c6f274ac777346dbf7984a8c5f2ba3e91467a2db7f804e0da7e9d7ce3861bf2888f60e8fd5b4d4226dc73d92d606d51aa691d2b11dc637443e6e8dabef65adbc4b403d61484323be1eff9da82615038526ab978b4c3fcfc109622f10ca69fb472d5076de0dd435afa8ea4ba6de875a4a91fc0a6e7c42c202916efef7db55eac69cd2813caeb1e92bb0b36dea"], 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000480)=""/105, 0x69, 0x12000, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e23}, 0x6e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 327.572025][ T8115] attempt to access beyond end of device [ 327.577694][ T8115] loop4: rw=1, want=78, limit=38 [ 327.587339][ T8115] attempt to access beyond end of device [ 327.594643][ T8115] loop4: rw=1, want=79, limit=38 [ 327.603163][ T8115] attempt to access beyond end of device [ 327.610104][ T8115] loop4: rw=1, want=80, limit=38 [ 327.630196][ T8115] attempt to access beyond end of device [ 327.649619][ T8115] loop4: rw=1, want=81, limit=38 06:14:18 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000004600)=""/210, 0x4f, 0x193, 0x8}, 0x20) [ 327.691741][ T8115] attempt to access beyond end of device [ 327.716682][ T8115] loop4: rw=1, want=130, limit=38 [ 327.726531][ T8115] attempt to access beyond end of device [ 327.749750][ T8115] loop4: rw=1, want=131, limit=38 [ 327.766996][ T8115] attempt to access beyond end of device [ 327.822906][ T8503] BPF: (anon) type_id=1 bits_offset=11 [ 327.838451][ T8115] loop4: rw=1, want=132, limit=38 [ 327.849915][ T8505] BPF: (anon) type_id=1 bits_offset=11 [ 327.855400][ T8505] BPF: [ 327.863965][ T8115] attempt to access beyond end of device 06:14:18 executing program 0: socket$inet(0x10, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xe02be, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xa71, 0x0, 0x6, 0x5, 0x0, 0x20}, 0x0, 0xffffffffffffffff, r0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xe00000000000000, 0x0, 0xffffffffffffffc2) [ 327.878548][ T8115] loop4: rw=1, want=133, limit=38 [ 327.883782][ T8115] attempt to access beyond end of device [ 327.890130][ T8503] BPF: [ 327.902187][ T8503] BPF:Member is not byte aligned [ 327.907158][ T8503] BPF: [ 327.907158][ T8503] 06:14:18 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000004600)=""/210, 0x4f, 0x193, 0x8}, 0x20) [ 327.924495][ T8115] loop4: rw=1, want=150, limit=38 [ 327.947751][ T8115] attempt to access beyond end of device [ 327.948097][ T8505] BPF:Member is not byte aligned [ 327.955043][ T8505] BPF: [ 327.955043][ T8505] [ 327.984507][ T8115] loop4: rw=1, want=151, limit=38 [ 328.008240][ T8115] attempt to access beyond end of device [ 328.022310][ T8115] loop4: rw=1, want=152, limit=38 [ 328.043993][ T8115] attempt to access beyond end of device [ 328.071728][ T8115] loop4: rw=1, want=153, limit=38 [ 328.076818][ T8115] attempt to access beyond end of device [ 328.109126][ T8115] loop4: rw=1, want=182, limit=38 [ 328.111407][ T8513] BPF: (anon) type_id=1 bits_offset=11 [ 328.114290][ T8115] attempt to access beyond end of device [ 328.114305][ T8115] loop4: rw=1, want=183, limit=38 [ 328.114346][ T8115] attempt to access beyond end of device [ 328.114367][ T8115] loop4: rw=1, want=184, limit=38 [ 328.155765][ T8513] BPF: [ 328.187976][ T8513] BPF:Member is not byte aligned [ 328.213313][ T8115] attempt to access beyond end of device [ 328.233533][ T8513] BPF: [ 328.233533][ T8513] [ 328.247925][ T8115] loop4: rw=1, want=185, limit=38 [ 328.263964][ T8115] attempt to access beyond end of device [ 328.284383][ T8115] loop4: rw=1, want=206, limit=38 [ 328.289550][ T8115] attempt to access beyond end of device [ 328.305439][ T8115] loop4: rw=1, want=207, limit=38 [ 328.310569][ T8115] attempt to access beyond end of device 06:14:19 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffff9]}, 0x0, 0x8) r0 = gettid() tkill(r0, 0x1e) rt_sigtimedwait(&(0x7f00000000c0)={[0xb2000000]}, 0x0, 0x0, 0x8) [ 328.351452][ T8115] loop4: rw=1, want=208, limit=38 [ 328.356603][ T8115] attempt to access beyond end of device [ 328.372579][ T8115] loop4: rw=1, want=209, limit=38 [ 328.377667][ T8115] attempt to access beyond end of device 06:14:19 executing program 2: mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000180)='.//ile0\x00', r0, &(0x7f00000007c0)='./file0/f.le.\x00') r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 328.400644][ T8115] loop4: rw=1, want=258, limit=38 [ 328.405787][ T8115] attempt to access beyond end of device [ 328.413399][ T8115] loop4: rw=1, want=259, limit=38 [ 328.424223][ T8115] attempt to access beyond end of device [ 328.429932][ T8115] loop4: rw=1, want=260, limit=38 [ 328.441389][ T8521] overlayfs: conflicting lowerdir path [ 328.446901][ T8115] attempt to access beyond end of device [ 328.481112][ T8115] loop4: rw=1, want=261, limit=38 06:14:19 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10646}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) renameat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0, 0x2) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = syz_open_procfs(0x0, 0x0) fchdir(r3) creat(&(0x7f0000000000)='./bus\x00', 0x0) r4 = openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) 06:14:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xb01001f1}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x19, 0xffffffffffffffff, 0x0, 0x0, {0x6}, [@typed={0x8, 0x3, 0x0, 0x0, @u32=0x4}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xbb, &(0x7f0000000280)="a701edae407bc491ccdc386b67bc088f39bd14ec8051c3e4949c85e238c375327fa2a3dc2aeccccfa70d51eebc40332302abc1d0a6de463c16291c8508f9977a7a5e7d9cd36bc75db28dca5987ff3685dd81917951f76ee7dfb4e6210166be16944994685dd87390fdb77f5a832bc5f2d6aa832e8e490bbab59ab5ac0d9e680c76f94c4de03bb818665a961bab6bf6cffa295f10f72867338a3098a6932bf98d7a46638d2663c7687bd5207917024e425e4f20e98640d4922a72a2"}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 06:14:19 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffff9]}, 0x0, 0x8) r0 = gettid() tkill(r0, 0x1e) rt_sigtimedwait(&(0x7f00000000c0)={[0xb2000000]}, 0x0, 0x0, 0x8) 06:14:19 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10646}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(0x0, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', r1, 0x0, 0x2) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r4) ioctl$sock_inet_SIOCGARP(r4, 0x8954, &(0x7f0000000180)={{0x2, 0x4e20, @empty}, {0x1, @link_local}, 0x0, {0x2, 0x4e20, @local}, 'macvlan1\x00'}) creat(&(0x7f0000000000)='./bus\x00', 0x0) r5 = openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) [ 328.510118][ T8115] attempt to access beyond end of device [ 328.515791][ T8115] loop4: rw=1, want=3861, limit=38 [ 328.543758][ T8527] overlayfs: conflicting lowerdir path 06:14:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x1c, 0x3, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 328.576395][ T8115] attempt to access beyond end of device [ 328.596009][ T8115] loop4: rw=1, want=7789, limit=38 [ 328.626910][ T8115] attempt to access beyond end of device [ 328.633357][ T8115] loop4: rw=1, want=10301, limit=38 06:14:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a40)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9c0000001000050700000000000c370000000000", @ANYRES32=0x0, @ANYBLOB="033d0000000000006800120009000100766c616e00000000580002000c00020002000000020000000600010000000000040003000c00040020000000050000000c0001000800000001000080eeff000002000000070000000c000100b0000000200000000c00010020000000030000000a000500040000000000000008000a00393d7f2a886f5e0c07929ebacfeebcd68d585ca42013280f666dcd8dbf765432d95db7f7bf5f646c6f16921b8ec95cdae9e1728c2592802e1e2699ff9c66360f8e9fc398b83641d023b2dc0f48a746e9f600fd1a296a6df9b99e7bffae330f3abc295b1eba4b2c9a79021e32b2bde641522ebf4beb3c950c1b719c46df535d24981dfd", @ANYRES32=0x0, @ANYBLOB="e1b49415642c249dc58c72a1d62e22b270c659ef95c90323e3a0d9d545edb46beece802952ef6bf6dd57e2811d714a1f1d89eec35f40d2fb5b849e58088cb6b10200850f741717abcdc2492e1cbbc58893a06bf41157cbb33424d33e835196d4f132e0ea549374368e6e65bb581bceca12f5e1c0eb72c4d2e0a00a1500e8bb45dbc20e2ac329ea"], 