cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:41:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x6, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x12000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1325.414389][T25997] loop1: p1 p3 p4 [ 1325.418756][T25997] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1325.427625][T25997] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1325.436418][T25997] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1325.444306][T26003] loop2: p1 p3 p4 23:41:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x13000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1325.662113][T26003] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1325.670907][T26007] fuse: Bad value for 'fd' [ 1325.678033][T26009] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1325.693002][T26003] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1325.703533][T26003] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:41:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1325.704090][T25997] loop1: p1 p3 p4 [ 1325.719534][T25997] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1325.729888][T25997] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1325.739857][T25997] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:41:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x14000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1325.767999][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1325.769548][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1325.886135][T26003] loop2: p1 p3 p4 [ 1325.890185][T26003] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1325.899687][T26003] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1325.913650][T26003] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1326.195155][T26025] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1326.196468][T26025] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:41:46 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00084000080000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xa, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:46 executing program 3: syz_read_part_table(0x0, 0x7, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x40000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:46 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105000003a7000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:46 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:41:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x99000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1326.645563][T26036] loop1: p1 p3 p4 [ 1326.650005][T26036] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1326.658647][T26036] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1326.667875][T26036] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:41:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9effffff, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1326.784111][T26037] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1326.790658][T26037] loop3: p4 size 3657465856 extends beyond EOD, [ 1326.872963][T26038] loop2: p1[EZD] p3 p4 [ 1326.882040][T26037] truncated 23:41:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xeaffffff, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x11, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1326.886229][T26038] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1326.901340][T26038] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1326.911163][T26038] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1326.923522][T26044] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1326.987507][T26036] loop1: p1 p3 p4 [ 1326.993940][T26036] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1327.002355][T26036] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1327.011792][T26038] loop2: p1[EZD] p3 p4 [ 1327.016627][T26038] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1327.027978][T26038] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:41:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xefffffff, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x12, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1327.037409][T26036] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1327.047512][T26038] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1327.183536][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1327.184819][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:41:47 executing program 3: syz_read_part_table(0x0, 0x8, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:47 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000200000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:47 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105000007c8000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x13, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xf0ffffff, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:47 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81b53df892", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:41:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x14, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfeffffff, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1327.564050][T26070] loop2: p1 p3 p4 [ 1327.567987][T26070] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1327.576136][T26070] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1327.594319][T26071] loop1: p1 p3 p4 [ 1327.598855][T26071] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1327.608851][T26071] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1327.618849][T26071] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1327.701713][T26070] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:41:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1d2, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xffffff7f, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1327.885557][T26078] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:41:47 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00087ffff00000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1327.934390][T26075] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1327.935935][T26075] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:41:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xffffff9e, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1328.067686][T26070] loop2: p1 p3 p4 [ 1328.071627][T26070] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1328.093583][T26070] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1328.111611][T26070] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1328.123933][T26093] loop1: p1 p3 p4 [ 1328.132140][T26093] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1328.145043][T26093] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1328.155971][T26093] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1328.166595][ T148] loop1: p1 p3 p4 [ 1328.170606][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1328.180946][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1328.189584][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1328.449204][T26075] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1328.450315][T26075] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:41:48 executing program 3: syz_read_part_table(0x0, 0x9, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x300, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xffffffea, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:48 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105000007cd000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:48 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000100000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:48 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:41:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xffffffef, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x500, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffff0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1328.784690][T26102] loop1: p1 p3 p4 [ 1328.788791][T26102] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1328.925651][T26102] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1329.000237][T26102] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1329.094030][T26103] loop2: p1 < > p3 p4 [ 1329.101282][T26112] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1329.110890][T26103] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:41:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffffe, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x600, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1329.140050][T26103] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:41:49 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010504ac45ff000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1329.180681][T26102] loop1: p1 p3 p4 [ 1329.186864][T26102] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1329.218746][T26102] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1329.230944][T26102] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1329.268746][T26124] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1329.270167][T26124] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1329.380218][ T148] loop1: p1 p3 p4 [ 1329.384543][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1329.393679][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1329.402076][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1329.423268][T26128] loop2: p1[EZD] p3 p4 [ 1329.427726][T26128] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1329.436140][T26128] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1329.444614][T26128] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1329.579036][T26128] loop2: p1[EZD] p3 p4 [ 1329.583454][T26128] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1329.591119][T26128] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1329.599541][T26128] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1329.632062][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1329.633063][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:41:49 executing program 3: syz_read_part_table(0x0, 0xa, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x900, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:49 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000804024a0100000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:49 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:41:49 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050002000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x2, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xa00, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1329.983386][T26140] loop1: p1 p3 p4 [ 1329.991348][T26140] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1329.999010][T26140] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1330.006869][T26140] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1330.014557][T26141] loop2: p1 p3 p4 [ 1330.018447][T26141] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1330.034513][T26141] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1330.047945][T26141] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1330.116849][T26143] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1330.142435][T26143] loop3: p4 size 3657465856 extends beyond EOD, [ 1330.211679][ T148] loop1: p1 p3 p4 [ 1330.232718][T26143] truncated 23:41:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x3, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb00, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:50 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000200000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1330.240713][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1330.253336][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1330.266858][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1330.283008][T26147] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:41:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x4, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1330.352893][T26141] loop2: p1 p3 p4 [ 1330.356844][T26141] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1330.365155][T26141] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1330.373567][T26141] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1330.463560][T26161] loop1: p1 p3 p4 [ 1330.467479][T26161] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1330.475907][T26161] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1330.483811][T26161] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1330.525648][ T148] loop1: p1 p3 p4 [ 1330.529483][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1330.538014][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1330.546361][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1330.593010][T26161] loop1: p1 p3 p4 [ 1330.596958][T26161] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1330.606691][T26161] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1330.615948][T26161] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1330.644733][T26143] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1330.645719][T26143] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:41:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x5, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1100, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:50 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050003000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:50 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000040200000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:50 executing program 3: syz_read_part_table(0x0, 0xb, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:50 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:41:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1200, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1330.964116][T26171] loop1: p1 p3 p4 [ 1330.968191][T26171] loop1: p1 size 78398975 extends beyond EOD, truncated 23:41:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x8, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1300, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1331.213534][T26171] loop1: p3 size 1912633224 extends beyond EOD, truncated 23:41:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x9, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1331.274585][T26173] loop2: p1 p3 p4 [ 1331.279266][T26173] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1331.287067][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 23:41:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1400, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0xa, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1331.288362][T26171] loop1: p4 size 3657465856 extends beyond EOD, [ 1331.288383][ T148] loop3: p4 size 3657465856 extends beyond EOD, [ 1331.378954][T26171] truncated [ 1331.382392][ T148] truncated [ 1331.388231][T26173] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1331.405916][T26173] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1331.513154][T26173] loop2: p1 p3 p4 [ 1331.517008][T26173] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1331.525823][T26173] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1331.534260][T26173] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1331.553097][T26171] loop1: p1 p3 p4 23:41:51 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050004000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1331.556954][T26171] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1331.565684][T26171] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1331.579308][T26171] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:41:51 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000300000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1331.755229][T26200] loop2: p1 p3 p4 [ 1331.772032][T26200] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1331.785552][T26200] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1331.793690][T26200] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1331.853506][T26203] loop1: p1 p3 p4 [ 1331.857373][T26203] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1331.865288][T26203] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1331.873257][T26203] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1331.931436][T26206] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1331.933464][T26206] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1332.045354][T26200] loop2: p1 p3 p4 [ 1332.049230][T26200] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1332.065243][T26200] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1332.083397][T26200] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1332.094834][ T148] loop2: p1 p3 p4 [ 1332.098909][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1332.107379][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1332.115850][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1332.410392][T26206] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1332.411801][T26206] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:41:52 executing program 3: syz_read_part_table(0x0, 0xc, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xd201, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0xb, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:52 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:41:52 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000400000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:52 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050005000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x10, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x38000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1332.807553][T26219] loop1: p1 p3 p4 [ 1332.826644][T26219] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1332.862209][T26219] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1332.901424][T26219] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:41:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x800300, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1333.053877][T26215] loop2: p1 p3 p4 [ 1333.063476][T26215] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1333.075916][T26215] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1333.084892][T26215] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:41:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x11, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x12, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1333.102966][T26224] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1333.345376][T26235] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1333.346921][T26235] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1333.764141][T26235] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1333.765412][T26235] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1334.021953][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1334.024548][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:41:54 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050006000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:54 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008014a020400000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:54 executing program 3: syz_read_part_table(0x0, 0xd, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x13, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:54 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:41:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x14, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1334.395524][T26250] loop2: p1 p3 p4 [ 1334.399967][T26250] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1334.471912][T26250] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1334.521164][T26257] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:41:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x99, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1334.603861][T26250] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:41:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x300, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1334.644307][T26249] loop1: p1 p3 p4 [ 1334.648296][T26249] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1334.664155][T26249] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1334.675239][T26249] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1334.743076][T26250] loop2: p1 p3 p4 [ 1334.750980][T26250] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1334.759456][T26250] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1334.777784][T26250] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:41:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x500, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x6000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:54 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050007000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1334.807458][T26269] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1334.808818][T26269] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1334.993012][T26280] loop2: p1 p3 p4 [ 1334.997124][T26280] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1335.005180][T26280] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1335.013092][T26280] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:41:55 executing program 3: syz_read_part_table(0x0, 0xe, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:55 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000500000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x600, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:55 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:41:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x900, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1335.114723][T26280] loop2: p1 p3 p4 [ 1335.118614][T26280] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1335.134692][T26280] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1335.147976][T26280] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1335.192881][T26287] loop1: p1 p3 p4 [ 1335.196760][T26287] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1335.205486][T26287] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1335.216801][T26287] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:41:55 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050008000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1335.449477][T26294] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:41:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0xa00, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xa000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1335.575076][T26287] loop1: p1 p3 p4 [ 1335.583087][T26287] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1335.611467][T26287] loop1: p3 size 1912633224 extends beyond EOD, truncated 23:41:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0xb00, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1335.624501][T26306] loop2: p1 p3 p4 [ 1335.628393][T26306] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1335.636718][T26306] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1335.637341][T26287] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1335.653352][T26306] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1335.797892][T26314] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1335.800288][T26314] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1335.908139][T26306] loop2: p1 p3 p4 [ 1335.912009][T26306] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1335.920524][T26306] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1335.928871][T26306] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1335.938728][ T148] loop2: p1 p3 p4 [ 1335.942880][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1335.954122][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1335.963218][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1336.239995][T26314] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1336.241118][T26314] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:41:56 executing program 3: syz_read_part_table(0x0, 0xf, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x1100, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:56 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000600000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:56 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050009000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:56 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:41:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x1200, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x11000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1336.493365][T26325] loop2: p1 p3 p4 [ 1336.497272][T26325] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1336.505282][T26325] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1336.514099][T26325] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1336.767809][T26330] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:41:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x1300, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x12000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1336.891211][T26324] loop1: p1 p3 p4 [ 1336.906488][T26324] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1336.922036][T26324] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1336.924032][T26325] loop2: p1 p3 p4 23:41:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x1400, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x13000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1336.937707][T26324] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1336.947553][T26325] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1336.970468][T26325] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1336.985380][T26325] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1337.023430][T26346] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1337.024738][T26346] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1337.134961][ T148] loop2: p1 p3 p4 [ 1337.139397][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1337.147729][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1337.156054][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1337.443833][T26346] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1337.445234][T26346] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:41:57 executing program 3: syz_read_part_table(0x0, 0x10, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x4000, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:57 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x14000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:57 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000040600000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:57 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105000a000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:57 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 23:41:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x9900, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:57 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x40000000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1337.683274][T26359] loop1: p1 p3 p4 [ 1337.687982][T26359] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1337.696785][T26359] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1337.705578][T26359] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1337.716140][T26357] loop2: p1 p3 p4 [ 1337.720036][T26357] loop2: p1 size 78398975 extends beyond EOD, truncated 23:41:57 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9effffff, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1337.727755][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1337.898968][T26368] fuse: Bad value for 'fd' 23:41:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1338.053753][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1338.062433][T26357] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1338.077980][T26357] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1338.082132][T26367] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:41:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xd2010000, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0x3}]}, 