0x9c}}, 0x0) [ 328.908174][ T8550] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 328.964580][ T8550] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 329.022770][ T8550] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 329.081032][ T8550] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 329.162477][ T8550] device vlan2 entered promiscuous mode [ 329.195137][ T8550] device gretap0 entered promiscuous mode [ 329.235805][ T8550] device gretap0 left promiscuous mode [ 329.491773][ T8559] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 329.530575][ T8559] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 329.578271][ T8559] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 329.600728][ T8559] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 329.614553][ T8559] device vlan2 entered promiscuous mode [ 329.621831][ T8559] device gretap0 entered promiscuous mode [ 329.630314][ T8559] device gretap0 left promiscuous mode 06:14:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="24c962f61000dc1b8dbed23edc5c1209e779be407a026439e05cea9f12c99e02e71686ccdc4063eab291b8f6d6a2974f4f00e5c2c1c3b4e965f1ab582bd5769ed07f6f596a3c5c7348fab3f7777da163d5f4a250225c5edc2cec414d82f3723cce68e0405736c3146653131e2ac940b1186b726d62a2c4e2ea37bf4429407607630c91aeecea1a928ea2a6f49dfa04819bf90fa92c6b0ae62decee79cb4d27e8d4a916d4f161faab91f486570100f06dfd7a83d7b2921b83902fb10210edc4d10a2d77a197c4dd5096aa8c33347e2f67c6f274ac777346dbf7984a8c5f2ba3e91467a2db7f804e0da7e9d7ce3861bf2888f60e8fd5b4d4226dc73d92d606d51aa691d2b11dc637443e6e8dabef65adbc4b403d61484323be1eff9da82615038526ab978b4c3fcfc109622f10ca69fb472d5076de0dd435afa8ea4ba6de875a4a91fc0a6e7c42c202916efef7db55eac69cd2813caeb1e92bb0b36dea"], 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000480)=""/105, 0x69, 0x12000, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e23}, 0x6e) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f00000002c0)='./bus\x00', 0x0) 06:14:20 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10646}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) renameat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0, 0x2) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = syz_open_procfs(0x0, 0x0) fchdir(r3) creat(&(0x7f0000000000)='./bus\x00', 0x0) r4 = openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) 06:14:20 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=', @ANYRESHEX, @ANYBLOB]) 06:14:20 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10646}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) renameat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0, 0x2) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = syz_open_procfs(0x0, 0x0) fchdir(r3) creat(&(0x7f0000000000)='./bus\x00', 0x0) r4 = openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) 06:14:20 executing program 2: ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0xb80b) socket$packet(0x11, 0x0, 0x300) [ 329.781038][ T8115] attempt to access beyond end of device [ 329.786814][ T8115] loop4: rw=1, want=78, limit=38 [ 329.800652][ T8567] 9pnet: Could not find request transport: 0xffffffffffffffff [ 329.823613][ T8115] attempt to access beyond end of device [ 329.846659][ T8115] loop4: rw=1, want=79, limit=38 06:14:20 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3a00000210000507000000000000000600000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012000c0001006d61637674617000040002000c000500030000"], 0x3}}, 0x0) r2 = socket$inet(0x2, 0x200000002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001700)) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r6}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000240)={@dev, @remote}, &(0x7f0000000280)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x23b67a77341c1cb8}, @llc={0x1a, 0x29, 0x0, 0x8, 0x1, 0x81}, @ethernet={0x7, @remote}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0xd29b, 0x4}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @local}, &(0x7f00000001c0)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd1}, [@IFLA_LINKINFO={0x14}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32, @ANYRES32=0x0], 0x3}}, 0x44000) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32=0x0], 0x2}}, 0x0) r11 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r12 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r11, r12) r13 = socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32=r14, @ANYRES32=0x0], 0x3}}, 0x0) r15 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r15, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1a, &(0x7f0000001900)={@remote}, &(0x7f0000001940)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000001980)={@remote}, &(0x7f00000019c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32=0x0], 0x2}}, 0x0) r16 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r16, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0}, 0x0) r17 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r17, &(0x7f00000002c0)=ANY=[@ANYBLOB="c7"], 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x74000000, 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001b80)={{{@in6=@remote, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) r18 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r18, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32, @ANYRES32=0x0], 0x3}}, 0x0) r19 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r20 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r19, r20) socket$netlink(0x10, 0x3, 0x0) r21 = socket(0x0, 0x0, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) [ 329.870658][ T8115] attempt to access beyond end of device [ 329.916141][ T8115] loop4: rw=1, want=80, limit=38 [ 329.928414][ T8115] attempt to access beyond end of device 06:14:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xb01001f1}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x19, 0xffffffffffffffff, 0x0, 0x0, {0x6}, [@typed={0x8, 0x3, 0x0, 0x0, @u32=0x4}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xbc, &(0x7f0000000280)="a701edae407bc491ccdc386b67bc088f39bd14ec8051c3e4949c85e238c375327fa2a3dc2aeccccfa70d51eebc40332302abc1d0a6de463c16291c8508f9977a7a5e7d9cd36bc75db28dca5987ff3685dd81917951f76ee7dfb4e6210166be16944994685dd87390fdb77f5a832bc5f2d6aa832e8e490bbab59ab5ac0d9e680c76f94c4de03bb818665a961bab6bf6cffa295f10f72867338a3098a6932bf98d7a46638d2663c7687bd5207917024e425e4f20e98640d4922a72a2d6"}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) [ 329.961472][ T8115] loop4: rw=1, want=81, limit=38 [ 329.976746][ T8115] attempt to access beyond end of device [ 329.992400][ T8115] loop4: rw=1, want=130, limit=38 06:14:20 executing program 2: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) syz_genetlink_get_family_id$devlink(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x8}, 0x0) close(r2) [ 330.027835][ T8115] attempt to access beyond end of device [ 330.046315][ T8115] loop4: rw=1, want=131, limit=38 06:14:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xb01001f1}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) [ 330.087852][ T8115] attempt to access beyond end of device [ 330.093591][ T8115] loop4: rw=1, want=132, limit=38 [ 330.132558][ T8115] attempt to access beyond end of device [ 330.160539][ T8115] loop4: rw=1, want=133, limit=38 [ 330.165653][ T8115] attempt to access beyond end of device 06:14:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000004600)=""/210, 0x4f, 0x193, 0x8}, 0x20) [ 330.191389][ T8115] loop4: rw=1, want=150, limit=38 [ 330.196550][ T8115] attempt to access beyond end of device [ 330.206108][ T8115] loop4: rw=1, want=151, limit=38 [ 330.212080][ T8115] buffer_io_error: 67 callbacks suppressed [ 330.212093][ T8115] Buffer I/O error on dev loop4, logical block 150, lost async page write [ 330.272579][ T8115] attempt to access beyond end of device [ 330.277070][ T27] audit: type=1804 audit(1579846461.191:39): pid=8594 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir055699506/syzkaller.AwzWRI/24/bus" dev="sda1" ino=16604 res=1 [ 330.278808][ T8115] loop4: rw=1, want=152, limit=38 [ 330.320753][ T8595] BPF:Unsupported version [ 330.327702][ T8115] Buffer I/O error on dev loop4, logical block 151, lost async page write [ 330.345109][ T8115] attempt to access beyond end of device [ 330.351504][ T8115] loop4: rw=1, want=153, limit=38 [ 330.356581][ T8115] Buffer I/O error on dev loop4, logical block 152, lost async page write 06:14:21 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000040)=""/16, 0x10, 0x3) [ 330.383136][ T8115] attempt to access beyond end of device [ 330.389650][ T8115] loop4: rw=1, want=182, limit=38 [ 330.395137][ T8115] Buffer I/O error on dev loop4, logical block 181, lost async page write [ 330.404385][ T8115] attempt to access beyond end of device 06:14:21 executing program 2: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) syz_genetlink_get_family_id$devlink(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x8}, 0x0) close(r2) [ 330.408194][ T27] audit: type=1804 audit(1579846461.321:40): pid=8580 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir055699506/syzkaller.AwzWRI/24/bus" dev="sda1" ino=16604 res=1 [ 330.410468][ T8115] loop4: rw=1, want=183, limit=38 [ 330.496422][ T8115] Buffer I/O error on dev loop4, logical block 182, lost async page write [ 330.541549][ T8115] attempt to access beyond end of device [ 330.547415][ T8115] loop4: rw=1, want=184, limit=38 [ 330.552145][ T27] audit: type=1804 audit(1579846461.371:41): pid=8607 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir055699506/syzkaller.AwzWRI/24/bus" dev="sda1" ino=16604 res=1 [ 330.570966][ T8115] Buffer I/O error on dev loop4, logical block 183, lost async page write [ 330.598562][ T8115] attempt to access beyond end of device [ 330.604316][ T8115] loop4: rw=1, want=185, limit=38 [ 330.613349][ T8115] Buffer I/O error on dev loop4, logical block 184, lost async page write [ 330.622441][ T8115] attempt to access beyond end of device [ 330.623920][ T27] audit: type=1804 audit(1579846461.391:42): pid=8580 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir055699506/syzkaller.AwzWRI/24/bus" dev="sda1" ino=16604 res=1 [ 330.628390][ T8115] loop4: rw=1, want=206, limit=38 [ 330.662313][ T8115] Buffer I/O error on dev loop4, logical block 205, lost async page write [ 330.671330][ T8115] attempt to access beyond end of device [ 330.676967][ T8115] loop4: rw=1, want=207, limit=38 [ 330.703177][ T8115] Buffer I/O error on dev loop4, logical block 206, lost async page write [ 330.723699][ T8115] attempt to access beyond end of device [ 330.732239][ T8115] loop4: rw=1, want=208, limit=38 [ 330.757819][ T8115] Buffer I/O error on dev loop4, logical block 207, lost async page write [ 330.766363][ T8115] attempt to access beyond end of device [ 330.773414][ T27] audit: type=1804 audit(1579846461.391:43): pid=8580 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir055699506/syzkaller.AwzWRI/24/bus" dev="sda1" ino=16604 res=1 [ 330.802264][ T8115] loop4: rw=1, want=209, limit=38 [ 330.807419][ T8115] attempt to access beyond end of device [ 330.813437][ T8115] loop4: rw=1, want=258, limit=38 [ 330.818946][ T8115] attempt to access beyond end of device [ 330.824599][ T8115] loop4: rw=1, want=259, limit=38 [ 330.829962][ T8115] attempt to access beyond end of device [ 330.835635][ T8115] loop4: rw=1, want=260, limit=38 [ 330.841158][ T8115] attempt to access beyond end of device [ 330.846808][ T8115] loop4: rw=1, want=261, limit=38 [ 330.856116][ T8115] attempt to access beyond end of device [ 330.862294][ T8115] loop4: rw=1, want=2317, limit=38 [ 330.873065][ T8115] attempt to access beyond end of device [ 330.879913][ T8115] loop4: rw=1, want=4365, limit=38 [ 330.887333][ T8115] attempt to access beyond end of device [ 330.893221][ T8115] loop4: rw=1, want=4805, limit=38 06:14:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f00000002c0)='./bus\x00', 0x0) 06:14:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xb01001f1}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x19, 0xffffffffffffffff, 0x0, 0x0, {0x6}, [@typed={0x8, 0x3, 0x0, 0x0, @u32=0x4}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xbc, &(0x7f0000000280)="a701edae407bc491ccdc386b67bc088f39bd14ec8051c3e4949c85e238c375327fa2a3dc2aeccccfa70d51eebc40332302abc1d0a6de463c16291c8508f9977a7a5e7d9cd36bc75db28dca5987ff3685dd81917951f76ee7dfb4e6210166be16944994685dd87390fdb77f5a832bc5f2d6aa832e8e490bbab59ab5ac0d9e680c76f94c4de03bb818665a961bab6bf6cffa295f10f72867338a3098a6932bf98d7a46638d2663c7687bd5207917024e425e4f20e98640d4922a72a2d6"}) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 06:14:22 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3a00000210000507000000000000000600000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012000c0001006d61637674617000040002000c000500030000"], 0x3}}, 0x0) r2 = socket$inet(0x2, 0x200000002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001700)) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r6}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000240)={@dev, @remote}, &(0x7f0000000280)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x23b67a77341c1cb8}, @llc={0x1a, 0x29, 0x0, 0x8, 0x1, 0x81}, @ethernet={0x7, @remote}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0xd29b, 0x4}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @local}, &(0x7f00000001c0)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd1}, [@IFLA_LINKINFO={0x14}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32, @ANYRES32=0x0], 0x3}}, 0x44000) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32=0x0], 0x2}}, 0x0) r11 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r12 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r11, r12) r13 = socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32=r14, @ANYRES32=0x0], 0x3}}, 0x0) r15 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r15, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1a, &(0x7f0000001900)={@remote}, &(0x7f0000001940)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000001980)={@remote}, &(0x7f00000019c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32=0x0], 0x2}}, 0x0) r16 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r16, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0}, 0x0) r17 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r17, &(0x7f00000002c0)=ANY=[@ANYBLOB="c7"], 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x74000000, 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001b80)={{{@in6=@remote, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) r18 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r18, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32, @ANYRES32=0x0], 0x3}}, 0x0) r19 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r20 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r19, r20) socket$netlink(0x10, 0x3, 0x0) r21 = socket(0x0, 0x0, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) 06:14:22 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000004600)=""/210, 0x4f, 0x193, 0x8}, 