0x34}}, 0x0) [ 1338.112484][T26359] loop1: p1 p3 p4 [ 1338.116661][T26359] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1338.125229][T26359] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1338.133508][T26359] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1338.240311][T26379] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1338.278891][T26357] loop2: p1 p3 p4 [ 1338.283362][T26357] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1338.292347][T26357] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1338.300877][T26357] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1338.430486][T26382] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1338.431349][T26382] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1338.833458][T26382] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1338.834981][T26382] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:41:58 executing program 3: syz_read_part_table(0x0, 0x11, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:58 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000700000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xeaffffff, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0x4}]}, 0x34}}, 0x0) 23:41:58 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105000b000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:41:58 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 23:41:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xa}]}, 0x34}}, 0x0) 23:41:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xefffffff, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1339.083282][T26392] loop2: p1 p3 p4 [ 1339.087185][T26392] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1339.095646][T26395] loop1: p1 p3 p4 [ 1339.100105][T26395] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1339.100913][T26392] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1339.111105][T26395] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1339.147709][T26392] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1339.282041][T26395] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1339.324937][T26401] fuse: Bad value for 'fd' 23:41:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xf0ffffff, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0x26}]}, 0x34}}, 0x0) [ 1339.398592][T26400] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1339.424663][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1339.425539][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:41:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfeffffff, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:41:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1339.562879][T26410] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1339.572907][T26392] loop2: p1 p3 p4 [ 1339.576802][T26392] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1339.585751][T26392] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1339.602074][T26392] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1339.662830][T26395] loop1: p1 p3 p4 [ 1339.666853][T26395] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1339.675390][T26395] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1339.690056][T26395] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1339.796270][T26417] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1339.802653][T26417] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1340.194462][T26417] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1340.195940][T26417] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:00 executing program 3: syz_read_part_table(0x0, 0x12, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:00 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105000c000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xffffff7f, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x2}}]}, 0x34}}, 0x0) 23:42:00 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000800000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:00 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 23:42:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xffffff9e, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x3}}]}, 0x34}}, 0x0) [ 1340.463710][T26427] loop1: p1 p3 p4 [ 1340.467618][T26427] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1340.475935][T26427] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1340.624930][T26427] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1340.646077][T26434] fuse: Bad value for 'fd' [ 1340.692405][T26426] loop2: p1 p3 p4 [ 1340.697042][T26426] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1340.742953][T26433] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1340.772727][T26426] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1340.781055][T26426] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x4}}]}, 0x34}}, 0x0) 23:42:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xffffffea, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xffffffef, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x5}}]}, 0x34}}, 0x0) [ 1340.906104][T26427] loop1: p1 p3 p4 [ 1340.913761][T26426] loop2: p1 p3 p4 [ 1340.924417][T26427] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1340.931575][T26426] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1340.944928][T26427] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1340.953062][T26426] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1340.960611][T26427] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1340.961291][T26426] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1340.993144][T26449] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1340.994121][T26449] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1341.092555][ T148] loop1: p1 p3 p4 [ 1341.096540][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1341.104280][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1341.112543][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1341.306957][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1341.307892][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:01 executing program 3: syz_read_part_table(0x0, 0x18, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x6}}]}, 0x34}}, 0x0) 23:42:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffff0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:01 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105000d000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:01 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000900000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:01 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 23:42:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x8}}]}, 0x34}}, 0x0) 23:42:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffffe, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1341.652680][T26461] loop2: p1 p3 p4 [ 1341.656596][T26461] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1341.670946][T26461] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1341.680062][T26461] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1341.735600][T26462] loop1: p1 p3 p4 [ 1341.740282][T26462] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1341.788943][T26462] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1341.799006][T26462] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x9}}]}, 0x34}}, 0x0) [ 1341.823010][T26465] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1341.829189][T26465] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1341.928760][T26472] fuse: Bad value for 'fd' 23:42:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x2, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xa}}]}, 0x34}}, 0x0) [ 1341.953617][T26473] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1342.062803][T26461] loop2: p1 p3 p4 [ 1342.067532][T26461] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1342.078486][T26461] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1342.087228][T26461] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1342.113874][T26462] loop1: p1 p3 p4 [ 1342.117798][T26462] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1342.125915][T26462] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1342.133833][T26462] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1342.231336][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1342.232614][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:02 executing program 3: syz_read_part_table(0x0, 0x104, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xb}}]}, 0x34}}, 0x0) 23:42:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x3, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:02 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105000e000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:02 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000a00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:02 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 23:42:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x10}}]}, 0x34}}, 0x0) 23:42:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x4, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1342.591977][T26491] loop1: p1 p3 p4 [ 1342.595931][T26491] loop1: p1 size 78398975 extends beyond EOD, truncated 23:42:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x11}}]}, 0x34}}, 0x0) 23:42:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x5, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1342.684026][T26491] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1342.694892][T26491] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1342.773849][T26506] fuse: Bad value for 'fd' 23:42:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x12}}]}, 0x34}}, 0x0) [ 1342.873656][T26490] loop2: p1 p3 p4 [ 1342.877619][T26490] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1342.880027][T26497] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 23:42:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x6, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1342.881359][T26497] loop3: p4 size 3657465856 extends beyond EOD, [ 1342.887652][T26490] loop2: p3 size 1912633224 extends beyond EOD, [ 1342.971621][T26497] truncated [ 1342.980453][T26490] truncated [ 1342.992556][T26490] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1343.000967][T26505] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1343.102691][T26491] loop1: p1 p3 p4 [ 1343.106647][T26491] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1343.114886][T26491] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1343.123336][T26491] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1343.143036][T26490] loop2: p1 p3 p4 [ 1343.147201][T26490] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1343.159008][T26490] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1343.171543][T26490] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1343.389184][T26497] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1343.390259][T26497] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1343.633181][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1343.634123][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x8, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x13}}]}, 0x34}}, 0x0) 23:42:03 executing program 3: syz_read_part_table(0x0, 0x602, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:03 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000b00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:03 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050010000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:03 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 23:42:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x14}}]}, 0x34}}, 0x0) 23:42:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x9, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1343.892423][T26526] loop1: p1 p3 p4 [ 1343.896376][T26526] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1343.904102][T26526] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1343.915520][T26526] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1344.116611][T26532] fuse: Bad value for 'fd' [ 1344.201745][T26531] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0xa, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x99}}]}, 0x34}}, 0x0) [ 1344.302008][T26527] loop2: p1 p3 p4 [ 1344.309285][T26527] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1344.328911][T26527] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1344.337251][T26526] loop1: p1 p3 p4 23:42:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0xb, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x300}}]}, 0x34}}, 0x0) [ 1344.348446][T26526] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1344.356895][T26527] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1344.371902][T26526] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1344.392418][T26526] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x500}}]}, 0x34}}, 0x0) 23:42:04 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050011000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1344.500115][T26545] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1344.502526][T26545] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1344.605517][T26554] loop2: p1 p3 p4 [ 1344.609510][T26554] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1344.617950][T26554] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1344.626358][T26554] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1344.723798][T26554] loop2: p1 p3 p4 [ 1344.727664][T26554] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1344.740036][T26554] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1344.750711][T26554] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:04 executing program 3: syz_read_part_table(0x0, 0x702, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:04 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000c00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x600}}]}, 0x34}}, 0x0) 23:42:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x10, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:04 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',']) 23:42:04 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050012000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x900}}]}, 0x34}}, 0x0) 23:42:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x11, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1344.886424][T26562] loop1: p1 p3 p4 [ 1344.890352][T26562] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1344.900732][T26562] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1344.917256][T26562] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1345.011991][T26570] fuse: Bad value for 'fd' 23:42:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xa00}}]}, 0x34}}, 0x0) 23:42:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x12, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xb00}}]}, 0x34}}, 0x0) 23:42:05 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050014000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1345.302013][T26562] loop1: p1 p3 p4 [ 1345.309180][T26562] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1345.321984][T26562] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1345.343284][T26562] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1345.363755][T26584] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1345.369844][T26584] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1345.472982][T26586] loop2: p1 p3 p4 [ 1345.481045][T26586] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1345.493960][T26586] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1345.502389][T26586] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1345.514132][ T148] loop2: p1 p3 p4 [ 1345.518154][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1345.527012][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1345.535393][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1345.612430][T26586] loop2: p1 p3 p4 [ 1345.616278][T26586] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1345.624468][T26586] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1345.632380][T26586] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1345.642135][ T148] loop2: p1 p3 p4 [ 1345.646291][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1345.654250][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1345.663185][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1345.883275][T26584] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1345.884771][T26584] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:05 executing program 3: syz_read_part_table(0x0, 0xa00, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x13, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x1100}}]}, 0x34}}, 0x0) 23:42:05 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000d00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:05 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050016000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:05 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81b53df892", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',']) 23:42:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x14, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x1200}}]}, 0x34}}, 0x0) [ 1346.177912][T26599] loop2: p1 < > p3 p4 [ 1346.224255][T26599] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:42:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x1d2, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1346.270946][T26599] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1346.345419][T26609] fuse: Bad value for 'fd' [ 1346.361968][T26598] loop1: p1 p3 p4 [ 1346.385135][T26598] loop1: p1 size 78398975 extends beyond EOD, truncated 23:42:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x300, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x1300}}]}, 0x34}}, 0x0) [ 1346.454605][T26598] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1346.475010][T26598] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x1400}}]}, 0x34}}, 0x0) [ 1346.549110][T26599] loop2: p1 < > p3 p4 [ 1346.556805][T26599] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1346.567899][T26599] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1346.592584][T26598] loop1: p1 p3 p4 [ 1346.596429][T26598] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1346.604441][T26598] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1346.612270][T26598] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1346.624695][T26601] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1346.626301][T26601] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1346.813702][ T148] loop1: p1 p3 p4 [ 1346.817519][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1346.827064][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1346.835470][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:06 executing program 3: syz_read_part_table(0x0, 0x2602, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x500, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x4000}}]}, 0x34}}, 0x0) 23:42:06 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050025000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:06 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000e00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:06 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81b53df892", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',']) 23:42:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x600, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x9900}}]}, 0x34}}, 0x0) [ 1347.081958][T26632] loop2: p1 p3 p4 [ 1347.089058][T26632] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1347.097283][T26632] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1347.105399][T26632] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1347.127979][T26634] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 23:42:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x38000}}]}, 0x34}}, 0x0) [ 1347.133367][T26634] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x800300}}]}, 0x34}}, 0x0) [ 1347.311990][T26630] loop1: p1 p3 p4 [ 1347.315918][T26630] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1347.323920][T26630] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1347.331932][T26641] fuse: Bad value for 'fd' [ 1347.335769][T26630] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x900, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0xa00, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1347.432120][T26632] loop2: p1 p3 p4 [ 1347.436070][T26632] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1347.445021][T26632] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1347.454228][T26632] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1347.474121][ T148] loop2: p1 p3 p4 [ 1347.478235][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1347.487603][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1347.495662][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1347.503179][T26630] loop1: p1 p3 p4 [ 1347.507183][T26630] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1347.521548][T26630] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1347.535338][T26630] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:07 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050048000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x1000000}}]}, 0x34}}, 0x0) 23:42:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0xb00, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:07 executing program 3: syz_read_part_table(0x0, 0x2702, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:07 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000001000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1347.701967][T26660] loop1: p1 p3 p4 [ 1347.705942][T26660] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1347.714762][T26660] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1347.723884][T26660] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1347.738699][T26661] loop2: p1 p3 p4 [ 1347.747549][T26661] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1347.756307][T26661] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1347.764394][T26661] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1347.825977][T26667] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1347.827460][T26667] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:07 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 23:42:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x1100, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x2000000}}]}, 0x34}}, 0x0) 23:42:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x1200, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x3000000}}]}, 0x34}}, 0x0) [ 1347.937275][T26660] loop1: p1 p3 p4 [ 1347.944436][T26660] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1347.951976][T26660] loop1: p1 could not be added: 12 [ 1347.957334][T26660] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1347.966470][T26660] loop1: p3 could not be added: 12 [ 1347.972145][T26660] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x1300, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:07 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000001100000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1348.083146][T26661] loop2: p1 p3 p4 [ 1348.087021][T26661] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1348.095100][T26661] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1348.103069][T26661] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1348.310894][T26687] fuse: Bad value for 'fd' [ 1348.323677][T26684] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:08 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105004c000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x4000000}}]}, 0x34}}, 0x0) 23:42:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x1400, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1348.453789][T26688] loop1: p1 p3 p4 [ 1348.457852][T26688] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1348.466690][T26688] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1348.487347][T26688] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x4000, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:08 executing program 3: syz_read_part_table(0x0, 0x2802, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1348.582036][T26695] loop2: p1 p3 p4 [ 1348.585905][T26695] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1348.594105][T26695] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1348.602110][T26695] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1348.633289][T26688] loop1: p1 p3 p4 [ 1348.641408][T26688] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1348.649644][T26688] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1348.663124][T26688] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1348.733926][T26701] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1348.737837][T26701] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1348.851994][T26695] loop2: p1 p3 p4 [ 1348.855917][T26695] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1348.869185][T26695] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1348.877546][T26695] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:08 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 23:42:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x5000000}}]}, 0x34}}, 0x0) 23:42:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0xd201, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:08 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000001200000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:08 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105005a000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x6000000}}]}, 0x34}}, 0x0) 23:42:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1349.001776][T26709] loop1: p1 p3 p4 [ 1349.005673][T26709] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1349.013519][T26709] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1349.021184][T26709] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1349.231531][T26718] fuse: Bad value for 'fd' 23:42:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0x3}]}, 0x34}}, 0x0) 23:42:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x8000000}}]}, 0x34}}, 0x0) 23:42:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x9000000}}]}, 0x34}}, 0x0) [ 1349.352863][T26715] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1349.405587][ T148] loop2: p1 p3 p4 [ 1349.409742][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1349.419407][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1349.428168][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1349.432531][T26709] loop1: p1 p3 p4 [ 1349.439152][T26709] loop1: p1 size 78398975 extends beyond EOD, truncated 23:42:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0x4}]}, 0x34}}, 0x0) [ 1349.447415][T26729] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1349.451147][T26709] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1349.471769][T26709] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1349.473398][T26720] loop2: p1 p3 p4 [ 1349.485056][T26720] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1349.494962][T26720] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:42:09 executing program 3: syz_read_part_table(0x0, 0x2902, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1349.504471][T26720] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1349.684038][T26734] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1349.686820][T26734] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:09 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 23:42:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xa000000}}]}, 0x34}}, 0x0) 23:42:09 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000001c00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xa}]}, 0x34}}, 0x0) [ 1349.831294][T26720] loop2: p1 p3 p4 [ 1349.836401][T26720] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1349.865733][T26720] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1349.893951][T26720] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1349.943170][T26742] loop1: p1 p3 p4 [ 