0x20) 06:14:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xb01001f1}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x19, 0xffffffffffffffff, 0x0, 0x0, {0x6}, [@typed={0x8, 0x3, 0x0, 0x0, @u32=0x4}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xbc, &(0x7f0000000280)="a701edae407bc491ccdc386b67bc088f39bd14ec8051c3e4949c85e238c375327fa2a3dc2aeccccfa70d51eebc40332302abc1d0a6de463c16291c8508f9977a7a5e7d9cd36bc75db28dca5987ff3685dd81917951f76ee7dfb4e6210166be16944994685dd87390fdb77f5a832bc5f2d6aa832e8e490bbab59ab5ac0d9e680c76f94c4de03bb818665a961bab6bf6cffa295f10f72867338a3098a6932bf98d7a46638d2663c7687bd5207917024e425e4f20e98640d4922a72a2d6"}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 06:14:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') r1 = mq_open(&(0x7f0000000000)='comm\x00', 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000000) [ 331.745958][ T8115] attempt to access beyond end of device [ 331.755173][ T8641] BPF: (anon) type_id=1 bits_offset=11 [ 331.764547][ T8641] BPF: [ 331.767580][ T8644] BPF: (anon) type_id=1 bits_offset=11 [ 331.773550][ T8641] BPF:Member is not byte aligned [ 331.778587][ T8644] BPF: [ 331.781528][ T8641] BPF: [ 331.781528][ T8641] [ 331.783491][ T8115] loop4: rw=1, want=78, limit=38 [ 331.786530][ T8644] BPF:Member is not byte aligned 06:14:22 executing program 1: socket$inet(0x10, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000180)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x448a0) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = getpid() tkill(r2, 0x9) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r4 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xe02be, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x0, 0x1}, 0x0, 0xa71, 0x0, 0x6, 0x5, 0x0, 0x20}, 0x0, 0xffffffffffffffff, r0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xe00000000000000, 0x0, 0xffffffffffffffc2) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) openat(0xffffffffffffffff, 0x0, 0x800, 0x0) [ 331.797402][ T8644] BPF: [ 331.797402][ T8644] [ 331.802888][ T8115] attempt to access beyond end of device [ 331.832390][ T8115] loop4: rw=1, want=79, limit=38 [ 331.854472][ T8115] attempt to access beyond end of device [ 331.875992][ T8115] loop4: rw=1, want=80, limit=38 [ 331.892243][ T8115] attempt to access beyond end of device 06:14:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_XMIT_HASH_POLICY={0x5}]}}}]}, 0x3c}}, 0x0) [ 331.920101][ T8115] loop4: rw=1, want=81, limit=38 [ 331.935866][ T8115] attempt to access beyond end of device [ 331.953337][ T8115] loop4: rw=1, want=130, limit=38 [ 331.987006][ T8115] attempt to access beyond end of device [ 332.004395][ T8115] loop4: rw=1, want=131, limit=38 [ 332.019920][ T8115] attempt to access beyond end of device [ 332.021662][ T27] audit: type=1804 audit(1579846462.941:44): pid=8646 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir055699506/syzkaller.AwzWRI/25/bus" dev="sda1" ino=16629 res=1 [ 332.036054][ T8115] loop4: rw=1, want=132, limit=38 06:14:23 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000003400)={0x0, 0x0, @ioapic}) r1 = syz_open_procfs(0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="e65a000200006bed6c541e75d0261fbdf5001ed9"], 0x14) write$FUSE_BMAP(r2, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000002e40)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000000004000030030000000000000000000000000000200200003003000030030000300300003003000030030000030000000000000000000000fe8000000000000000000000000000bbfe800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000069703667726574617030000000000000767863616e31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200f0012002000000000000000000000000000000000000000000000000b800636f6e6e747261636b000000000000000000000000000000000000000001e000000100000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000090007372680000000000000000000000000000000000000000000000000000010000000000000000ff0200000000000000000000000000010000000000000000000000000000000100000000000000000000ffffac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000534554000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800100100000000000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000020000000000000000000000006e657462696f732d6e7300000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000000a42b5973c8936fc343d62bb86b9c0a6913368c3d058a400b3238d2d348ed72267f8f1cf445b71088750ecd562f05c5f5f8882eb1886d0ad8be50432276baf8f783f7faf4c96d56eb95f6f2de8fbf0ff5fd693220f52e1aaa120a24c9058c4302df710be58b051c4d8a1f62858eecfa45b4ce33830bb52fd76807cc4e903a058df1fa607cad1dadb3fda3cb5f035ac27cbd342cccdaa7fd81248cd572cd5df1c3c0e60ca0a8484f68bc30356aa12fda5b506012284"], 0x460) bind(r1, 0x0, 0xe9) prctl$PR_SET_UNALIGN(0x6, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d8ce0f0000e4"}, 0x1c) sendmmsg(r5, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) r6 = socket$packet(0x11, 0x0, 0x300) write$binfmt_misc(r4, &(0x7f0000000380)=ANY=[@ANYRESHEX, @ANYPTR=&(0x7f0000000700)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="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", @ANYPTR], @ANYRES64=r6, @ANYRESDEC=r5], 0x36) recvmmsg(r5, &(0x7f00000007c0)=[{{&(0x7f0000000040)=@l2, 0x80, 0x0}}, {{&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000002e00)=""/14, 0xe}], 0x1, &(0x7f0000000300)=""/193, 0xc1}, 0x1f}, {{&(0x7f0000002d80)=@hci, 0x80, &(0x7f0000000700)=[{&(0x7f0000000540)=""/133, 0x85}, {&(0x7f0000000400)=""/64, 0x40}, {&(0x7f0000000600)=""/96, 0x60}, {&(0x7f0000003380)=""/73, 0x49}], 0x4, &(0x7f0000000780)=""/31, 0x1f}, 0x9}], 0x3, 0x40000000, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) io_setup(0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r7, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r7, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) [ 332.092511][ T8115] attempt to access beyond end of device [ 332.100252][ T8115] loop4: rw=1, want=133, limit=38 [ 332.105427][ T8115] attempt to access beyond end of device [ 332.111365][ T8115] loop4: rw=1, want=150, limit=38 [ 332.116411][ T8115] attempt to access beyond end of device 06:14:23 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000004600)=""/210, 0x4f, 0x193, 0x8}, 0x20) [ 332.146667][ T8115] loop4: rw=1, want=151, limit=38 [ 332.151019][ T8664] xt_CT: You must specify a L4 protocol and not use inversions on it [ 332.197900][ T8115] attempt to access beyond end of device [ 332.203598][ T8115] loop4: rw=1, want=152, limit=38 [ 332.251474][ T8115] attempt to access beyond end of device [ 332.257146][ T8115] loop4: rw=1, want=153, limit=38 [ 332.264960][ T8669] BPF: (anon) type_id=1 bits_offset=11 [ 332.276402][ T8115] attempt to access beyond end of device [ 332.291263][ T8669] BPF: [ 332.294287][ T8669] BPF:Member is not byte aligned 06:14:23 executing program 0: ftruncate(0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'L-', 0xffffffff}, 0x16, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r4, &(0x7f00000005c0)=ANY=[], 0xfffffcaa) r5 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(r6, 0x4c08, 0x1) r7 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r7, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) r8 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x00') ioctl$TIOCGPTPEER(r8, 0x5441, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bind$alg(r5, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) r9 = accept4(r5, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) splice(r3, 0x0, r9, 0x0, 0x80000001, 0x0) fdatasync(r0) socket$inet6(0xa, 0x2, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') write(0xffffffffffffffff, &(0x7f0000002000)='/', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x87) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x7c8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xedc6) r11 = perf_event_open(&(0x7f0000000440)={0x2, 0x2c5, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0a82260001fd8e7fb00a3fd3d1004ce8a9da9fe3f7b66279"], 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r11, @ANYRES32=0x0], 0x2}}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="5d0000007d02030000b95ae06109e812a4f329aeffc707000000000000000002000000000000006700000765762f7367230001002f6d002327256e6f64457600000018ba01aaa8a031511dee51c26c324afccab9b0677973ad464072be05bb48000100002000"/111, @ANYRES32, @ANYRES32=r12, @ANYRES32=r13], 0x5d) r14 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r14, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0xa) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0xb09) r15 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') ioctl$KVM_DIRTY_TLB(r15, 0x400caeaa, &(0x7f00000001c0)={0xd, 0x8}) [ 332.299974][ T8672] BPF: (anon) type_id=1 bits_offset=11 [ 332.304307][ T8115] loop4: rw=1, want=182, limit=38 [ 332.305929][ T8669] BPF: [ 332.305929][ T8669] [ 332.319132][ T8115] attempt to access beyond end of device [ 332.331823][ T8115] loop4: rw=1, want=183, limit=38 [ 332.332899][ T8672] BPF: [ 332.343722][ T8115] attempt to access beyond end of device 06:14:23 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() getgid() tkill(r0, 0x9) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) socket$inet(0x2, 0x0, 0x0) [ 332.356195][ T8672] BPF:Member is not byte aligned [ 332.370896][ T8672] BPF: [ 332.370896][ T8672] [ 332.378405][ T8115] loop4: rw=1, want=184, limit=38 [ 332.388688][ T8115] attempt to access beyond end of device [ 332.401053][ T8115] loop4: rw=1, want=185, limit=38 [ 332.419713][ T8115] attempt to access beyond end of device [ 332.428387][ T8115] loop4: rw=1, want=206, limit=38 [ 332.433643][ T8115] attempt to access beyond end of device [ 332.439791][ T8115] loop4: rw=1, want=207, limit=38 [ 332.445126][ T8115] attempt to access beyond end of device [ 332.451383][ T8115] loop4: rw=1, want=208, limit=38 [ 332.456879][ T8115] attempt to access beyond end of device [ 332.475267][ T8115] loop4: rw=1, want=209, limit=38 [ 332.487148][ T8115] attempt to access beyond end of device [ 332.494232][ T8115] loop4: rw=1, want=258, limit=38 [ 332.499771][ T8115] attempt to access beyond end of device [ 332.505686][ T8115] loop4: rw=1, want=259, limit=38 [ 332.511267][ T8115] attempt to access beyond end of device [ 332.519664][ T27] audit: type=1804 audit(1579846463.441:45): pid=8680 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir055699506/syzkaller.AwzWRI/26/file0" dev="sda1" ino=16630 res=1 [ 332.571830][ T8115] loop4: rw=1, want=260, limit=38 [ 332.596350][ T8115] attempt to access beyond end of device [ 332.610937][ T27] audit: type=1804 audit(1579846463.531:46): pid=8680 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir055699506/syzkaller.AwzWRI/26/file0" dev="sda1" ino=16630 res=1 [ 332.618151][ T8115] loop4: rw=1, want=261, limit=38 [ 332.719568][ T8115] attempt to access beyond end of device [ 332.736637][ T8115] loop4: rw=1, want=2381, limit=38 [ 332.755833][ T8115] attempt to access beyond end of device [ 332.765296][ T8115] loop4: rw=1, want=4429, limit=38 [ 332.776736][ T8115] attempt to access beyond end of device [ 332.785554][ T8115] loop4: rw=1, want=6477, limit=38 [ 332.800539][ T8115] attempt to access beyond end of device [ 332.806190][ T8115] loop4: rw=1, want=8525, limit=38 [ 332.816294][ T8115] attempt to access beyond end of device [ 332.822109][ T8115] loop4: rw=1, want=10573, limit=38 [ 332.832112][ T8115] attempt to access beyond end of device [ 332.837939][ T8115] loop4: rw=1, want=12621, limit=38 [ 332.847907][ T8115] attempt to access beyond end of device [ 332.853729][ T8115] loop4: rw=1, want=14917, limit=38 [ 332.865297][ T8115] attempt to access beyond end of device [ 332.871112][ T8115] loop4: rw=1, want=18005, limit=38 [ 332.884058][ T8115] attempt to access beyond end of device [ 332.889752][ T8115] loop4: rw=1, want=21085, limit=38 [ 332.917828][ T8115] attempt to access beyond end of device [ 332.923477][ T8115] loop4: rw=1, want=33077, limit=38 [ 332.949585][ T8691] xt_CT: You must specify a L4 protocol and not use inversions on it 06:14:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) pipe(&(0x7f0000000200)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f00000002c0)='./bus\x00', 0x0) 06:14:24 executing program 1: mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000180)='.//ile0\x00', r0, &(0x7f00000007c0)='./file0/f.le.\x00') socket$packet(0x11, 0x0, 0x300) getsockname(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fchdir(r1) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) link(&(0x7f0000000400)='./file0/f.le.\x00', &(0x7f00000004c0)='.//ile0\x00') 06:14:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xb01001f1}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x19, 0xffffffffffffffff, 0x0, 0x0, {0x6}, [@typed={0x8, 0x3, 0x0, 0x0, @u32=0x4}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xbc, &(0x7f0000000280)="a701edae407bc491ccdc386b67bc088f39bd14ec8051c3e4949c85e238c375327fa2a3dc2aeccccfa70d51eebc40332302abc1d0a6de463c16291c8508f9977a7a5e7d9cd36bc75db28dca5987ff3685dd81917951f76ee7dfb4e6210166be16944994685dd87390fdb77f5a832bc5f2d6aa832e8e490bbab59ab5ac0d9e680c76f94c4de03bb818665a961bab6bf6cffa295f10f72867338a3098a6932bf98d7a46638d2663c7687bd5207917024e425e4f20e98640d4922a72a2d6"}) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 06:14:24 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x19, 0xffffffffffffffff, 0x0, 0x0, {0x6}, [@typed={0x8, 0x3, 0x0, 0x0, @u32=0x4}]}, 0x1c}}, 0x0) 06:14:24 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000040)=""/16, 0x10, 0x3) 06:14:24 executing program 0: ftruncate(0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'L-', 0xffffffff}, 0x16, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r4, &(0x7f00000005c0)=ANY=[], 0xfffffcaa) r5 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$LOOP_SET_DIRECT_IO(r6, 0x4c08, 0x1) r7 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r7, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) r8 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x00') ioctl$TIOCGPTPEER(r8, 0x5441, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bind$alg(r5, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) r9 = accept4(r5, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) splice(r3, 0x0, r9, 0x0, 0x80000001, 0x0) fdatasync(r0) socket$inet6(0xa, 0x2, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') write(0xffffffffffffffff, &(0x7f0000002000)='/', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x87) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x7c8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xedc6) r11 = perf_event_open(&(0x7f0000000440)={0x2, 0x2c5, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="0a82260001fd8e7fb00a3fd3d1004ce8a9da9fe3f7b66279"], 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r11, @ANYRES32=0x0], 0x2}}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="5d0000007d02030000b95ae06109e812a4f329aeffc707000000000000000002000000000000006700000765762f7367230001002f6d002327256e6f64457600000018ba01aaa8a031511dee51c26c324afccab9b0677973ad464072be05bb48000100002000"/111, @ANYRES32, @ANYRES32=r12, @ANYRES32=r13], 0x5d) r14 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r14, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0xa) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0xb09) r15 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') ioctl$KVM_DIRTY_TLB(r15, 