1349.947072][T26742] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1349.955564][T26742] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1350.087824][T26742] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1350.123303][T26748] fuse: Bad value for 'fd' 23:42:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xb000000}}]}, 0x34}}, 0x0) 23:42:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0x26}]}, 0x34}}, 0x0) 23:42:10 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050060000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1350.153583][T26747] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x10000000}}]}, 0x34}}, 0x0) 23:42:10 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050068000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1350.232214][T26752] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 23:42:10 executing program 3: syz_read_part_table(0x0, 0x2c00, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x2}}]}, 0x34}}, 0x0) [ 1350.331577][T26742] loop1: p1 p3 p4 [ 1350.335437][T26742] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1350.343450][T26742] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1350.351095][T26742] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1350.513502][T26766] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1350.515004][T26766] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:10 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x3}}]}, 0x34}}, 0x0) 23:42:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x11000000}}]}, 0x34}}, 0x0) 23:42:10 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105006c000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:10 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000001f00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x12000000}}]}, 0x34}}, 0x0) 23:42:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x4}}]}, 0x34}}, 0x0) [ 1350.801735][T26775] loop1: p1 p3 p4 [ 1350.805801][T26775] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1350.819724][T26775] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1350.835693][T26775] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x5}}]}, 0x34}}, 0x0) [ 1351.041800][T26783] fuse: Bad value for 'fd' [ 1351.052837][T26774] loop2: p1[EZD] p3 p4 [ 1351.052951][T26784] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x13000000}}]}, 0x34}}, 0x0) [ 1351.059457][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1351.060248][T26774] loop2: p1 size 78398975 extends beyond EOD, [ 1351.082672][ T148] loop3: p4 size 3657465856 extends beyond EOD, [ 1351.152726][T26774] truncated [ 1351.164307][ T148] truncated [ 1351.170138][T26774] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1351.180330][T26774] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x6}}]}, 0x34}}, 0x0) [ 1351.291691][T26775] loop1: p1 p3 p4 [ 1351.299484][T26775] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1351.316306][T26775] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1351.325264][T26775] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1351.336600][T26774] loop2: p1[EZD] p3 p4 [ 1351.340942][T26774] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1351.349139][T26774] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1351.356978][T26774] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:11 executing program 3: syz_read_part_table(0x0, 0x2c02, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x14000000}}]}, 0x34}}, 0x0) [ 1351.572971][T26802] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 23:42:11 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:11 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000002600000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x8}}]}, 0x34}}, 0x0) 23:42:11 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050074000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x40000000}}]}, 0x34}}, 0x0) 23:42:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x9}}]}, 0x34}}, 0x0) 23:42:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x99000000}}]}, 0x34}}, 0x0) [ 1351.574398][T26802] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1351.721786][T26808] loop1: p1 p3 p4 [ 1351.725770][T26808] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1351.734161][T26808] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1351.742598][T26808] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x9effffff}}]}, 0x34}}, 0x0) 23:42:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xa}}]}, 0x34}}, 0x0) [ 1351.781580][T26812] loop2: p1 p3 p4 [ 1351.785506][T26812] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1351.804527][T26812] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1351.823121][T26812] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1352.016816][T26808] loop1: p1 p3 p4 [ 1352.023420][T26828] fuse: Bad value for 'fd' [ 1352.032344][T26808] loop1: p1 size 78398975 extends beyond EOD, truncated 23:42:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xeaffffff}}]}, 0x34}}, 0x0) [ 1352.107471][T26808] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1352.119735][T26827] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1352.122968][T26808] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1352.231531][T26812] loop2: p1 p3 p4 [ 1352.235486][T26812] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1352.244495][T26812] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1352.253541][T26812] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:12 executing program 3: syz_read_part_table(0x0, 0x2d02, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xb}}]}, 0x34}}, 0x0) [ 1352.443148][T26836] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1352.444985][T26836] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:12 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81b53df892", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xefffffff}}]}, 0x34}}, 0x0) 23:42:12 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000053000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:12 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105007a000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x10}}]}, 0x34}}, 0x0) 23:42:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x11}}]}, 0x34}}, 0x0) 23:42:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xf0ffffff}}]}, 0x34}}, 0x0) [ 1352.691347][T26844] loop2: p1 p3 p4 [ 1352.695187][T26844] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1352.703133][T26844] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1352.710710][T26844] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1352.734853][T26842] loop1: p1 p3 p4 [ 1352.767478][T26842] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1352.903986][T26855] fuse: Bad value for 'fd' 23:42:12 executing program 3: syz_read_part_table(0x0, 0x2e02, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x12}}]}, 0x34}}, 0x0) 23:42:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xfeffffff}}]}, 0x34}}, 0x0) [ 1352.982734][T26842] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1353.010392][T26851] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1353.021111][T26842] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xffffff7f}}]}, 0x34}}, 0x0) 23:42:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x13}}]}, 0x34}}, 0x0) [ 1353.157711][T26844] loop2: p1 p3 p4 [ 1353.165524][T26844] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1353.184712][T26844] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1353.212961][T26842] loop1: p1 p3 p4 [ 1353.217221][T26842] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1353.231993][T26844] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1353.242660][T26842] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1353.262275][T26842] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:13 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xffffff9e}}]}, 0x34}}, 0x0) 23:42:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x14}}]}, 0x34}}, 0x0) 23:42:13 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050090000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:13 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000003f00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1353.405801][T26869] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1353.406834][T26869] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x1d2}}]}, 0x34}}, 0x0) 23:42:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xffffffea}}]}, 0x34}}, 0x0) [ 1353.591326][T26876] loop2: p1 p3 p4 [ 1353.595280][T26876] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1353.610088][T26876] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1353.618817][T26876] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1353.791501][T26889] fuse: Bad value for 'fd' [ 1353.800151][T26879] loop1: p1 p3 p4 [ 1353.812334][T26879] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1353.886128][T26888] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1353.898293][T26879] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1353.906209][T26879] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1354.042029][T26879] loop1: p1 p3 p4 [ 1354.045997][T26879] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1354.054729][T26879] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1354.064464][T26879] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1354.072560][T26876] loop2: p1 p3 p4 [ 1354.076618][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1354.076628][T26876] loop2: p1 size 78398975 extends beyond EOD, [ 1354.077752][ T148] loop3: p4 size 3657465856 extends beyond EOD, [ 1354.169421][T26876] truncated [ 1354.174617][ T148] truncated [ 1354.183184][T26876] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1354.191781][T26876] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:14 executing program 3: syz_read_part_table(0x0, 0x2f02, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xffffffef}}]}, 0x34}}, 0x0) 23:42:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x300}}]}, 0x34}}, 0x0) 23:42:14 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000004000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:14 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500a5000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:14 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x500}}]}, 0x34}}, 0x0) 23:42:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xfffffff0}}]}, 0x34}}, 0x0) [ 1354.532891][T26901] loop1: p1 p3 p4 [ 1354.541658][T26901] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1354.549548][T26901] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1354.557921][T26901] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x600}}]}, 0x34}}, 0x0) [ 1354.721385][T26902] loop2: p1 p3 p4 [ 1354.733281][T26915] fuse: Bad value for 'fd' [ 1354.755248][T26902] loop2: p1 size 78398975 extends beyond EOD, truncated 23:42:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xfffffffe}}]}, 0x34}}, 0x0) [ 1354.820242][T26902] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1354.828349][T26913] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:42:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x900}}]}, 0x34}}, 0x0) [ 1354.848209][T26906] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1354.849353][T26906] loop3: p4 size 3657465856 extends beyond EOD, [ 1354.922370][T26902] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1354.957260][T26906] truncated [ 1354.991374][T26901] loop1: p1 p3 p4 [ 1354.995258][T26901] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1355.003200][T26901] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1355.012091][T26901] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1355.044300][ T148] loop1: p1 p3 p4 [ 1355.050583][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1355.061463][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1355.079598][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1355.081608][T26902] loop2: p1 p3 p4 [ 1355.096550][T26902] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1355.112415][T26902] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1355.121240][T26902] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1355.402470][T26906] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1355.403865][T26906] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1355.651551][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1355.652467][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:15 executing program 3: syz_read_part_table(0x0, 0x3602, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xa00}}]}, 0x34}}, 0x0) 23:42:15 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080008004000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x2}}]}, 0x34}}, 0x0) 23:42:15 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105002a010a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:15 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xb00}}]}, 0x34}}, 0x0) 23:42:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x3}}]}, 0x34}}, 0x0) 23:42:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x1100}}]}, 0x34}}, 0x0) [ 1355.926458][T26935] loop1: p1 p3 p4 [ 1356.112272][T26935] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1356.184497][T26935] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1356.227543][T26946] fuse: Bad value for 'fd' [ 1356.234024][T26937] loop2: p1 p3 p4 [ 1356.236745][T26935] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1356.238005][T26937] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1356.252458][T26944] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x4}}]}, 0x34}}, 0x0) 23:42:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x1200}}]}, 0x34}}, 0x0) [ 1356.283291][T26937] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1356.303103][T26937] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x1300}}]}, 0x34}}, 0x0) [ 1356.354569][T26935] loop1: p1 p3 p4 [ 1356.360947][T26935] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1356.368087][ T148] loop2: p1 p3 p4 [ 1356.372109][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1356.379404][T26935] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1356.380141][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1356.394395][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1356.402507][T26953] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1356.403721][T26953] loop3: p4 size 3657465856 extends beyond EOD, [ 1356.404863][T26935] loop1: p4 size 3657465856 extends beyond EOD, [ 1356.491665][T26953] truncated [ 1356.497500][T26935] truncated [ 1356.719560][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1356.720612][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:16 executing program 3: syz_read_part_table(0x0, 0x3702, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x5}}]}, 0x34}}, 0x0) 23:42:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x1400}}]}, 0x34}}, 0x0) 23:42:16 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500a5010a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:16 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800f0ff7f00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:16 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81b53df892", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x4000}}]}, 0x34}}, 0x0) 23:42:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x6}}]}, 0x34}}, 0x0) [ 1357.061266][T26969] loop1: p1 p3 p4 [ 1357.065138][T26969] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1357.081099][T26969] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1357.168157][T26969] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x8}}]}, 0x34}}, 0x0) 23:42:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xd201}}]}, 0x34}}, 0x0) [ 1357.251726][T26981] fuse: Bad value for 'fd' [ 1357.271080][T26972] loop2: p1 p3 p4 [ 1357.275607][T26972] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1357.293309][T26972] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1357.307939][T26972] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1357.333672][T26980] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x38000}}]}, 0x34}}, 0x0) [ 1357.482769][T26973] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1357.484289][T26973] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x800300}}]}, 0x34}}, 0x0) [ 1357.653835][T26969] loop1: p1 p3 p4 [ 1357.657721][T26969] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1357.672019][T26969] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1357.679766][T26969] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1357.686039][T26972] loop2: p1 p3 p4 [ 1357.699649][T26972] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1357.708394][T26972] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1357.718476][T26972] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1357.814374][ T148] loop2: p1 p3 p4 [ 1357.818370][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1357.826285][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1357.834184][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:17 executing program 3: syz_read_part_table(0x0, 0x3802, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x1000000}}]}, 0x34}}, 0x0) 23:42:17 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000048000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x9}}]}, 0x34}}, 0x0) 23:42:17 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500b4010a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:17 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x2000000}}]}, 0x34}}, 0x0) 23:42:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xa}}]}, 0x34}}, 0x0) [ 1358.011633][T27000] loop2: p1 p3 p4 [ 1358.015584][T27000] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1358.026187][T27000] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1358.056057][T27000] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1358.093743][T27001] loop1: p1 p3 p4 [ 1358.098347][T27001] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1358.133299][T27001] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1358.148882][T27001] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1358.200387][T27018] fuse: Bad value for 'fd' 23:42:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xb}}]}, 0x34}}, 0x0) 23:42:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x3000000}}]}, 0x34}}, 0x0) [ 1358.235805][T27014] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x4000000}}]}, 0x34}}, 0x0) [ 1358.336163][T27007] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1358.337167][T27007] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x10}}]}, 0x34}}, 0x0) [ 1358.531874][T27000] loop2: p1 p3 p4 [ 1358.535853][T27000] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1358.544747][T27000] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1358.553477][T27000] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1358.581585][T27001] loop1: p1 p3 p4 [ 1358.587829][T27001] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1358.596655][T27001] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1358.605616][T27001] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1358.741683][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1358.742623][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x11}}]}, 0x34}}, 0x0) 23:42:18 executing program 3: syz_read_part_table(0x0, 0x3902, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:18 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050004020a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x5000000}}]}, 0x34}}, 0x0) 23:42:18 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008fffffdef00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:18 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x6000000}}]}, 0x34}}, 0x0) 23:42:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x12}}]}, 0x34}}, 0x0) 23:42:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x8000000}}]}, 0x34}}, 0x0) [ 1359.021596][T27039] loop1: p1 p3 p4 [ 1359.025497][T27039] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1359.100888][T27039] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1359.145943][T27039] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1359.197353][T27038] loop2: p1 p3 p4 [ 1359.203186][T27047] fuse: Bad value for 'fd' [ 1359.217763][T27038] loop2: p1 size 78398975 extends beyond EOD, truncated 23:42:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x13}}]}, 0x34}}, 0x0) 23:42:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x9000000}}]}, 0x34}}, 0x0) [ 1359.289816][T27038] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1359.298279][T27046] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1359.306982][T27038] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xa000000}}]}, 0x34}}, 0x0) 23:42:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x14}}]}, 0x34}}, 0x0) [ 1359.431082][T27039] loop1: p1 p3 p4 [ 1359.435017][T27039] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1359.443169][T27039] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1359.451131][T27039] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1359.477712][T27038] loop2: p1 p3 p4 [ 1359.481630][T27038] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1359.489239][T27038] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1359.497886][T27038] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1359.532043][T27058] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1359.540860][T27058] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:19 executing program 3: syz_read_part_table(0x0, 0x3c01, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xb000000}}]}, 0x34}}, 0x0) 23:42:19 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008fffffff600000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x99}}]}, 0x34}}, 0x0) 23:42:19 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000030a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:19 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x300}}]}, 0x34}}, 0x0) 23:42:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x10000000}}]}, 0x34}}, 0x0) [ 1359.963647][T27073] loop2: p1 p3 p4 [ 1359.967587][T27073] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1360.081366][T27073] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:42:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x500}}]}, 0x34}}, 0x0) [ 1360.123487][T27073] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1360.134763][T27086] fuse: Bad value for 'fd' [ 1360.200370][T27076] loop1: p1 p3 p4 [ 1360.204889][T27076] loop1: p1 size 78398975 extends beyond EOD, truncated 23:42:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x11000000}}]}, 0x34}}, 0x0) 23:42:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x600}}]}, 0x34}}, 0x0) [ 1360.244754][T27076] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1360.253472][T27076] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x12000000}}]}, 0x34}}, 0x0) [ 1360.265079][T27078] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1360.266556][T27078] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1360.407499][T27073] loop2: p1 p3 p4 [ 1360.411862][T27073] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1360.419742][T27073] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1360.438215][T27073] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1360.460882][T27076] loop1: p1 p3 p4 [ 1360.464713][T27076] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1360.474587][T27076] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1360.483309][T27076] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1360.782379][T27078] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1360.784033][T27078] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:20 executing program 3: syz_read_part_table(0x0, 0x3d01, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x900}}]}, 0x34}}, 0x0) 23:42:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x13000000}}]}, 0x34}}, 0x0) 23:42:20 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500a0030a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:20 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008fffffdfc00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:20 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x14000000}}]}, 0x34}}, 0x0) 23:42:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xa00}}]}, 0x34}}, 0x0) 23:42:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xb00}}]}, 0x34}}, 0x0) 23:42:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x40000000}}]}, 0x34}}, 0x0) [ 1361.080937][T27106] loop2: p1 p3 p4 [ 1361.084858][T27106] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1361.117722][T27106] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1361.176887][T27106] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1361.268172][T27118] fuse: Bad value for 'fd' [ 1361.371391][T27109] loop1: p1 p3 p4 [ 1361.375299][T27109] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1361.386190][T27109] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1361.394262][T27109] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1361.411753][T27117] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x1100}}]}, 0x34}}, 0x0) 23:42:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x9effffff}}]}, 0x34}}, 0x0) [ 1361.512515][T27106] loop2: p1 p3 p4 [ 1361.517348][T27106] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1361.533218][T27106] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1361.542112][T27106] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1361.561661][T27125] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1361.564546][T27125] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1361.889387][T13567] print_req_error: 10 callbacks suppressed [ 1361.889400][T13567] blk_update_request: I/O error, dev loop3, sector 233 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1361.915051][T13569] blk_update_request: I/O error, dev loop3, sector 33920 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1361.923203][T12972] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1361.929786][T27125] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1361.946489][ T95] blk_update_request: I/O error, dev loop3, sector 33920 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1361.960763][ T95] buffer_io_error: 5 callbacks suppressed [ 1361.960772][ T95] Buffer I/O error on dev loop3p4, logical block 33920, async page read [ 1361.974962][ T95] blk_update_request: I/O error, dev loop3, sector 233 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1361.986013][ T95] Buffer I/O error on dev loop3p3, logical block 1, async page read [ 1361.994063][ T95] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1362.004970][ T95] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1362.012996][ T95] blk_update_request: I/O error, dev loop3, sector 33921 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1362.024821][ T95] Buffer I/O error on dev loop3p4, logical block 33921, async page read [ 1362.033204][ T95] blk_update_request: I/O error, dev loop3, sector 33922 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1362.044508][ T95] Buffer I/O error on dev loop3p4, logical block 33922, async page read [ 1362.052878][ T95] blk_update_request: I/O error, dev loop3, sector 33923 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1362.064191][ T95] Buffer I/O error on dev loop3p4, logical block 33923, async page read [ 1362.072575][ T95] blk_update_request: I/O error, dev loop3, sector 33924 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 23:42:22 executing program 3: syz_read_part_table(0x0, 0x4000, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xd2010000}}]}, 0x34}}, 0x0) 23:42:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x1200}}]}, 0x34}}, 0x0) 23:42:22 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008fffffdfd00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:22 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500a4030a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:22 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x1300}}]}, 0x34}}, 0x0) 23:42:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xeaffffff}}]}, 0x34}}, 0x0) [ 1362.083792][ T95] Buffer I/O error on dev loop3p4, logical block 33924, async page read [ 1362.092157][ T95] Buffer I/O error on dev loop3p4, logical block 33925, async page read [ 1362.100512][ T95] Buffer I/O error on dev loop3p4, logical