0x400caeaa, &(0x7f00000001c0)={0xd, 0x8}) [ 333.799309][ T8707] overlayfs: conflicting lowerdir path [ 333.819126][ T8115] attempt to access beyond end of device [ 333.825015][ T8115] loop4: rw=1, want=78, limit=38 [ 333.839346][ T8115] attempt to access beyond end of device 06:14:24 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltgid={'dfltgid'}}], [], 0x6b}}) 06:14:24 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x7400, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3a00000210000507000000000000000600000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012000c0001006d61637674617000040002000c0005000300000000000000"], 0x40}}, 0x0) socket$inet(0x2, 0x200000002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001700)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000240)={@dev, @remote}, &(0x7f0000000280)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) dup(0xffffffffffffffff) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @local}, &(0x7f00000001c0)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd1}, [@IFLA_LINKINFO={0x14}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32, @ANYRES32=0x0], 0x3}}, 0x44000) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES64, @ANYRES32, @ANYRES32=0x0], 0x3}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r8) r9 = socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32=r10, @ANYRES32=0x0], 0x3}}, 0x0) r11 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r11, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1a, &(0x7f0000001900)={@remote}, &(0x7f0000001940)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000001980)={@remote}, &(0x7f00000019c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32=0x0], 0x2}}, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd1}, [@IFLA_LINKINFO={0x14}]}, 0x34}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r13 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r13, &(0x7f00000002c0)=ANY=[@ANYBLOB="c7"], 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x74000000, 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001b80)={{{@in6=@remote, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32, @ANYRES32=0x0], 0x3}}, 0x0) r15 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r15) socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x0, 0x803, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) [ 333.852149][ T8713] overlayfs: conflicting lowerdir path [ 333.860596][ T8115] loop4: rw=1, want=79, limit=38 [ 333.865801][ T8115] attempt to access beyond end of device [ 333.872604][ T8115] loop4: rw=1, want=80, limit=38 [ 333.892034][ T8115] attempt to access beyond end of device [ 333.904807][ T8115] loop4: rw=1, want=81, limit=38 [ 333.922139][ T8115] attempt to access beyond end of device [ 333.938139][ T8115] loop4: rw=1, want=130, limit=38 [ 333.964704][ T27] audit: type=1804 audit(1579846464.881:47): pid=8721 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir055699506/syzkaller.AwzWRI/27/file0" dev="sda1" ino=16653 res=1 [ 333.983530][ T8115] attempt to access beyond end of device [ 334.013730][ T8115] loop4: rw=1, want=131, limit=38 [ 334.037779][ T8115] attempt to access beyond end of device [ 334.066602][ T8115] loop4: rw=1, want=132, limit=38 [ 334.078848][ T8115] attempt to access beyond end of device 06:14:25 executing program 1: perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x44}}, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x3000) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) [ 334.091011][ T8115] loop4: rw=1, want=133, limit=38 [ 334.098399][ T8115] attempt to access beyond end of device [ 334.104315][ T8115] loop4: rw=1, want=150, limit=38 [ 334.109733][ T8115] attempt to access beyond end of device [ 334.115519][ T8115] loop4: rw=1, want=151, limit=38 [ 334.121018][ T8115] attempt to access beyond end of device [ 334.122278][ T27] audit: type=1804 audit(1579846464.981:48): pid=8721 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir055699506/syzkaller.AwzWRI/27/file0" dev="sda1" ino=16653 res=1 [ 334.126814][ T8115] loop4: rw=1, want=152, limit=38 [ 334.180390][ T8115] attempt to access beyond end of device [ 334.199002][ T8115] loop4: rw=1, want=153, limit=38 [ 334.210367][ T8115] attempt to access beyond end of device [ 334.226396][ T8115] loop4: rw=1, want=182, limit=38 [ 334.237992][ T8115] attempt to access beyond end of device [ 334.253950][ T8115] loop4: rw=1, want=183, limit=38 [ 334.263004][ T8115] attempt to access beyond end of device [ 334.269264][ T8115] loop4: rw=1, want=184, limit=38 [ 334.274414][ T8115] attempt to access beyond end of device [ 334.282689][ T8115] loop4: rw=1, want=185, limit=38 [ 334.289542][ T8115] attempt to access beyond end of device [ 334.295207][ T8115] loop4: rw=1, want=206, limit=38 [ 334.304511][ T8115] attempt to access beyond end of device [ 334.310244][ T8115] loop4: rw=1, want=207, limit=38 [ 334.315281][ T8115] attempt to access beyond end of device [ 334.325799][ T8115] loop4: rw=1, want=208, limit=38 [ 334.337814][ T8115] attempt to access beyond end of device [ 334.343560][ T8115] loop4: rw=1, want=209, limit=38 [ 334.351957][ T27] audit: type=1804 audit(1579846465.271:49): pid=8732 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir152424784/syzkaller.uLtvTc/20/bus" dev="sda1" ino=16629 res=1 [ 334.357857][ T8115] attempt to access beyond end of device [ 334.393554][ T8115] loop4: rw=1, want=258, limit=38 [ 334.398664][ T8115] attempt to access beyond end of device 06:14:25 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000080}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(r0) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() getgid() ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f00000004c0)={0x0, 0x5a9}) tkill(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) close(0xffffffffffffffff) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000040)=0x1, 0x4) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x19, 0xffffffffffffffff, 0x0, 0x0, {0x6}, [@typed={0x8, 0x3, 0x0, 0x0, @u32=0x4}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') r5 = dup2(0xffffffffffffffff, r3) write$FUSE_NOTIFY_DELETE(r5, &(0x7f0000000040)={0x29, 0x6, 0x0, {0x1}}, 0x29) [ 334.404308][ T8115] loop4: rw=1, want=259, limit=38 [ 334.409478][ T8115] attempt to access beyond end of device [ 334.415117][ T8115] loop4: rw=1, want=260, limit=38 [ 334.420196][ T8115] attempt to access beyond end of device [ 334.425874][ T8115] loop4: rw=1, want=261, limit=38 [ 334.438171][ T8115] attempt to access beyond end of device [ 334.443929][ T8115] loop4: rw=1, want=2317, limit=38 [ 334.455719][ T8115] attempt to access beyond end of device [ 334.461519][ T8115] loop4: rw=1, want=4365, limit=38 [ 334.472689][ T8115] attempt to access beyond end of device [ 334.479435][ T8115] loop4: rw=1, want=6413, limit=38 [ 334.493012][ T8115] attempt to access beyond end of device [ 334.498802][ T8115] loop4: rw=1, want=8461, limit=38 [ 334.510740][ T8115] attempt to access beyond end of device [ 334.516409][ T8115] loop4: rw=1, want=10509, limit=38 [ 334.528932][ T8115] attempt to access beyond end of device [ 334.534746][ T8115] loop4: rw=1, want=12557, limit=38 [ 334.545182][ T8115] attempt to access beyond end of device [ 334.551080][ T8115] loop4: rw=1, want=14605, limit=38 [ 334.564533][ T8115] attempt to access beyond end of device [ 334.570655][ T8115] loop4: rw=1, want=18821, limit=38 [ 334.584207][ T8115] attempt to access beyond end of device [ 334.589900][ T8115] loop4: rw=1, want=21581, limit=38 [ 334.618555][ T8115] attempt to access beyond end of device [ 334.633932][ T8744] fuse: Bad value for 'fd' [ 334.637830][ T8115] loop4: rw=1, want=33077, limit=38 06:14:25 executing program 1: 06:14:25 executing program 0: 06:14:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x4c94, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f00000002c0)='./bus\x00', 0x0) 06:14:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xb01001f1}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x19, 0xffffffffffffffff, 0x0, 0x0, {0x6}, [@typed={0x8, 0x3, 0x0, 0x0, @u32=0x4}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xbc, &(0x7f0000000280)="a701edae407bc491ccdc386b67bc088f39bd14ec8051c3e4949c85e238c375327fa2a3dc2aeccccfa70d51eebc40332302abc1d0a6de463c16291c8508f9977a7a5e7d9cd36bc75db28dca5987ff3685dd81917951f76ee7dfb4e6210166be16944994685dd87390fdb77f5a832bc5f2d6aa832e8e490bbab59ab5ac0d9e680c76f94c4de03bb818665a961bab6bf6cffa295f10f72867338a3098a6932bf98d7a46638d2663c7687bd5207917024e425e4f20e98640d4922a72a2d6"}) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 06:14:26 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x7400, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3a00000210000507000000000000000600000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012000c0001006d61637674617000040002000c0005000300000000000000"], 0x40}}, 0x0) socket$inet(0x2, 0x200000002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001700)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000240)={@dev, @remote}, &(0x7f0000000280)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) dup(0xffffffffffffffff) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @local}, &(0x7f00000001c0)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd1}, [@IFLA_LINKINFO={0x14}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32, @ANYRES32=0x0], 0x3}}, 0x44000) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES64, @ANYRES32, @ANYRES32=0x0], 0x3}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r8) r9 = socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32=r10, @ANYRES32=0x0], 0x3}}, 0x0) r11 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r11, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1a, &(0x7f0000001900)={@remote}, &(0x7f0000001940)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000001980)={@remote}, &(0x7f00000019c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32=0x0], 0x2}}, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd1}, [@IFLA_LINKINFO={0x14}]}, 0x34}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r13 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r13, &(0x7f00000002c0)=ANY=[@ANYBLOB="c7"], 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x74000000, 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001b80)={{{@in6=@remote, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32, @ANYRES32=0x0], 0x3}}, 0x0) r15 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r15) socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x0, 0x803, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) 06:14:26 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x7400, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3a00000210000507000000000000000600000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012000c0001006d61637674617000040002000c0005000300000000000000"], 0x40}}, 0x0) socket$inet(0x2, 0x200000002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001700)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0xe], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000240)={@dev, @remote}, &(0x7f0000000280)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000240)={@dev, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) dup(0xffffffffffffffff) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @local}, &(0x7f00000001c0)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd1}, [@IFLA_LINKINFO={0x14}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32, @ANYRES32=0x0], 0x3}}, 0x44000) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES64, @ANYRES32, @ANYRES32=0x0], 0x3}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r8) r9 = socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32=r10, @ANYRES32=0x0], 0x3}}, 0x0) r11 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r11, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1a, &(0x7f0000001900)={@remote}, &(0x7f0000001940)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000001980)={@remote}, &(0x7f00000019c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32=0x0], 0x2}}, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd1}, [@IFLA_LINKINFO={0x14}]}, 0x34}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r13 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r13, &(0x7f00000002c0)=ANY=[@ANYBLOB="c7"], 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x74000000, 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001b80)={{{@in6=@remote, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000f8000800000000000000", @ANYRES32, @ANYRES32=0x0], 0x3}}, 0x0) r15 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r15) socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x0, 0x803, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) 06:14:26 executing program 0: [ 335.676350][ T8115] attempt to access beyond end of device [ 335.688769][ T8115] loop4: rw=1, want=78, limit=38 [ 335.696202][ T8115] buffer_io_error: 53 callbacks suppressed [ 335.696259][ T8115] Buffer I/O error on dev loop4, logical block 77, lost async page write 06:14:26 executing program 0: r0 = semget$private(0x0, 0x6, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xff, 0x1000}, {0x4, 0x1ff}, {0x0, 0xff, 0x400}, {0x4, 0xc5f, 0x1000}, {0x0, 0x8, 0x1000}, {0x0, 0x7, 0x1000}, {0x0, 0x68}, {0x0, 0x7fff, 0x1000}], 0x8) [ 335.723289][ T8115] attempt to access beyond end of device [ 335.733452][ T8115] loop4: rw=1, want=79, limit=38 [ 335.751984][ T8115] Buffer I/O error on dev loop4, logical block 78, lost async page write [ 335.762660][ T8115] attempt to access beyond end of device [ 335.768546][ T8115] loop4: rw=1, want=80, limit=38 [ 335.773553][ T8115] Buffer I/O error on dev loop4, logical block 79, lost async page write [ 335.782803][ T8115] attempt to access beyond end of device [ 335.792742][ T8115] loop4: rw=1, want=81, limit=38 [ 335.798012][ T8115] Buffer I/O error on dev loop4, logical block 80, lost async page write [ 335.806720][ T8115] attempt to access beyond end of device [ 335.812685][ T8115] loop4: rw=1, want=130, limit=38 [ 335.817983][ T8115] Buffer I/O error on dev loop4, logical block 129, lost async page write [ 335.826665][ T8115] attempt to access beyond end of device [ 335.832663][ T8115] loop4: rw=1, want=131, limit=38 [ 335.843632][ T8115] Buffer I/O error on dev loop4, logical block 130, lost async page write [ 335.874748][ T8115] attempt to access beyond end of device [ 335.883482][ T8115] loop4: rw=1, want=132, limit=38 [ 335.891317][ T8115] Buffer I/O error on dev loop4, logical block 131, lost async page write [ 335.900446][ T8115] attempt to access beyond end of device [ 335.906446][ T8115] loop4: rw=1, want=133, limit=38 [ 335.911971][ T8115] Buffer I/O error on dev loop4, logical block 132, lost async page write [ 335.927243][ T8115] attempt to access beyond end of device [ 335.933800][ T8115] loop4: rw=1, want=150, limit=38 [ 335.939418][ T8115] Buffer I/O error on dev loop4, logical block 149, lost async page write [ 335.948270][ T8115] attempt to access beyond end of device [ 335.954006][ T8115] loop4: rw=1, want=151, limit=38 [ 335.959538][ T8115] Buffer I/O error on dev loop4, logical block 150, lost async page write [ 335.984053][ T8115] attempt to access beyond end of device [ 335.999296][ T8115] loop4: rw=1, want=152, limit=38 [ 