block 33926, async page read [ 1362.108856][ T95] Buffer I/O error on dev loop3p4, logical block 33927, async page read [ 1362.171314][T27137] loop2: p1 p3 p4 [ 1362.175313][T27137] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1362.190065][T27137] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:42:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x1400}}]}, 0x34}}, 0x0) [ 1362.308763][T27138] loop1: p1 p3 p4 [ 1362.326977][T27138] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1362.365404][T27152] fuse: Bad value for 'fd' [ 1362.397624][T27150] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xefffffff}}]}, 0x34}}, 0x0) 23:42:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x4000}}]}, 0x34}}, 0x0) [ 1362.442499][T27138] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1362.453110][T27137] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1362.465439][T27138] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xf0ffffff}}]}, 0x34}}, 0x0) [ 1362.601468][T27137] loop2: p1 p3 p4 [ 1362.605539][T27137] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1362.622432][T27137] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1362.631951][T27137] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1362.685314][T27144] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1362.686927][T27144] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1362.953045][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1362.954006][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:23 executing program 3: syz_read_part_table(0x0, 0x4001, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x9900}}]}, 0x34}}, 0x0) 23:42:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xfeffffff}}]}, 0x34}}, 0x0) 23:42:23 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008fffffffe00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:23 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500ac030a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:23 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xffffff7f}}]}, 0x34}}, 0x0) 23:42:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x38000}}]}, 0x34}}, 0x0) [ 1363.310647][T27171] loop1: p1 p3 p4 [ 1363.314549][T27171] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1363.322670][T27171] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1363.330814][T27171] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1363.499865][T27186] fuse: Bad value for 'fd' 23:42:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xffffff9e}}]}, 0x34}}, 0x0) 23:42:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x800300}}]}, 0x34}}, 0x0) [ 1363.549711][T27178] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1363.550826][T27173] loop2: p1 p3 p4 [ 1363.599483][T27178] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x1000000}}]}, 0x34}}, 0x0) [ 1363.659914][T27173] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1363.682443][T27173] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:42:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xffffffea}}]}, 0x34}}, 0x0) [ 1363.708430][T27173] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1363.720453][ T148] loop1: p1 p3 p4 [ 1363.724274][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1363.745024][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1363.754503][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1363.779634][T27171] loop1: p1 p3 p4 [ 1363.783521][T27171] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1363.798767][T27171] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1363.806622][T27171] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1363.930928][T27173] loop2: p1 p3 p4 [ 1363.934901][T27173] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1363.942901][T27173] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1363.951204][T27173] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1363.960206][ T148] loop2: p1 p3 p4 [ 1363.964023][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1363.973163][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1363.981342][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1364.115811][T27178] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1364.127319][T27178] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:24 executing program 3: syz_read_part_table(0x0, 0x4002, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:24 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008effdffff00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x2000000}}]}, 0x34}}, 0x0) 23:42:24 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500c6030a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xffffffef}}]}, 0x34}}, 0x0) 23:42:24 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x3000000}}]}, 0x34}}, 0x0) 23:42:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xfffffff0}}]}, 0x34}}, 0x0) [ 1364.461451][T27205] loop1: p1 p3 p4 [ 1364.468684][T27205] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1364.477402][T27205] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1364.483152][T27206] loop2: p1 p3 p4 [ 1364.511098][T27206] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1364.586456][T27215] fuse: Bad value for 'fd' 23:42:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x4000000}}]}, 0x34}}, 0x0) [ 1364.716689][T27205] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1364.720080][T27206] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1364.744962][T27206] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0xfffffffe}}]}, 0x34}}, 0x0) 23:42:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x5000000}}]}, 0x34}}, 0x0) [ 1364.753675][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1364.754950][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1364.932855][T27205] loop1: p1 p3 p4 [ 1364.941351][T27205] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1364.954460][T27205] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1364.960688][T27206] loop2: p1 p3 p4 [ 1364.965448][T27206] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1364.976481][T27205] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1364.982686][T27206] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1365.001681][T27206] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1365.311500][T27230] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1365.312537][T27230] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1365.593384][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1365.594297][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:25 executing program 3: syz_read_part_table(0x0, 0x4003, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x2}}]}, 0x34}}, 0x0) 23:42:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x6000000}}]}, 0x34}}, 0x0) 23:42:25 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008fcfdffff00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:25 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050002040a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:25 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x8000000}}]}, 0x34}}, 0x0) 23:42:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x3}}]}, 0x34}}, 0x0) [ 1366.141297][T27247] fuse: Bad value for 'fd' [ 1366.181461][T27242] loop2: p1 p3 p4 [ 1366.185445][T27242] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1366.193698][T27242] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1366.201583][T27242] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1366.211269][T27246] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1366.220581][T27241] loop1: p1 p3 p4 23:42:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x9000000}}]}, 0x34}}, 0x0) 23:42:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x4}}]}, 0x34}}, 0x0) [ 1366.225054][T27241] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1366.232926][T27241] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1366.241041][T27241] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x5}}]}, 0x34}}, 0x0) 23:42:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xa000000}}]}, 0x34}}, 0x0) [ 1366.321368][T27244] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1366.322455][T27244] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1366.480609][T27241] loop1: p1 p3 p4 [ 1366.484676][T27241] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1366.493243][T27241] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1366.501631][T27241] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1366.510345][T27242] loop2: p1 p3 p4 [ 1366.514216][T27242] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1366.533824][T27242] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1366.550743][T27242] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:26 executing program 3: syz_read_part_table(0x0, 0x4e01, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x6}}]}, 0x34}}, 0x0) 23:42:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xb000000}}]}, 0x34}}, 0x0) 23:42:26 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008fdfdffff00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:26 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050006040a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:26 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x8}}]}, 0x34}}, 0x0) 23:42:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x10000000}}]}, 0x34}}, 0x0) [ 1366.955130][T27273] loop2: p1 p3 p4 [ 1366.980976][T27272] loop1: p1 p3 p4 [ 1366.987649][T27272] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1367.004154][T27273] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1367.057171][T27272] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1367.070850][T27273] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1367.099840][T27283] fuse: Bad value for 'fd' [ 1367.116905][T27272] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x11000000}}]}, 0x34}}, 0x0) [ 1367.161991][T27273] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1367.203950][T27279] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1367.209020][T27279] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x9}}]}, 0x34}}, 0x0) 23:42:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x12000000}}]}, 0x34}}, 0x0) [ 1367.305160][T27281] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xa}}]}, 0x34}}, 0x0) [ 1367.448830][T27272] loop1: p1 p3 p4 [ 1367.457398][T27272] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1367.470256][T27272] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1367.490540][T27273] loop2: p1 p3 p4 [ 1367.494446][T27273] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1367.502119][T27272] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1367.511916][T27273] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1367.520817][T27273] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1367.712500][T27279] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1367.715449][T27279] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:27 executing program 3: syz_read_part_table(0x0, 0x4f00, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x13000000}}]}, 0x34}}, 0x0) 23:42:27 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000050a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xb}}]}, 0x34}}, 0x0) 23:42:27 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008f6ffffff00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:27 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81b53df892", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x14000000}}]}, 0x34}}, 0x0) 23:42:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x10}}]}, 0x34}}, 0x0) 23:42:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x40000000}}]}, 0x34}}, 0x0) [ 1368.040420][T27307] loop1: p1 p3 p4 [ 1368.044777][T27307] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1368.212899][T27316] fuse: Bad value for 'fd' [ 1368.252350][T27307] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1368.263095][T27305] loop2: p1 < > p3 p4 [ 1368.266327][T27315] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1368.275468][T27305] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1368.282242][T27307] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1368.291363][T27305] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x99000000}}]}, 0x34}}, 0x0) 23:42:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x11}}]}, 0x34}}, 0x0) 23:42:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x12}}]}, 0x34}}, 0x0) [ 1368.454462][T27307] loop1: p1 p3 p4 [ 1368.458458][T27307] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1368.466268][T27307] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1368.474083][T27307] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1368.504377][T27305] loop2: p1 < > p3 p4 [ 1368.510597][T27305] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1368.518548][T27305] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1368.561711][ T148] loop1: p1 p3 p4 [ 1368.565624][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1368.574312][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1368.582728][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1368.592156][T27329] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1368.595199][T27329] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1368.909692][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1368.915015][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:29 executing program 3: syz_read_part_table(0x0, 0x4f01, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x13}}]}, 0x34}}, 0x0) 23:42:29 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x9effffff}}]}, 0x34}}, 0x0) 23:42:29 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008feffffff00000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:29 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000060a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xeaffffff}}]}, 0x34}}, 0x0) 23:42:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x14}}]}, 0x34}}, 0x0) [ 1369.330816][T27338] loop2: p1 p3 p4 [ 1369.335247][T27338] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1369.359240][T27338] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1369.582603][T27347] fuse: Bad value for 'fd' [ 1369.692863][T27338] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1369.703817][T27342] loop1: p1 p3 p4 [ 1369.709283][T27342] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1369.719977][T27348] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x1d2}}]}, 0x34}}, 0x0) 23:42:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xefffffff}}]}, 0x34}}, 0x0) [ 1369.738497][T27342] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1369.765855][T27342] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x300}}]}, 0x34}}, 0x0) 23:42:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xf0ffffff}}]}, 0x34}}, 0x0) [ 1369.825866][ T148] loop1: p1 p3 p4 [ 1369.829662][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1369.841980][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1369.853348][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:29 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050004060a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1369.873692][T27355] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1369.875157][T27355] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1370.041278][T27365] loop2: p1 < > p3 p4 [ 1370.047544][T27365] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1370.057085][T27365] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1370.067033][ T148] loop2: p1 < > p3 p4 [ 1370.072106][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1370.080654][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1370.160343][T27365] loop2: p1 < > p3 p4 [ 1370.165709][T27365] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1370.174766][T27365] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1370.184721][ T148] loop2: p1 < > p3 p4 [ 1370.189497][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1370.197557][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1370.401428][T27355] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1370.402892][T27355] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xfeffffff}}]}, 0x34}}, 0x0) 23:42:30 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000000000003400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x500}}]}, 0x34}}, 0x0) 23:42:30 executing program 3: syz_read_part_table(0x0, 0x5001, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:30 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000070a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:30 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81b53df892", @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xffffff7f}}]}, 0x34}}, 0x0) 23:42:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x600}}]}, 0x34}}, 0x0) 23:42:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xffffff9e}}]}, 0x34}}, 0x0) [ 1370.771470][T27375] loop2: p1 p3 p4 [ 1370.775887][T27375] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1370.870432][T27386] fuse: Bad value for 'fd' [ 1370.890475][T27375] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1370.910062][T27385] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xffffffea}}]}, 0x34}}, 0x0) [ 1370.981947][T27375] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x900}}]}, 0x34}}, 0x0) [ 1371.026263][T27379] loop1: p1 p3 p4 [ 1371.036593][T27379] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1371.057656][T27379] loop1: p3 size 1912633224 extends beyond EOD, truncated 23:42:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xffffffef}}]}, 0x34}}, 0x0) [ 1371.080285][T27379] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1371.101327][T27375] loop2: p1 p3 p4 [ 1371.105699][T27375] loop2: p1 size 78398975 extends beyond EOD, truncated 23:42:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xa00}}]}, 0x34}}, 0x0) [ 1371.131369][T27375] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1371.141663][T27375] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1371.170121][T27379] loop1: p1 p3 p4 [ 1371.174749][T27379] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1371.184572][T27379] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1371.194043][T27379] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:31 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000000000004400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xfffffff0}}]}, 0x34}}, 0x0) [ 1371.362315][T27400] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1371.365526][T27400] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1371.510293][T27408] loop1: p1 p3 p4 [ 1371.514163][T27408] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1371.522793][T27408] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1371.531546][T27408] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:31 executing program 3: syz_read_part_table(0x0, 0x5002, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:31 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000090a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xb00}}]}, 0x34}}, 0x0) 23:42:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xfffffffe}}]}, 0x34}}, 0x0) 23:42:31 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1371.655641][T27408] loop1: p1 p3 p4 [ 1371.659591][T27408] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1371.667796][T27408] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1371.679137][T27408] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1371.692884][ T148] loop1: p1 p3 p4 [ 1371.696913][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated 23:42:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0xf}}, 0x0) 23:42:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x1100}}]}, 0x34}}, 0x0) [ 1371.712723][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1371.729988][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:31 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000000000006400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1371.777602][T27417] loop2: p1 p3 p4 23:42:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x10}}, 0x0) [ 1371.888848][T27417] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1371.948500][T27424] fuse: Bad value for 'fd' 23:42:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x28}}, 0x0) 23:42:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x1200}}]}, 0x34}}, 0x0) [ 1372.017888][T27417] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1372.037773][T27423] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1372.051742][T27417] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x1300}}]}, 0x34}}, 0x0) [ 1372.226995][T27417] loop2: p1 p3 p4 [ 1372.231493][T27417] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1372.239368][T27417] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1372.248584][T27417] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1372.281509][T27433] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1372.282468][T27433] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1372.441842][T27440] loop1: p1 p3 p4 [ 1372.448010][T27440] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1372.478367][T27440] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1372.486642][T27440] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1372.640175][T27440] loop1: p1 p3 p4 [ 1372.644217][T27440] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1372.657670][T27440] loop1: p3 size 1912633224 extends beyond EOD, truncated 23:42:32 executing program 3: syz_read_part_table(0x0, 0x5101, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x1400}}]}, 0x34}}, 0x0) 23:42:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0xe80}}, 0x0) 23:42:32 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000a0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:32 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:32 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000000000007400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1372.680438][T27440] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x37fe0}}, 0x0) 23:42:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x4000}}]}, 0x34}}, 0x0) [ 1372.803408][T27449] loop2: p1[EZD] p3 p4 [ 1372.933378][T27457] fuse: Bad value for 'fd' 23:42:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x200004b4}}, 0x0) 23:42:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x7ffff000}}, 0x0) 23:42:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xd201}}]}, 0x34}}, 0x0) [ 1373.127462][T27449] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1373.165179][T27449] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:42:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0xfffffdef}}, 0x0) [ 1373.178330][T27449] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1373.200637][ T148] loop1: p1 p3 p4 [ 1373.204721][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1373.219425][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1373.235496][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1373.252643][T27461] loop1: p1 p3 p4 [ 1373.256592][T27461] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1373.265246][T27461] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1373.273106][T27461] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1373.289878][T27449] loop2: p1[EZD] p3 p4 [ 1373.294256][T27449] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1373.301988][T27449] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1373.309773][T27449] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1373.411492][T27469] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1373.412559][T27469] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1373.560205][T27461] loop1: p1 p3 p4 [ 1373.564088][T27461] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1373.573532][T27461] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1373.589744][T27461] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1373.666099][ T148] loop1: p1 p3 p4 [ 1373.670209][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1373.678289][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1373.685871][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1373.811285][T27469] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1373.812836][T27469] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:33 executing program 3: syz_read_part_table(0x0, 0x5102, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x38000}}]}, 0x34}}, 0x0) 23:42:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x3}, 0x0) 23:42:33 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000b0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:33 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:33 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000000000010400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x800300}}]}, 0x34}}, 0x0) 23:42:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x4}, 0x0) [ 1374.070001][T27483] loop1: p1 p3 p4 [ 1374.083701][T27483] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1374.091656][T27487] loop2: p1[EZD] p3 p4 [ 1374.096164][T27487] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1374.105443][T27483] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1374.153238][T27483] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1374.200304][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1374.206620][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x1000000}}]}, 0x34}}, 0x0) 23:42:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x8}, 0x0) [ 1374.304598][T27487] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1374.312379][T27492] fuse: Bad value for 'fd' [ 1374.312425][T27495] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1374.321822][T27487] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x2000000}}]}, 0x34}}, 0x0) 23:42:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x300}, 0x0) [ 1374.391787][T27483] loop1: p1 p3 p4 [ 1374.396206][T27483] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1374.414878][T27483] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1374.423533][T27483] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1374.480044][T27487] loop2: p1[EZD] p3 p4 [ 1374.484386][T27487] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1374.493183][T27487] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1374.501216][T27487] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1374.791603][T27509] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1374.793108][T27509] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1375.034473][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1375.035370][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:35 executing program 3: syz_read_part_table(0x0, 0x5202, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x2}, 0x0) 23:42:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x3000000}}]}, 0x34}}, 0x0) 23:42:35 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000000000040400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:35 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000c0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:35 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x3}, 0x0) 23:42:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x4000000}}]}, 0x34}}, 0x0) [ 1375.360127][T27518] loop1: p1 p3 p4 [ 1375.364022][T27518] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1375.373044][T27518] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1375.389506][T27520] loop2: p1 p3 p4 [ 1375.395625][T27520] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1375.408717][T27518] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1375.526677][T27529] fuse: Bad value for 'fd' [ 1375.635435][T27520] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:42:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x4}, 0x0) 23:42:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x5000000}}]}, 0x34}}, 0x0) [ 1375.688559][ T148] loop1: p1 p3 p4 [ 1375.696505][T27520] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1375.704323][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1375.712504][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1375.724085][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x5}, 0x0) [ 1375.752009][T27523] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1375.753450][T27523] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x6000000}}]}, 