336.012491][ T8115] attempt to access beyond end of device [ 336.024750][ T8115] loop4: rw=1, want=153, limit=38 [ 336.030296][ T8115] attempt to access beyond end of device [ 336.035992][ T8115] loop4: rw=1, want=182, limit=38 [ 336.042423][ T8115] attempt to access beyond end of device [ 336.048453][ T8115] loop4: rw=1, want=183, limit=38 [ 336.053546][ T8115] attempt to access beyond end of device [ 336.059569][ T8115] loop4: rw=1, want=184, limit=38 [ 336.064774][ T8115] attempt to access beyond end of device [ 336.070759][ T8115] loop4: rw=1, want=185, limit=38 [ 336.075894][ T8115] attempt to access beyond end of device [ 336.081877][ T8115] loop4: rw=1, want=206, limit=38 [ 336.087501][ T8115] attempt to access beyond end of device [ 336.094589][ T8115] loop4: rw=1, want=207, limit=38 [ 336.100511][ T8115] attempt to access beyond end of device [ 336.106244][ T8115] loop4: rw=1, want=208, limit=38 [ 336.112180][ T8115] attempt to access beyond end of device [ 336.118221][ T8115] loop4: rw=1, want=209, limit=38 [ 336.129682][ T8115] attempt to access beyond end of device [ 336.138762][ T8115] loop4: rw=1, want=258, limit=38 [ 336.152360][ T8115] attempt to access beyond end of device [ 336.164167][ T8115] loop4: rw=1, want=259, limit=38 [ 336.169740][ T8115] attempt to access beyond end of device [ 336.175434][ T8115] loop4: rw=1, want=260, limit=38 [ 336.180989][ T8115] attempt to access beyond end of device [ 336.186663][ T8115] loop4: rw=1, want=261, limit=38 [ 336.196869][ T8115] attempt to access beyond end of device [ 336.202879][ T8115] loop4: rw=1, want=2317, limit=38 [ 336.212989][ T8115] attempt to access beyond end of device [ 336.219600][ T8115] loop4: rw=1, want=4365, limit=38 [ 336.229771][ T8115] attempt to access beyond end of device [ 336.235404][ T8115] loop4: rw=1, want=6413, limit=38 [ 336.245333][ T8115] attempt to access beyond end of device [ 336.251137][ T8115] loop4: rw=1, want=8461, limit=38 [ 336.262193][ T8115] attempt to access beyond end of device [ 336.268209][ T8115] loop4: rw=1, want=10509, limit=38 [ 336.278723][ T8115] attempt to access beyond end of device [ 336.284370][ T8115] loop4: rw=1, want=12557, limit=38 [ 336.294743][ T8115] attempt to access beyond end of device [ 336.300437][ T8115] loop4: rw=1, want=15005, limit=38 [ 336.310725][ T8115] attempt to access beyond end of device [ 336.316576][ T8115] loop4: rw=1, want=17053, limit=38 [ 336.344504][ T8115] attempt to access beyond end of device [ 336.350232][ T8115] loop4: rw=1, want=22061, limit=38 [ 336.377072][ T8115] attempt to access beyond end of device [ 336.382744][ T8115] loop4: rw=1, want=33077, limit=38 [ 336.652922][ T8793] ================================================================== [ 336.661086][ T8793] BUG: KCSAN: data-race in __remove_assoc_queue / mark_buffer_dirty_inode [ 336.669582][ T8793] [ 336.671914][ T8793] read to 0xffff8880991a4c20 of 8 bytes by task 8790 on cpu 1: [ 336.679454][ T8793] mark_buffer_dirty_inode+0xa1/0x260 [ 336.684814][ T8793] fat_mirror_bhs+0xff/0x2f0 [ 336.689392][ T8793] fat_alloc_clusters+0xa9c/0xc40 [ 336.694407][ T8793] fat_add_cluster+0x3d/0xd0 [ 336.698984][ T8793] fat_get_block+0x3ae/0x4e0 [ 336.703564][ T8793] __block_write_begin_int+0x2ea/0xf10 [ 336.709022][ T8793] block_write_begin+0x77/0x160 [ 336.713870][ T8793] cont_write_begin+0x3d6/0x670 [ 336.718726][ T8793] fat_write_begin+0x72/0xc0 [ 336.723310][ T8793] generic_perform_write+0x136/0x320 [ 336.728593][ T8793] __generic_file_write_iter+0x251/0x380 [ 336.734237][ T8793] generic_file_write_iter+0x28c/0x38c [ 336.739710][ T8793] new_sync_write+0x388/0x4a0 [ 336.744376][ T8793] __vfs_write+0xb1/0xc0 [ 336.748606][ T8793] vfs_write+0x18a/0x390 [ 336.752850][ T8793] ksys_pwrite64+0xee/0x120 [ 336.757351][ T8793] __x64_sys_pwrite64+0x5e/0x80 [ 336.762212][ T8793] do_syscall_64+0xcc/0x3a0 [ 336.766703][ T8793] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 336.772569][ T8793] [ 336.774908][ T8793] write to 0xffff8880991a4c20 of 8 bytes by task 8793 on cpu 0: [ 336.782523][ T8793] __remove_assoc_queue+0xa2/0x140 [ 336.787900][ T8793] sync_mapping_buffers+0x420/0x6e0 [ 336.793099][ T8793] fat_file_fsync+0xd4/0x120 [ 336.797673][ T8793] vfs_fsync_range+0x82/0x150 [ 336.802342][ T8793] generic_file_write_iter+0x318/0x38c [ 336.807793][ T8793] do_iter_readv_writev+0x487/0x5b0 [ 336.812981][ T8793] do_iter_write+0x13b/0x3c0 [ 336.817571][ T8793] vfs_iter_write+0x5c/0x80 [ 336.822058][ T8793] iter_file_splice_write+0x530/0x840 [ 336.827434][ T8793] direct_splice_actor+0xa0/0xc0 [ 336.832356][ T8793] splice_direct_to_actor+0x22b/0x540 [ 336.837721][ T8793] do_splice_direct+0x161/0x1e0 [ 336.842607][ T8793] do_sendfile+0x384/0x7f0 [ 336.847010][ T8793] __x64_sys_sendfile64+0xbe/0x140 [ 336.852106][ T8793] do_syscall_64+0xcc/0x3a0 [ 336.856596][ T8793] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 336.862472][ T8793] [ 336.864784][ T8793] Reported by Kernel Concurrency Sanitizer on: [ 336.870956][ T8793] CPU: 0 PID: 8793 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 336.879529][ T8793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.889592][ T8793] ================================================================== [ 336.897654][ T8793] Kernel panic - not syncing: panic_on_warn set ... [ 336.904227][ T8793] CPU: 0 PID: 8793 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 336.912787][ T8793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.922821][ T8793] Call Trace: [ 336.926096][ T8793] dump_stack+0x11d/0x181 [ 336.930418][ T8793] panic+0x210/0x640 [ 336.934567][ T8793] ? vprintk_func+0x8d/0x140 [ 336.939148][ T8793] kcsan_report.cold+0xc/0xd [ 336.943728][ T8793] kcsan_setup_watchpoint+0x3fe/0x460 [ 336.949089][ T8793] __tsan_unaligned_write8+0xc7/0x110 [ 336.954449][ T8793] __remove_assoc_queue+0xa2/0x140 [ 336.959552][ T8793] sync_mapping_buffers+0x420/0x6e0 [ 336.964738][ T8793] ? 0xffffffff81000000 [ 336.968908][ T8793] fat_file_fsync+0xd4/0x120 [ 336.973485][ T8793] ? fat_free_clusters.cold+0x30/0x30 [ 336.978852][ T8793] vfs_fsync_range+0x82/0x150 [ 336.983529][ T8793] generic_file_write_iter+0x318/0x38c [ 336.989069][ T8793] do_iter_readv_writev+0x487/0x5b0 [ 336.994268][ T8793] ? security_file_permission+0x88/0x280 [ 336.999910][ T8793] do_iter_write+0x13b/0x3c0 [ 337.004504][ T8793] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 337.010474][ T8793] vfs_iter_write+0x5c/0x80 [ 337.014988][ T8793] iter_file_splice_write+0x530/0x840 [ 337.020376][ T8793] ? page_cache_pipe_buf_release+0x100/0x100 [ 337.026402][ T8793] direct_splice_actor+0xa0/0xc0 [ 337.031338][ T8793] splice_direct_to_actor+0x22b/0x540 [ 337.036707][ T8793] ? generic_pipe_buf_nosteal+0x20/0x20 [ 337.042263][ T8793] do_splice_direct+0x161/0x1e0 [ 337.047142][ T8793] do_sendfile+0x384/0x7f0 [ 337.051660][ T8793] __x64_sys_sendfile64+0xbe/0x140 [ 337.056767][ T8793] do_syscall_64+0xcc/0x3a0 [ 337.061286][ T8793] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 337.067168][ T8793] RIP: 0033:0x45b349 [ 337.071060][ T8793] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.090661][ T8793] RSP: 002b:00007f1403ccac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 337.099175][ T8793] RAX: ffffffffffffffda RBX: 00007f1403ccb6d4 RCX: 000000000045b349 [ 337.107145][ T8793] RDX: 0000000020000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 337.115107][ T8793] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 337.123069][ T8793] R10: 00008080fffffffe R11: 0000000000000246 R12: 00000000ffffffff [ 337.131030][ T8793] R13: 00000000000008a6 R14: 00000000004ca018 R15: 000000000075bfd4 [ 337.140443][ T8793] Kernel Offset: disabled [ 337.144779][ T8793] Rebooting in 86400 seconds..