0x34}}, 0x0) [ 1375.965261][T27520] loop2: p1 p3 p4 [ 1375.969637][T27520] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1375.977996][T27520] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1375.986564][T27520] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1376.001043][ T148] loop1: p1 p3 p4 [ 1376.005413][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1376.015137][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1376.024377][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1376.035334][T27518] loop1: p1 p3 p4 [ 1376.039856][T27518] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1376.058031][T27518] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1376.066342][T27518] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:36 executing program 3: syz_read_part_table(0x0, 0x5302, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x6}, 0x0) 23:42:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x8000000}}]}, 0x34}}, 0x0) 23:42:36 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000d0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:36 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800000000ffffffff400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:36 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x9000000}}]}, 0x34}}, 0x0) 23:42:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x8}, 0x0) [ 1376.299932][T27553] loop1: p1 p3 p4 [ 1376.303920][T27553] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1376.320869][T27553] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1376.333416][T27553] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x9}, 0x0) [ 1376.445648][T27551] loop2: p1 p3 p4 [ 1376.491478][T27551] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1376.517538][T27565] fuse: Bad value for 'fd' 23:42:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xa000000}}]}, 0x34}}, 0x0) [ 1376.582636][T27564] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xa}, 0x0) 23:42:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xb000000}}]}, 0x34}}, 0x0) [ 1376.624288][T27551] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1376.624418][ T148] loop1: p1 p3 p4 [ 1376.635415][T27551] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1376.635705][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1376.651775][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1376.664209][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1376.700973][T27557] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1376.701902][T27557] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1376.891125][T27553] loop1: p1 p3 p4 [ 1376.898272][T27553] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1376.915286][T27553] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1376.923290][T27551] loop2: p1 p3 p4 [ 1376.927206][T27551] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1376.935043][T27553] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1376.943386][T27551] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1376.956679][T27551] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1376.986707][ T148] loop1: p1 p3 p4 [ 1376.998292][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1377.006892][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1377.015656][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:37 executing program 3: syz_read_part_table(0x0, 0x5801, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xb}, 0x0) 23:42:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x10000000}}]}, 0x34}}, 0x0) 23:42:37 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000e0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:37 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080002000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:37 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x11000000}}]}, 0x34}}, 0x0) 23:42:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x10}, 0x0) [ 1377.356735][T27585] loop2: p1 p3 p4 [ 1377.360695][T27585] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1377.512522][T27585] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1377.548427][T27600] fuse: Bad value for 'fd' 23:42:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x11}, 0x0) [ 1377.563870][T27585] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x12000000}}]}, 0x34}}, 0x0) 23:42:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x12}, 0x0) [ 1377.651353][T27596] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1377.659691][ T148] loop1: p1 p3 p4 [ 1377.663873][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1377.671638][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1377.679888][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1377.689660][T27588] loop1: p1 p3 p4 [ 1377.693952][T27588] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1377.702502][T27588] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1377.711398][T27588] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1377.730446][T27591] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1377.731586][T27591] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x13000000}}]}, 0x34}}, 0x0) [ 1377.920059][T27585] loop2: p1 p3 p4 [ 1377.924061][T27585] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1377.932936][T27585] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1377.949103][T27585] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1377.971232][T27588] loop1: p1 p3 p4 [ 1377.976798][T27588] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1377.985502][T27588] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1377.993765][T27588] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1378.041766][ T148] loop1: p1 p3 p4 [ 1378.059028][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1378.067285][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1378.075468][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:38 executing program 3: syz_read_part_table(0x0, 0x5901, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:38 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000110a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x13}, 0x0) 23:42:38 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x14000000}}]}, 0x34}}, 0x0) 23:42:38 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080003000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x40000000}}]}, 0x34}}, 0x0) 23:42:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x14}, 0x0) [ 1378.263542][T27621] loop1: p1 p3 p4 [ 1378.274892][T27621] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1378.342264][T27620] loop2: p1 p3 p4 [ 1378.351596][T27621] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1378.367305][T27620] loop2: p1 size 78398975 extends beyond EOD, truncated 23:42:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x99}, 0x0) [ 1378.405101][T27621] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1378.423411][T27620] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1378.439442][T27633] fuse: Bad value for 'fd' [ 1378.458811][T27630] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0x9effffff}}]}, 0x34}}, 0x0) [ 1378.501980][T27620] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x300}, 0x0) [ 1378.612310][T27625] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1378.614279][T27625] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xd2010000}}]}, 0x34}}, 0x0) [ 1378.789744][T27621] loop1: p1 p3 p4 [ 1378.793784][T27621] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1378.811625][T27621] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1378.820353][T27621] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1378.836614][ T148] loop1: p1 p3 p4 [ 1378.846559][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1378.865877][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1378.883295][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1379.160571][T27625] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1379.162262][T27625] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:39 executing program 3: syz_read_part_table(0x0, 0x5e01, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x500}, 0x0) 23:42:39 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000120a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:39 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080004000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xeaffffff}}]}, 0x34}}, 0x0) 23:42:39 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xefffffff}}]}, 0x34}}, 0x0) 23:42:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x600}, 0x0) 23:42:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xf0ffffff}}]}, 0x34}}, 0x0) [ 1379.399675][T27653] loop2: p1 p3 p4 [ 1379.404088][T27653] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1379.417545][T27653] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1379.427883][T27653] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1379.440199][T27656] loop1: p1 p3 p4 [ 1379.444113][T27656] loop1: p1 size 78398975 extends beyond EOD, truncated 23:42:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xfeffffff}}]}, 0x34}}, 0x0) 23:42:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x900}, 0x0) [ 1379.604813][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1379.616180][ T148] loop3: p4 size 3657465856 extends beyond EOD, [ 1379.690665][T27656] loop1: p3 size 1912633224 extends beyond EOD, 23:42:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xa00}, 0x0) [ 1379.706714][T27667] fuse: Bad value for 'fd' [ 1379.712882][T27656] truncated [ 1379.725704][ T148] truncated [ 1379.726693][T27656] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1379.739315][T27665] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1379.891796][T27653] loop2: p1 p3 p4 [ 1379.895757][T27653] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1379.903592][T27653] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1379.914494][T27653] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1380.050304][T27677] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1380.051242][T27677] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1380.332404][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1380.333342][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:40 executing program 3: syz_read_part_table(0x0, 0x5e02, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xb00}, 0x0) 23:42:40 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080005000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:40 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000140a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xffffff7f}}]}, 0x34}}, 0x0) 23:42:40 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000012000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xffffff9e}}]}, 0x34}}, 0x0) 23:42:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1100}, 0x0) [ 1380.669160][T27686] loop2: p1 < > p3 p4 [ 1380.676127][T27686] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1380.686615][T27686] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1380.779533][T27688] loop1: p1 p3 p4 [ 1380.784221][T27688] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1380.866011][T27699] fuse: Bad value for 'fd' 23:42:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xffffffea}}]}, 0x34}}, 0x0) 23:42:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1200}, 0x0) [ 1380.917773][T27688] loop1: p3 size 1912633224 extends beyond EOD, truncated 23:42:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xffffffef}}]}, 0x34}}, 0x0) 23:42:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1300}, 0x0) [ 1380.964230][T27688] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1380.976798][T27698] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1381.064317][T27686] loop2: p1 < > p3 p4 [ 1381.069858][T27686] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1381.077685][T27686] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1381.111882][T27691] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1381.113359][T27691] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1381.388103][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1381.389839][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1400}, 0x0) 23:42:41 executing program 3: syz_read_part_table(0x0, 0x5f01, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:41 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080006000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xfffffff0}}]}, 0x34}}, 0x0) 23:42:41 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500a1140a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:41 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81b53df892", @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000012000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x4000}, 0x0) 23:42:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc, 0x15, {0x0, 0xfffffffe}}]}, 0x34}}, 0x0) [ 1381.669567][T27718] loop2: p1 < > p3 p4 [ 1381.674425][T27718] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:42:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x9900}, 0x0) [ 1381.801326][T27718] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0xf}}, 0x0) [ 1381.947294][T27728] fuse: Bad value for 'fd' 23:42:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x38000}, 0x0) 23:42:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x10}}, 0x0) [ 1381.990542][T27720] loop1: p1 p3 p4 [ 1381.994607][T27720] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1382.002557][T27720] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1382.010571][T27720] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1382.031658][T27727] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x28}}, 0x0) [ 1382.139490][T27720] loop1: p1 p3 p4 [ 1382.143740][T27720] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1382.151840][T27720] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1382.160076][T27720] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1382.181391][T27736] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1382.182781][T27736] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1382.457758][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1382.458718][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:42 executing program 3: syz_read_part_table(0x0, 0x5f02, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x800300}, 0x0) 23:42:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0xe80}}, 0x0) 23:42:42 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000160a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:42 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080007000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:42 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000012000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x37fe0}}, 0x0) 23:42:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1000000}, 0x0) [ 1382.800124][T27754] loop2: p1 < > p3 p4 [ 1382.816905][T27754] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1382.834040][T27754] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1382.909428][T27755] loop1: p1 p3 p4 [ 1382.913996][T27755] loop1: p1 size 78398975 extends beyond EOD, truncated 23:42:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x200004b4}}, 0x0) [ 1383.046393][T27755] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1383.079112][T27765] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1383.088208][T27767] fuse: Bad value for 'fd' 23:42:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x2000000}, 0x0) 23:42:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x7ffff000}}, 0x0) [ 1383.121333][T27755] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1383.159758][ T95] print_req_error: 11 callbacks suppressed [ 1383.159771][ T95] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1383.176590][ T95] buffer_io_error: 8 callbacks suppressed [ 1383.176598][ T95] Buffer I/O error on dev loop2, logical block 0, async page read [ 1383.190322][ T148] loop2: unable to read partition table [ 1383.196047][ T148] loop2: partition table beyond EOD, truncated 23:42:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x3000000}, 0x0) [ 1383.204051][T27759] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1383.205456][T27759] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1383.369843][T27754] loop2: p1 < > p3 p4 [ 1383.374931][T27754] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1383.383420][T27754] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:43 executing program 3: syz_read_part_table(0x0, 0x6001, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x4000000}, 0x0) 23:42:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0xfffffdef}}, 0x0) 23:42:43 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080008000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:43 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500001f0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:43 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81b53df892", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x3}, 0x0) 23:42:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x5000000}, 0x0) [ 1383.799504][T27786] loop1: p1 p3 p4 [ 1383.803675][T27786] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1383.812275][T27786] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1383.820664][T27786] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1383.891214][T27788] loop2: p1 p3 p4 [ 1383.896003][T27788] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1383.935836][T27788] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1383.980390][T27788] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1383.997651][T27797] fuse: Bad value for 'fd' [ 1384.047096][T27796] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x4}, 0x0) 23:42:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x6000000}, 0x0) 23:42:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x8}, 0x0) 23:42:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x8000000}, 0x0) [ 1384.320414][T27793] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1384.327618][T27793] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1384.595042][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1384.595948][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:44 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080009000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:44 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000200a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:44 executing program 3: syz_read_part_table(0x0, 0x6002, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x9000000}, 0x0) 23:42:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x300}, 0x0) 23:42:44 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81b53df892", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xa000000}, 0x0) 23:42:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x2}, 0x0) [ 1384.849695][T27820] loop2: p1 p3 p4 [ 1384.853532][T27820] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1384.861942][T27820] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1384.874030][T27822] loop1: p1 p3 p4 [ 1384.901656][T27820] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1385.043857][T27822] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1385.052875][T27834] fuse: Bad value for 'fd' [ 1385.106166][T27832] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x3}, 0x0) 23:42:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xb000000}, 0x0) [ 1385.156648][T27822] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1385.172160][T27822] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x4}, 0x0) [ 1385.244616][ T148] loop1: p1 p3 p4 [ 1385.250251][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1385.258513][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1385.268181][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1385.276907][T27820] loop2: p1 p3 p4 [ 1385.280880][T27820] loop2: p1 size 78398975 extends beyond EOD, truncated 23:42:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x10000000}, 0x0) [ 1385.295553][T27820] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1385.317198][T27820] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1385.409316][T27822] loop1: p1 p3 p4 [ 1385.413183][T27822] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1385.421249][T27822] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1385.429255][T27822] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1385.456169][T27841] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1385.457170][T27841] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x5}, 0x0) 23:42:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x11000000}, 0x0) [ 1385.602382][ T148] loop1: p1 p3 p4 [ 1385.606887][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1385.617411][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1385.633501][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:45 executing program 3: syz_read_part_table(0x0, 0x6101, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:45 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008000a000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:45 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000250a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x12000000}, 0x0) 23:42:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x6}, 0x0) 23:42:45 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x13000000}, 0x0) 23:42:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x8}, 0x0) [ 1385.999772][T27857] loop2: p1 < > p3 p4 [ 1386.025947][T27857] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1386.171692][T27870] fuse: Bad value for 'fd' [ 1386.184607][T27857] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x14000000}, 0x0) 23:42:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x9}, 0x0) [ 1386.280251][T27866] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1386.318325][T27862] loop1: p1 p3 p4 [ 1386.322971][T27862] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1386.332361][T27862] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1386.340913][T27862] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xa}, 0x0) 23:42:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x40000000}, 0x0) [ 1386.492265][T27875] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1386.497028][T27875] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1386.610894][T27862] loop1: p1 p3 p4 [ 1386.620093][T27862] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1386.636337][T27862] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1386.645006][T27862] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1386.658499][T27857] loop2: p1 < > p3 p4 [ 1386.665209][T27857] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1386.674729][T27857] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:46 executing program 3: syz_read_part_table(0x0, 0x6102, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x99000000}, 0x0) 23:42:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xb}, 0x0) 23:42:46 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008000b000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:46 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500012a0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:46 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x10}, 0x0) 23:42:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x9effffff}, 0x0) [ 1386.919798][T27893] loop2: p1 p3 p4 [ 1386.931837][T27893] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1386.941704][T27893] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1387.094121][T27904] fuse: Bad value for 'fd' 23:42:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x11}, 0x0) [ 1387.152146][T27893] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xeaffffff}, 0x0) 23:42:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x12}, 0x0) [ 1387.219042][T27895] loop1: p1 p3 p4 [ 1387.223520][T27895] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1387.240193][T27895] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1387.253089][T27895] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1387.303337][T27893] loop2: p1 p3 p4 [ 1387.314162][T27893] loop2: p1 size 78398975 extends beyond EOD, truncated 23:42:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x13}, 0x0) [ 1387.344226][T27893] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1387.359361][T27893] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1387.383505][T27895] loop1: p1 p3 p4 [ 1387.387373][T27895] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1387.429653][T27895] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1387.448732][T27895] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1387.490042][T27913] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1387.493916][T27913] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:47 executing program 3: syz_read_part_table(0x0, 0x6802, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xefffffff}, 0x0) 23:42:47 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500003f0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x14}, 0x0) 23:42:47 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008000c000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:47 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xf0ffffff}, 0x0) 23:42:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1d2}, 0x0) [ 1388.051826][T27927] loop1: p1 p3 p4 [ 1388.055961][T27927] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1388.103373][T27927] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1388.232632][T27940] fuse: Bad value for 'fd' 23:42:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x300}, 0x0) [ 1388.272278][T27927] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xfeffffff}, 0x0) [ 1388.339045][T27939] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1388.359994][T27931] loop2: p1 p3 p4 [ 1388.364380][T27931] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1388.379300][T27931] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:42:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x500}, 0x0) [ 1388.395712][T27931] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xffffff7f}, 0x0) [ 1388.421776][T27933] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1388.423064][T27933] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:48 executing program 3: syz_read_part_table(0x0, 0x6902, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:48 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008000d000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:48 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000400a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x600}, 0x0) 23:42:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xffffff9e}, 0x0) 23:42:48 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x900}, 0x0) 23:42:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xffffffea}, 0x0) [ 1389.012750][T27959] loop1: p1 p3 p4 [ 1389.016577][T27959] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1389.025041][T27959] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1389.034881][T27959] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1389.118830][T27958] loop2: p1 p3 p4 [ 1389.155622][T27958] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1389.242271][T27958] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:42:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xa00}, 0x0) 23:42:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xffffffef}, 0x0) [ 1389.315570][T27958] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1389.322972][T27973] fuse: Bad value for 'fd' [ 1389.323101][T27971] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xfffffff0}, 0x0) 23:42:49 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000480a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1389.422387][T27965] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1389.425693][T27965] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1389.538911][T27959] loop1: p1 p3 p4 [ 1389.542805][T27959] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1389.558735][T27959] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1389.583538][T27959] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1389.630091][ T148] loop1: p1 p3 p4 [ 1389.635955][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1389.644855][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1389.653682][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1389.669065][T27985] loop2: p1 p3 p4 [ 1389.673077][T27985] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1389.681345][T27985] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1389.689831][T27985] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1389.831564][T27985] loop2: p1 p3 p4 [ 1389.840625][T27985] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1389.849655][T27985] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1389.857677][T27985] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:49 executing program 3: syz_read_part_table(0x0, 0x6c01, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xb00}, 0x0) 23:42:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xfffffffe}, 0x0) 23:42:49 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008000e000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:49 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:49 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500004c0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1100}, 0x0) 23:42:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x80030000000000}, 0x0) [ 1389.997644][T27991] loop2: p1[EZD] p3 p4 [ 1390.004179][T27991] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1390.028531][T27991] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1390.041465][T27995] loop1: p1 p3 p4 [ 1390.046003][T27995] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1390.107272][T27991] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1390.129194][T27995] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1390.215387][T28009] fuse: Bad value for 'fd' 23:42:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x100000000000000}, 0x0) 23:42:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1200}, 0x0) [ 1390.281708][T27995] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1390.297010][T28005] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x200000000000000}, 0x0) 23:42:50 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500005a0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1390.524510][T27999] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1390.525033][T27995] loop1: p1 p3 p4 [ 1390.526009][T27999] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1390.648675][T27995] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1390.656331][T27995] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1390.666368][T27995] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1390.699483][T28019] loop2: p1 p3 p4 [ 1390.704093][T28019] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1390.712286][T28019] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1390.720303][T28019] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1390.732509][ T148] loop1: p1 p3 p4 [ 1390.741607][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1390.751833][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1390.762552][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1390.961346][T28019] loop2: p1 p3 p4 [ 1390.965214][T28019] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1390.972986][T28019] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1390.981040][T28019] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1391.020961][ T148] loop2: p1 p3 p4 [ 1391.024806][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1391.033208][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1391.041500][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:51 executing program 3: syz_read_part_table(0x0, 0x6d01, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1300}, 0x0) 23:42:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x300000000000000}, 0x0) 23:42:51 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080010000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:51 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:51 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000600a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x400000000000000}, 0x0) 23:42:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1400}, 0x0) 23:42:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x500000000000000}, 0x0) [ 1391.188919][T28032] loop1: p1 p3 p4 [ 1391.192966][T28032] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1391.212464][T28032] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1391.221336][T28032] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x4000}, 0x0) [ 1391.396701][T28044] fuse: Bad value for 'fd' 23:42:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xd201}, 0x0) 23:42:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x600000000000000}, 0x0) [ 1391.459603][T28036] loop2: p1 p3 p4 [ 1391.464084][T28036] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1391.482753][T28036] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1391.492860][T28043] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1391.496922][T28036] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1391.560630][ T148] loop2: p1 p3 p4 [ 1391.564470][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1391.572398][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1391.580336][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1391.595115][T28035] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1391.597072][T28035] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1391.695045][T28032] loop1: p1 p3 p4 [ 1391.699351][T28032] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1391.713381][T28032] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1391.722393][T28032] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:51 executing program 3: syz_read_part_table(0x0, 0x6e01, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:51 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000680a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x38000}, 0x0) 23:42:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x800000000000000}, 0x0) 23:42:51 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:51 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080011000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x800300}, 0x0) 23:42:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x900000000000000}, 0x0) [ 1392.080373][T28060] loop1: p1 p3 p4 [ 1392.084441][T28060] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1392.100113][T28060] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1392.110079][T28060] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1392.115450][T28066] loop2: p1 p3 p4 [ 1392.129560][T28066] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1392.390670][T28066] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1392.425952][T28073] fuse: Bad value for 'fd' [ 1392.426225][T28071] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1000000}, 0x0) [ 1392.446008][T28066] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x2000000}, 0x0) 23:42:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xa00000000000000}, 0x0) 23:42:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x3000000}, 0x0) [ 1392.658218][ T148] loop1: p1 p3 p4 [ 1392.662113][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1392.669118][T28066] loop2: p1 p3 p4 [ 1392.673030][T28066] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1392.677152][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1392.684897][T28066] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1392.695101][T28066] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1392.698199][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1392.715027][T28060] loop1: p1 p3 p4 [ 1392.718959][T28060] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1392.726360][T28060] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1392.734154][T28060] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1392.739906][T28083] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1392.742691][T28083] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:53 executing program 3: syz_read_part_table(0x0, 0x6f01, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xb00000000000000}, 0x0) 23:42:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x4000000}, 0x0) 23:42:53 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500006c0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:53 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080012000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:53 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x5000000}, 0x0) 23:42:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1000000000000000}, 0x0) [ 1393.248920][T28095] loop2: p1[EZD] p3 p4 [ 1393.253305][T28095] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1393.265866][T28095] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1393.277418][T28095] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1393.461354][T28106] fuse: Bad value for 'fd' [ 1393.587676][T28102] loop1: p1 p3 p4 [ 1393.598882][T28102] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1393.607100][T28105] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x6000000}, 0x0) 23:42:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1100000000000000}, 0x0) 23:42:53 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000740a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1393.664733][T28102] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1393.681746][T28102] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x8000000}, 0x0) [ 1393.779658][T28100] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1393.781249][T28100] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1393.929705][T12958] blk_update_request: I/O error, dev loop1, sector 42081 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1393.942164][T28102] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 1393.943619][T13567] blk_update_request: I/O error, dev loop1, sector 42112 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1393.988216][T28102] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 1394.038451][ T148] loop2: p1 p3 p4 [ 1394.042328][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1394.054347][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1394.063685][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x9000000}, 0x0) 23:42:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1200000000000000}, 0x0) 23:42:54 executing program 3: syz_read_part_table(0x0, 0x7001, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:54 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008001c000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:54 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1394.085934][T28118] loop2: p1 p3 p4 [ 1394.090203][T28118] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1394.109151][T28118] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1394.116989][T28118] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xa000000}, 0x0) 23:42:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1300000000000000}, 0x0) [ 1394.394929][T28133] fuse: Bad value for 'fd' 23:42:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xb000000}, 0x0) [ 1394.549763][T28132] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1400000000000000}, 0x0) [ 1394.636279][T28118] loop2: p1 p3 p4 [ 1394.640304][T28118] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1394.651971][T28118] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1394.660940][T28118] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:54 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500007a0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1394.689765][T28137] loop1: p1 p3 p4 [ 1394.697428][T28137] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1394.725714][T28137] loop1: p3 size 1912633224 extends beyond EOD, truncated 23:42:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x10000000}, 0x0) 23:42:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x4000000000000000}, 0x0) [ 1394.734543][T28137] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x8000000000000000}, 0x0) [ 1394.799961][T28144] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1394.808053][T28144] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x11000000}, 0x0) [ 1394.968072][T28137] loop1: p1 p3 p4 [ 1394.972133][T28137] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1394.980869][T28137] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1394.989483][T28137] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1394.998628][T28156] loop2: p1 p3 p4 [ 1395.015621][T28156] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1395.031509][T28156] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1395.049282][T28156] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1395.158424][T28156] loop2: p1 p3 p4 [ 1395.162302][T28156] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1395.172353][T28156] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1395.180708][T28156] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1395.214459][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1395.215385][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:55 executing program 3: syz_read_part_table(0x0, 0x7e02, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:55 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81b53df892", @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x12000000}, 0x0) 23:42:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x9900000000000000}, 0x0) 23:42:55 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080026000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:55 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000900a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x13000000}, 0x0) 23:42:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x9effffff00000000}, 0x0) [ 1395.572716][T28172] loop1: p1 p3 p4 [ 1395.576795][T28172] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1395.653540][T28172] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1395.694386][T28172] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1395.706816][T28174] loop2: p1 p3 p4 [ 1395.716103][T28174] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1395.761733][T28181] fuse: Bad value for 'fd' [ 1395.796816][T28180] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1395.827775][T28174] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:42:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xeaffffff00000000}, 0x0) 23:42:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x14000000}, 0x0) [ 1395.852072][T28174] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:55 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050003a00a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1395.936254][T28175] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1395.940100][T28175] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xefffffff00000000}, 0x0) [ 1396.037827][T28172] loop1: p1 p3 p4 [ 1396.057850][T28172] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1396.089526][T28172] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1396.110422][T28172] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:56 executing program 3: syz_read_part_table(0x0, 0x7f02, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x40000000}, 0x0) 23:42:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xf0ffffff00000000}, 0x0) 23:42:56 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050014a10a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:56 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080004020000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:56 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xfeffffff00000000}, 0x0) 23:42:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x9effffff}, 0x0) [ 1396.540167][T28202] loop2: p1 < > p3 p4 [ 1396.546133][T28202] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1396.562050][T28202] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1396.748183][T28212] fuse: Bad value for 'fd' [ 1396.858731][T28203] loop1: p1 p3 p4 [ 1396.864077][T28203] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1396.880389][T28211] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1396.892981][T28203] loop1: p3 size 1912633224 extends beyond EOD, truncated 23:42:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xffffff7f00000000}, 0x0) 23:42:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xd2010000}, 0x0) [ 1396.902104][T28203] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:56 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000030000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:56 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050003a40a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1397.063304][T28207] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1397.064585][T28207] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1397.178319][T28227] loop1: p1 p3 p4 [ 1397.182267][T28227] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1397.209454][T28227] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1397.220437][T28227] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1397.249413][T28224] loop2: p1 p3 p4 [ 1397.257089][T28224] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1397.272372][T28224] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1397.280777][T28224] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1397.340260][T28227] loop1: p1 p3 p4 [ 1397.362101][T28227] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1397.378018][T28227] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1397.389374][T28227] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1397.430427][T12958] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1397.443474][ T119] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1397.454529][ T119] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1397.464268][ T119] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1397.475221][ T119] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1397.484339][ T119] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1397.495538][ T119] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1397.504143][T13567] blk_update_request: I/O error, dev loop3, sector 233 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1397.516539][ T119] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1397.527518][ T119] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1397.535692][ T119] blk_update_request: I/O error, dev loop3, sector 233 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1397.546818][ T119] Buffer I/O error on dev loop3p3, logical block 1, async page read [ 1397.554948][ T119] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1397.565858][ T119] Buffer I/O error on dev loop3p1, logical block 0, async page read 23:42:57 executing program 3: syz_read_part_table(0x0, 0x8002, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:57 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xeaffffff}, 0x0) 23:42:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xffffffff00000000}, 0x0) 23:42:57 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81b53df892", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:57 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500f9a40a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:57 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080002040000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1397.574157][ T95] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1397.582453][ T95] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1397.593213][ T95] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1397.601391][ T95] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1397.612535][T28207] __loop_clr_fd: partition scan of loop3 failed (rc=-16) 23:42:57 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xefffffff}, 0x0) 23:42:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x2}, 0x0) [ 1397.699442][T28237] loop2: p1 p3 p4 [ 1397.715209][T28237] loop2: p1 size 78398975 extends beyond EOD, truncated 23:42:57 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xf0ffffff}, 0x0) [ 1397.899547][T28251] fuse: Bad value for 'fd' [ 1397.982038][T28237] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1398.008428][T28239] loop1: p1 p3 p4 [ 1398.015617][T28239] loop1: p1 size 78398975 extends beyond EOD, truncated 23:42:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x3}, 0x0) 23:42:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xfeffffff}, 0x0) [ 1398.031397][T28249] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1398.047981][T28237] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1398.055352][T28239] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1398.064766][T28239] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x4}, 0x0) [ 1398.208444][T28237] loop2: p1 p3 p4 [ 1398.214018][T28237] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1398.228676][T28243] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1398.230363][T28243] loop3: p4 size 3657465856 extends beyond EOD, [ 1398.230755][T28237] loop2: p3 size 1912633224 extends beyond EOD, [ 1398.318301][T28243] truncated [ 1398.323787][T28237] truncated [ 1398.340495][T28239] loop1: p1 p3 p4 [ 1398.344618][T28239] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1398.353448][T28237] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1398.363629][T28239] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1398.386112][T28239] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:42:58 executing program 3: syz_read_part_table(0x0, 0x8003, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x5}, 0x0) 23:42:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xffffff7f}, 0x0) 23:42:58 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000a50a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:58 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080006040000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:58 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xffffff9e}, 0x0) 23:42:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x6}, 0x0) [ 1398.835771][T28284] fuse: Bad value for 'fd' [ 1398.843049][T28273] loop2: p1 p3 p4 [ 1398.847598][T28273] loop2: p1 size 78398975 extends beyond EOD, truncated 23:42:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xffffffea}, 0x0) [ 1398.891005][T28273] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1398.917595][T28281] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x8}, 0x0) [ 1398.956954][T28273] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1398.992852][T28272] loop1: p1 p3 p4 23:42:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xffffffef}, 0x0) 23:42:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x9}, 0x0) [ 1399.001580][T28272] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1399.013598][T28272] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1399.024977][T28272] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1399.068042][T28273] loop2: p1 p3 p4 [ 1399.075438][T28273] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1399.093100][T28273] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1399.115178][T28273] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1399.168412][T28272] loop1: p1 p3 p4 [ 1399.172227][ T148] loop2: p1 p3 p4 [ 1399.172371][T28272] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1399.176127][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1399.184981][T28272] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1399.194792][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1399.197593][T28272] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1399.205458][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1399.249503][T28291] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1399.250454][T28291] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:42:59 executing program 3: syz_read_part_table(0x0, 0x8102, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xfffffff0}, 0x0) 23:42:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xa}, 0x0) 23:42:59 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050001a50a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:59 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080080040000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:42:59 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:42:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xb}, 0x0) 23:42:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xfffffffe}, 0x0) [ 1399.608633][T28305] loop1: p1 p3 p4 [ 1399.612434][T28305] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1399.622194][T28305] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1399.631292][T28305] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1399.649830][T28307] loop2: p1 p3 p4 [ 1399.654167][T28307] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1399.671040][T28307] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1399.686041][T28307] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:42:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x80030000000000}, 0x0) 23:42:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x10}, 0x0) [ 1399.879268][T28319] fuse: Unknown parameter '0x0000000000000003' [ 1399.879420][T28314] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:42:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x100000000000000}, 0x0) 23:42:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x11}, 0x0) [ 1400.038705][T28305] loop1: p1 p3 p4 [ 1400.042634][T28305] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1400.050607][T28305] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1400.058503][T28305] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1400.083535][T28320] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1400.084962][T28320] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:00 executing program 3: syz_read_part_table(0x0, 0x9201, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x12}, 0x0) 23:43:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x200000000000000}, 0x0) 23:43:00 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050003ac0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:00 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000050000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:00 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x13}, 0x0) 23:43:00 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x300000000000000}, 0x0) [ 1400.668609][T28338] loop2: p1 p3 p4 [ 1400.672860][T28338] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1400.681338][T28338] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1400.690705][T28338] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x14}, 0x0) [ 1400.937862][T28343] loop1: p1 p3 p4 [ 1400.939667][T28351] fuse: Unknown parameter '0x0000000000000003' [ 1400.950361][T28350] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1400.952786][T28343] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1400.966881][T28343] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1400.975782][T28343] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1401.020485][T28346] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1401.022005][T28346] loop3: p4 size 3657465856 extends beyond EOD, [ 1401.022915][ T148] loop2: p1 p3 p4 23:43:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x400000000000000}, 0x0) 23:43:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x99}, 0x0) [ 1401.109866][T28346] truncated [ 1401.118315][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1401.133269][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1401.145575][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x500000000000000}, 0x0) [ 1401.218077][T28343] loop1: p1 p3 p4 [ 1401.222038][T28343] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1401.241295][T28343] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1401.251505][T28338] loop2: p1 p3 p4 [ 1401.256832][T28338] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1401.258522][T28343] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1401.276356][T28338] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1401.287432][T28338] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:01 executing program 3: syz_read_part_table(0x0, 0x9301, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x300}, 0x0) 23:43:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x600000000000000}, 0x0) 23:43:01 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080030050000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:01 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050001b40a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:01 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x800000000000000}, 0x0) 23:43:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x500}, 0x0) [ 1401.588766][T28376] loop1: p1 p3 p4 [ 1401.592958][T28376] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1401.602225][T28376] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1401.611049][T28376] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1401.767900][T28378] loop2: p1 p3 p4 [ 1401.779313][T28378] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1401.797250][T28389] fuse: Unknown parameter '0x0000000000000003' 23:43:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x600}, 0x0) 23:43:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x900000000000000}, 0x0) 23:43:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xa00000000000000}, 0x0) 23:43:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x900}, 0x0) [ 1401.921519][T28378] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1401.929337][T28386] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1401.950506][T28378] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1402.048787][T28381] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1402.049848][T28381] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1402.188110][T28376] loop1: p1 p3 p4 [ 1402.192109][T28376] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1402.201079][T28376] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1402.210219][T28376] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1402.295445][T28378] loop2: p1 p3 p4 [ 1402.299335][T28378] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1402.308108][T28378] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1402.316221][T28378] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:02 executing program 3: syz_read_part_table(0x0, 0x9401, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xb00000000000000}, 0x0) 23:43:02 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000060000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:02 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050003c60a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xa00}, 0x0) 23:43:02 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xb00}, 0x0) [ 1402.466545][ T148] loop1: p1 p3 p4 [ 1402.471511][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1402.481802][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1402.500211][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1000000000000000}, 0x0) [ 1402.528656][T28408] loop2: p1 p3 p4 [ 1402.532899][T28408] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1402.541642][T28408] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1402.549431][T28408] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1100}, 0x0) [ 1402.741904][T28421] fuse: Unknown parameter '0x0000000000000003' [ 1402.771079][T28420] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:43:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1100000000000000}, 0x0) 23:43:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1200}, 0x0) 23:43:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1200000000000000}, 0x0) [ 1402.908854][T28409] loop1: p1 p3 p4 [ 1402.913068][T28409] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1402.927494][T28409] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1402.941815][T28409] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1402.956122][T28408] loop2: p1 p3 p4 [ 1402.963777][T28408] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1402.971684][T28408] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1402.979575][T28408] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1403.008556][T28415] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1403.009574][T28415] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1403.250599][T28409] loop1: p1 p3 p4 [ 1403.256831][T28409] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1403.278077][T28409] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1403.285939][T28409] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:03 executing program 3: syz_read_part_table(0x0, 0x9501, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1300}, 0x0) 23:43:03 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500a4f90a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1300000000000000}, 0x0) 23:43:03 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080004060000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:03 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1400}, 0x0) 23:43:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x1400000000000000}, 0x0) [ 1403.487851][T28447] loop2: p1 < > p3 p4 [ 1403.493634][T28447] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1403.502789][T28447] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1403.695943][T28454] fuse: Unknown parameter '0x0000000000000003' [ 1403.742319][T28453] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:43:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x4000}, 0x0) 23:43:03 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105000fff0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1403.819418][T28448] loop1: p1 p3 p4 [ 1403.824854][T28448] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1403.835571][T28448] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1403.854035][T28448] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:03 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x4000000000000000}, 0x0) 23:43:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x9900}, 0x0) [ 1404.053365][T28450] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1404.054763][T28450] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1404.169202][T28464] loop2: p1 < > p3 p4 [ 1404.181572][T28464] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1404.190483][T28464] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1404.208303][T28448] loop1: p1 p3 p4 [ 1404.212203][T28448] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1404.251023][T28448] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1404.260830][T28448] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:04 executing program 3: syz_read_part_table(0x0, 0x9601, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x38000}, 0x0) 23:43:04 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000000080000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:04 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000070000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x8000000000000000}, 0x0) 23:43:04 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x800300}, 0x0) 23:43:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x9effffff00000000}, 0x0) 23:43:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xd201000000000000}, 0x0) [ 1404.508259][T28477] loop1: p1 p3 p4 [ 1404.512091][T28477] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1404.524596][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1404.525807][ T148] loop3: p4 size 3657465856 extends beyond EOD, [ 1404.562181][T28477] loop1: p3 size 1912633224 extends beyond EOD, [ 1404.628138][ T148] truncated 23:43:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1000000}, 0x0) [ 1404.911499][T28490] fuse: Unknown parameter '0x0000000000000003' [ 1404.918593][T28480] loop2: p1 p3 p4 [ 1404.922911][T28489] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1404.926686][T28477] truncated [ 1404.932208][T28480] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1404.939384][T28477] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1404.951531][T28480] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:43:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x2000000}, 0x0) 23:43:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xeaffffff00000000}, 0x0) [ 1404.967484][T28480] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:04 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xefffffff00000000}, 0x0) [ 1405.072098][T28480] loop2: p1 p3 p4 [ 1405.076367][T28480] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1405.085208][T28480] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1405.094294][T28480] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1405.128796][T28477] loop1: p1 p3 p4 [ 1405.132668][T28477] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1405.159522][T28477] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1405.170797][T28477] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1405.350919][T28503] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1405.351809][T28503] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1405.614101][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1405.614972][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:05 executing program 3: syz_read_part_table(0x0, 0x9701, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x3000000}, 0x0) 23:43:05 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500007fffff0000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xf0ffffff00000000}, 0x0) 23:43:05 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8e", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:05 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000090000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xfeffffff00000000}, 0x0) 23:43:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x4000000}, 0x0) [ 1405.930147][T28514] loop1: p1 p3 p4 [ 1406.030070][T28514] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1406.050083][T28514] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1406.062782][T28514] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xffffff7f00000000}, 0x0) 23:43:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x5000000}, 0x0) [ 1406.151288][T28525] fuse: Bad value for 'fd' [ 1406.157493][T28523] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:43:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x6000000}, 0x0) 23:43:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0xffffffff00000000}, 0x0) [ 1406.227788][T28517] loop2: p1 p3 p4 [ 1406.231772][T28517] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1406.240731][T28517] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1406.249827][T28517] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1406.318583][T28529] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1406.319611][T28529] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1406.569852][T28517] loop2: p1 p3 p4 [ 1406.573806][T28517] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1406.581762][T28517] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1406.589751][T28517] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x8000000}, 0x0) 23:43:06 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800000a0000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:06 executing program 3: syz_read_part_table(0x0, 0x9803, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x2}, 0x0) 23:43:06 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000800000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:06 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8e", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x9000000}, 0x0) 23:43:06 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x3}, 0x0) [ 1406.797601][T28547] loop2: p1 p3 p4 [ 1406.801537][T28547] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1406.814688][T28547] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1407.039304][T28559] fuse: Bad value for 'fd' 23:43:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x4}, 0x0) 23:43:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xa000000}, 0x0) [ 1407.115349][T28551] loop1: p1 p3 p4 [ 1407.120520][T28551] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1407.121754][T28547] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1407.128449][T28558] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1407.138828][T28551] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1407.151945][T28551] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xb000000}, 0x0) 23:43:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x5}, 0x0) 23:43:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x10000000}, 0x0) [ 1407.230326][ T148] loop2: p1 p3 p4 [ 1407.235154][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1407.244979][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1407.252924][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:07 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800000b0000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x11000000}, 0x0) [ 1407.319273][T28553] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1407.324963][T28553] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1407.587974][T28578] loop1: p1 p3 p4 [ 1407.591893][T28578] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1407.600911][T28578] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1407.628532][T28578] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1407.683172][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1407.684100][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1407.818241][T28578] loop1: p1 p3 p4 [ 1407.822051][T28578] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1407.829964][T28578] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1407.838117][T28578] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:07 executing program 3: syz_read_part_table(0x0, 0x9903, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x6}, 0x0) 23:43:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x12000000}, 0x0) 23:43:07 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000003000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:07 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8e", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:07 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800000c0000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x13000000}, 0x0) 23:43:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x8}, 0x0) 23:43:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x9}, 0x0) [ 1407.993083][T28587] loop2: p1 p3 p4 [ 1407.997549][T28587] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1408.107365][T28599] fuse: Bad value for 'fd' [ 1408.129844][T28587] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1408.187840][T28587] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1408.197450][T28591] loop1: p1 p3 p4 [ 1408.201900][T28591] loop1: p1 size 78398975 extends beyond EOD, truncated 23:43:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xa}, 0x0) 23:43:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x14000000}, 0x0) [ 1408.263439][T28591] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1408.281383][T28591] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x40000000}, 0x0) [ 1408.376008][T28587] loop2: p1 p3 p4 [ 1408.380027][T28587] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1408.389508][T28587] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1408.398204][T28587] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1408.417719][T28591] loop1: p1 p3 p4 [ 1408.421592][T28591] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1408.429880][T28591] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1408.438079][T28591] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1408.638802][T28614] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1408.640219][T28614] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1408.905333][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1408.906269][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:09 executing program 3: syz_read_part_table(0x0, 0x9a01, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xb}, 0x0) 23:43:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x99000000}, 0x0) 23:43:09 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000103000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:09 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800000d0000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:09 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x10}, 0x0) 23:43:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x9effffff}, 0x0) [ 1409.198379][T28623] loop1: p1 p3 p4 [ 1409.202430][T28623] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1409.210966][T28623] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1409.219377][T28623] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1409.229038][T28622] loop2: p1 p3 p4 [ 1409.233207][T28622] loop2: p1 size 78398975 extends beyond EOD, truncated 23:43:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x11}, 0x0) 23:43:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xeaffffff}, 0x0) 23:43:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x12}, 0x0) [ 1409.456193][T28634] fuse: Bad value for 'fd' [ 1409.464442][T28622] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1409.472892][T28622] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1409.487500][T28632] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:43:09 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x13}, 0x0) [ 1409.587210][T28623] loop1: p1 p3 p4 [ 1409.591120][T28623] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1409.603288][T28623] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1409.611767][T28623] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1409.637468][T28622] loop2: p1 p3 p4 [ 1409.641603][T28622] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1409.649742][T28622] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1409.657923][T28622] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1409.748367][T28640] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1409.749443][T28640] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1410.031345][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1410.032635][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:10 executing program 3: syz_read_part_table(0x0, 0x9b01, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xefffffff}, 0x0) 23:43:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x14}, 0x0) 23:43:10 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800000e0000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:10 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000007000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:10 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1d2}, 0x0) 23:43:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xf0ffffff}, 0x0) [ 1410.337426][T28658] loop1: p1 p3 p4 [ 1410.345444][T28658] loop1: p1 size 78398975 extends beyond EOD, truncated 23:43:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x300}, 0x0) 23:43:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xfeffffff}, 0x0) [ 1410.470954][T28658] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1410.485704][T28658] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1410.497826][T28660] loop2: p1 p3 p4 [ 1410.523116][T28669] fuse: Bad value for 'fd' [ 1410.551338][T28660] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1410.589232][T28667] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1410.625960][T28660] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1410.634291][T28660] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x500}, 0x0) 23:43:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 1410.777370][T28658] loop1: p1 p3 p4 [ 1410.781978][T28658] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1410.790529][T28658] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1410.798280][T28658] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1410.823936][T28672] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1410.824831][T28672] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:11 executing program 3: syz_read_part_table(0x0, 0x9e01, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x600}, 0x0) 23:43:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xffffff9e}, 0x0) 23:43:11 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000009000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:11 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000110000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:11 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x900}, 0x0) 23:43:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xffffffea}, 0x0) [ 1411.311376][T28688] loop2: p1 p3 p4 [ 1411.315367][T28688] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1411.330770][T28688] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1411.498633][T28701] fuse: Bad value for 'fd' 23:43:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xa00}, 0x0) [ 1411.554611][T28688] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1411.569680][T28690] loop1: p1 p3 p4 [ 1411.578178][T28690] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1411.592613][T28700] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:43:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xffffffef}, 0x0) [ 1411.603417][T28690] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1411.616244][T28690] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xb00}, 0x0) 23:43:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xfffffff0}, 0x0) [ 1411.739380][T28695] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1411.750306][T28695] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1411.871362][T28690] loop1: p1 p3 p4 [ 1411.879625][T28690] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1411.888610][T28690] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1411.896671][T28690] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1411.907636][ T148] loop1: p1 p3 p4 [ 1411.911505][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1411.919505][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1411.927529][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1412.052993][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1412.053944][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:12 executing program 3: syz_read_part_table(0x0, 0x9f01, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xfffffffe}, 0x0) 23:43:12 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000020a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1100}, 0x0) 23:43:12 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000120000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:12 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x80030000000000}, 0x0) 23:43:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1200}, 0x0) 23:43:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x100000000000000}, 0x0) [ 1412.318064][T28722] loop2: p1 p3 p4 [ 1412.325772][T28722] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1412.335970][T28722] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1412.350970][T28722] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1412.540331][T28733] fuse: Bad value for 'fd' 23:43:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1300}, 0x0) 23:43:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x200000000000000}, 0x0) 23:43:12 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1400}, 0x0) [ 1412.627169][T28724] loop1: p1 p3 p4 [ 1412.631614][T28724] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1412.650624][T28724] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1412.665943][T28724] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1412.718167][T28722] loop2: p1 p3 p4 [ 1412.722838][T28722] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1412.732761][T28722] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1412.741940][T28722] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1412.827216][T28724] loop1: p1 p3 p4 [ 1412.831057][T28724] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1412.839093][T28724] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1412.847051][T28724] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1412.858550][T28744] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1412.860057][T28744] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1413.151017][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1413.152241][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:13 executing program 3: syz_read_part_table(0x0, 0xa001, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x300000000000000}, 0x0) 23:43:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x4000}, 0x0) 23:43:13 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000030a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:13 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800001c0000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:13 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xd201}, 0x0) 23:43:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x400000000000000}, 0x0) [ 1413.448329][T28756] loop2: p1 p3 p4 [ 1413.452278][T28756] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1413.462814][T28756] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1413.472537][T28756] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x38000}, 0x0) [ 1413.637360][T28758] loop1: p1 p3 p4 [ 1413.642010][T28758] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1413.660059][T28766] fuse: Bad value for 'fd' 23:43:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x800300}, 0x0) 23:43:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1000000}, 0x0) 23:43:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x500000000000000}, 0x0) [ 1413.723743][T28758] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1413.734153][T28763] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1413.742583][T28758] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1413.857366][T28756] loop2: p1 p3 p4 [ 1413.867788][T28756] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1413.880205][T28756] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1413.889864][T28756] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1413.898733][T28768] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1413.901128][T28768] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1413.998420][T28758] loop1: p1 p3 p4 [ 1414.002294][ T148] loop2: p1 p3 p4 [ 1414.002994][T28758] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1414.006369][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1414.021224][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1414.021354][T28758] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1414.033401][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1414.036421][T28758] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:14 executing program 3: syz_read_part_table(0x0, 0xa002, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x2000000}, 0x0) 23:43:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x600000000000000}, 0x0) 23:43:14 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000040a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:14 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800001f0000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:14 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x3000000}, 0x0) 23:43:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x800000000000000}, 0x0) [ 1414.451449][T28787] loop2: p1 < > p3 p4 [ 1414.457940][T28787] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1414.509602][T28787] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1414.560474][T28789] loop1: p1 p3 p4 [ 1414.582310][T28789] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1414.641235][T28799] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1414.650172][T28801] fuse: Bad value for 'fd' 23:43:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x4000000}, 0x0) 23:43:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x900000000000000}, 0x0) [ 1414.736996][T28789] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1414.745292][T28789] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:14 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x5000000}, 0x0) 23:43:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xa00000000000000}, 0x0) [ 1414.877668][T28793] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1414.879477][T28793] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1414.984037][T28787] loop2: p1 < > p3 p4 [ 1414.990354][T28787] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1414.998658][T28787] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1415.200976][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1415.202146][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x6000000}, 0x0) 23:43:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xb00000000000000}, 0x0) 23:43:15 executing program 3: syz_read_part_table(0x0, 0xa101, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:15 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000200000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:15 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000050a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:15 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4c", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x8000000}, 0x0) 23:43:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1000000000000000}, 0x0) [ 1415.487284][T28820] loop2: p1 < > p3 p4 [ 1415.492220][T28820] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1415.672863][T28832] fuse: Bad value for 'fd' 23:43:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x9000000}, 0x0) 23:43:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1100000000000000}, 0x0) [ 1415.713130][T28823] loop1: p1 p3 p4 [ 1415.717717][T28831] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1415.725838][T28823] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1415.726272][T28820] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1415.737928][T28823] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1415.748399][T28823] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xa000000}, 0x0) 23:43:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1200000000000000}, 0x0) 23:43:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xb000000}, 0x0) 23:43:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1300000000000000}, 0x0) [ 1415.869938][T28820] loop2: p1 < > p3 p4 [ 1415.885927][T28820] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1415.897832][T28820] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1415.927112][T28823] loop1: p1 p3 p4 [ 1415.931026][T28823] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1415.945756][T28823] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1415.970008][T28823] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1415.982332][ T148] loop1: p1 p3 p4 [ 1415.986261][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1416.000925][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1416.008638][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1416.070330][T28843] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1416.071941][T28843] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1416.356078][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1416.357732][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:16 executing program 3: syz_read_part_table(0x0, 0xa102, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x10000000}, 0x0) 23:43:16 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000060a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1400000000000000}, 0x0) 23:43:16 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000260000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:16 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x4000000000000000}, 0x0) 23:43:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x11000000}, 0x0) [ 1416.667364][T28855] loop2: p1 p3 p4 [ 1416.675529][T28855] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1416.685216][T28861] loop1: p1 p3 p4 [ 1416.685762][T28855] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1416.692130][T28861] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1416.703419][T28855] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1416.823933][T28871] fuse: Bad value for 'fd' [ 1416.955672][T28861] loop1: p3 size 1912633224 extends beyond EOD, truncated 23:43:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x12000000}, 0x0) 23:43:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x8000000000000000}, 0x0) [ 1416.998485][T28861] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:16 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x13000000}, 0x0) 23:43:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x9900000000000000}, 0x0) [ 1417.100719][T28855] loop2: p1 p3 p4 [ 1417.104641][T28855] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1417.113152][T28855] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1417.122624][T28855] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1417.162526][T28861] loop1: p1 p3 p4 [ 1417.166340][T28861] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1417.174642][T28861] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1417.182807][T28861] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1417.208091][T28870] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1417.209175][T28870] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1417.324451][ T148] loop1: p1 p3 p4 [ 1417.328659][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1417.337449][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1417.351880][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:17 executing program 3: syz_read_part_table(0x0, 0xa202, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:17 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000070a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x14000000}, 0x0) 23:43:17 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080005300000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 23:43:17 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xeaffffff00000000}, 0x0) 23:43:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x40000000}, 0x0) [ 1417.660223][T28893] loop1: p1 p3 p4 [ 1417.664327][T28893] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1417.672495][T28893] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1417.680801][T28893] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1417.876233][T28903] fuse: Bad value for 'fd' [ 1417.885998][T28897] loop2: p1 p3 p4 [ 1417.908420][T28897] loop2: p1 size 78398975 extends beyond EOD, truncated 23:43:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xefffffff00000000}, 0x0) 23:43:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x9effffff}, 0x0) [ 1417.926633][T28902] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1417.935412][T28897] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1417.944360][T28897] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 23:43:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xd2010000}, 0x0) [ 1418.190573][T28900] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1418.193024][T28900] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1418.440101][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1418.441071][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:18 executing program 3: syz_read_part_table(0x0, 0xa302, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xfeffffff00000000}, 0x0) 23:43:18 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800003f0000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:18 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000080a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xeaffffff}, 0x0) 23:43:18 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 23:43:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xefffffff}, 0x0) 23:43:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xf0ffffff}, 0x0) 23:43:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xffffffff00000000}, 0x0) [ 1418.998579][T28927] loop2: p1 p3 p4 [ 1418.998636][T28937] fuse: Bad value for 'fd' [ 1419.002635][T28927] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1419.027725][T28927] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1419.038589][T28927] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 23:43:18 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xfeffffff}, 0x0) [ 1419.056774][T28936] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1419.068102][T28928] loop1: p1 p3 p4 [ 1419.074169][T28928] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1419.083659][T28928] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1419.092957][T28928] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1419.147640][T28927] loop2: p1 p3 p4 [ 1419.152228][T28927] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1419.161054][T28927] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1419.169706][T28927] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1419.226695][T28928] loop1: p1 p3 p4 [ 1419.230586][T28928] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1419.238688][T28928] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1419.246866][T28928] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1419.437782][T28946] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1419.438893][T28946] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1419.701420][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1419.702359][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:19 executing program 3: syz_read_part_table(0x0, 0xa402, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x2}, 0x0) 23:43:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xffffff7f}, 0x0) 23:43:19 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000090a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:19 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000400000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:19 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x3}, 0x0) 23:43:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xffffff9e}, 0x0) [ 1420.008014][T28958] loop2: p1 p3 p4 [ 1420.012345][T28958] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1420.025190][T28958] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1420.099247][T28958] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1420.168097][T28960] loop1: p1 p3 p4 [ 1420.173199][T28960] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1420.207146][T28970] fuse: Bad value for 'fd' 23:43:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xffffffea}, 0x0) 23:43:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) 23:43:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x0) 23:43:20 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xffffffef}, 0x0) [ 1420.273850][T28960] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1420.284457][T28960] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1420.292280][T28969] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1420.381249][ T95] print_req_error: 15 callbacks suppressed [ 1420.381260][ T95] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1420.398946][ T95] buffer_io_error: 9 callbacks suppressed [ 1420.398954][ T95] Buffer I/O error on dev loop1, logical block 0, async page read [ 1420.436589][ T119] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1420.447731][ T119] Buffer I/O error on dev loop1, logical block 0, async page read [ 1420.455570][ T148] loop1: unable to read partition table [ 1420.537167][T28960] loop1: p1 p3 p4 [ 1420.541010][T28960] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1420.548987][T28960] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1420.557046][T28960] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1420.587374][T28980] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1420.588477][T28980] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1420.882900][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1420.883886][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:21 executing program 3: syz_read_part_table(0x0, 0xa502, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xfffffff0}, 0x0) 23:43:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x6}, 0x0) 23:43:21 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000a0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:21 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080004800000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:21 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) 23:43:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xfffffffe}, 0x0) [ 1421.218707][T28993] loop2: p1[EZD] p3 p4 [ 1421.223193][T28993] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1421.257503][T28993] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1421.341944][T28993] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1421.405637][T29006] fuse: Bad value for 'fd' [ 1421.436715][T28994] loop1: p1 p3 p4 [ 1421.441429][T28994] loop1: p1 size 78398975 extends beyond EOD, truncated 23:43:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x80030000000000}, 0x0) 23:43:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x9}, 0x0) 23:43:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x100000000000000}, 0x0) [ 1421.487796][T29001] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1421.499734][T28994] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1421.510837][T28994] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xa}, 0x0) [ 1421.598341][T28993] loop2: p1[EZD] p3 p4 [ 1421.606566][T28993] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1421.614260][T28993] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1421.623455][T28993] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1421.645629][T28994] loop1: p1 p3 p4 [ 1421.649527][T28994] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1421.658267][T28994] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1421.666611][T28994] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1421.692212][ T148] loop1: p1 p3 p4 [ 1421.696499][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1421.704007][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1421.712057][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1421.747532][T29002] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1421.748586][T29002] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:22 executing program 3: syz_read_part_table(0x0, 0xb101, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x200000000000000}, 0x0) 23:43:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xb}, 0x0) 23:43:22 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000b0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:22 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800fdef0000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:22 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 23:43:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x300000000000000}, 0x0) [ 1422.236677][T29029] loop2: p1[EZD] p3 p4 [ 1422.240999][T29029] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1422.351952][T29036] fuse: Bad value for 'fd' [ 1422.382490][T29029] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1422.455850][T29029] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x11}, 0x0) [ 1422.527536][T29027] loop1: p1 p3 p4 [ 1422.537262][T29027] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1422.558277][T29027] loop1: p3 size 1912633224 extends beyond EOD, truncated 23:43:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x400000000000000}, 0x0) 23:43:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x12}, 0x0) [ 1422.581093][T29027] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1422.607193][T29029] loop2: p1[EZD] p3 p4 [ 1422.611495][T29029] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1422.620158][T29029] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:43:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x500000000000000}, 0x0) [ 1422.628839][T29029] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1422.708149][T29031] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1422.709084][T29031] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1422.876853][T29027] loop1: p1 p3 p4 [ 1422.880675][T29027] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1422.889466][T29027] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1422.897860][T29027] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1423.077261][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1423.078487][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:23 executing program 3: syz_read_part_table(0x0, 0xb201, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x13}, 0x0) 23:43:23 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000c0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x600000000000000}, 0x0) 23:43:23 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800effd0000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:23 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x0) 23:43:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x800000000000000}, 0x0) [ 1423.346738][T29059] loop2: p1 p3 p4 [ 1423.350601][T29059] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1423.602681][T29067] fuse: Bad value for 'fd' [ 1423.602824][T29066] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1423.620369][T29060] loop1: p1 p3 p4 [ 1423.628077][T29060] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1423.631455][T29059] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1423.640451][T29060] loop1: p3 size 1912633224 extends beyond EOD, truncated 23:43:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x900000000000000}, 0x0) 23:43:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x99}, 0x0) [ 1423.652108][T29060] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1423.681547][T29059] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xa00000000000000}, 0x0) 23:43:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x300}, 0x0) [ 1423.826776][T29059] loop2: p1 p3 p4 [ 1423.830741][T29059] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1423.838783][T29059] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1423.846906][T29059] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1423.857977][T29074] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1423.859198][T29074] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1424.160150][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1424.161055][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:24 executing program 3: syz_read_part_table(0x0, 0xb301, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:24 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000800000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xb00000000000000}, 0x0) 23:43:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x500}, 0x0) 23:43:24 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000d0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:24 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1000000000000000}, 0x0) 23:43:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x600}, 0x0) [ 1424.473283][T29094] loop1: p1 p3 p4 [ 1424.477784][T29094] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1424.486720][T29094] loop1: p3 size 1912633224 extends beyond EOD, truncated 23:43:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1100000000000000}, 0x0) 23:43:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x900}, 0x0) [ 1424.632000][T29094] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1424.656669][T29093] loop2: p1 p3 p4 [ 1424.671143][T29103] fuse: Bad value for 'fd' [ 1424.691467][T29093] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1424.708370][T29102] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1424.750210][T29093] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1424.769831][T29093] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1200000000000000}, 0x0) 23:43:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xa00}, 0x0) [ 1424.957636][T29093] loop2: p1 p3 p4 [ 1424.961711][T29093] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1424.974687][T29093] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1424.982654][T29093] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1425.012672][T29094] loop1: p1 p3 p4 [ 1425.016892][T29094] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1425.024405][T29094] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1425.032549][T29094] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1425.097836][T29111] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1425.098796][T29111] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1425.389123][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1425.390025][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:25 executing program 3: syz_read_part_table(0x0, 0xbc02, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xb00}, 0x0) 23:43:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1300000000000000}, 0x0) 23:43:25 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000e0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:25 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080040000800000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:25 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x1400000000000000}, 0x0) 23:43:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x1100}, 0x0) 23:43:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x4000000000000000}, 0x0) [ 1425.687055][T29127] loop1: p1 p3 p4 [ 1425.690972][T29127] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1425.700695][T29127] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1425.709985][T29127] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1425.729453][T29129] loop2: p1 p3 p4 [ 1425.782578][T29129] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1425.844966][T29129] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1425.911755][T29129] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:25 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x8000000000000000}, 0x0) 23:43:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x1200}, 0x0) [ 1425.989654][T29134] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1425.990191][T29138] fuse: Bad value for 'fd' 23:43:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x1300}, 0x0) [ 1426.212597][T29129] loop2: p1 p3 p4 [ 1426.217085][T29129] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1426.231259][T29129] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1426.239864][T29127] loop1: p1 p3 p4 [ 1426.245233][T29127] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1426.251908][T29129] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1426.259389][T29127] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1426.268442][T29127] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1426.292480][T29142] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1426.293933][T29142] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1426.487803][ T148] loop1: p1 p3 p4 [ 1426.491625][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1426.502528][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1426.510635][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:26 executing program 3: syz_read_part_table(0x0, 0xbd02, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x1400}, 0x0) 23:43:26 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000100a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:26 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000002000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 23:43:26 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 23:43:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xd201000000000000}, 0x0) [ 1426.796050][T29158] loop2: p1 p3 p4 [ 1426.799916][T29158] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1426.818267][T29158] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1426.858568][T29161] loop1: p1 p3 p4 [ 1426.900602][T29161] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1426.976838][T29158] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1427.006187][T29174] fuse: Bad value for 'fd' [ 1427.023469][T29170] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:43:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x9900}, 0x0) 23:43:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xeaffffff00000000}, 0x0) 23:43:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x38000}, 0x0) [ 1427.108709][T29161] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1427.125423][T29161] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x800300}, 0x0) [ 1427.169906][ T148] loop1: p1 p3 p4 [ 1427.174115][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1427.186828][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1427.197469][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1427.216712][T29158] loop2: p1 p3 p4 [ 1427.221120][T29158] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1427.229644][T29158] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1427.237785][T29158] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1427.247040][T29162] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1427.248230][T29162] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1427.541217][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1427.542248][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:27 executing program 3: syz_read_part_table(0x0, 0xbe02, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xefffffff00000000}, 0x0) 23:43:27 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008007ffff000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:27 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000110a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 23:43:27 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 23:43:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 1428.047928][T29200] fuse: Bad value for 'fd' [ 1428.066363][T29193] loop2: p1 p3 p4 [ 1428.070682][T29193] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1428.078696][T29199] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1428.090284][T29193] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:43:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xfeffffff00000000}, 0x0) 23:43:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 1428.105525][T29193] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1428.119213][T29196] loop1: p1 p3 p4 [ 1428.123152][T29196] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1428.138107][T29196] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1428.149504][T29196] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 23:43:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 1428.178456][T29193] loop2: p1 p3 p4 [ 1428.182768][T29193] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1428.191140][T29193] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1428.200632][T29193] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1428.435208][T29213] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1428.436310][T29213] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1428.718044][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1428.718995][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:28 executing program 3: syz_read_part_table(0x0, 0xbf02, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 23:43:28 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000001000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:28 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000120a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) 23:43:28 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81b53df8", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 23:43:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) [ 1429.025910][T29225] loop1: p1 p3 p4 [ 1429.030000][T29225] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1429.049751][T29225] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1429.057483][T29229] loop2: p1 p3 p4 [ 1429.061414][T29229] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1429.168941][T29229] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1429.176641][T29225] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1429.221477][T29229] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1429.243441][T29243] fuse: Bad value for 'fd' 23:43:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x2}, 0x0) 23:43:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) [ 1429.331397][T29238] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:43:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) 23:43:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x3}, 0x0) [ 1429.546689][T29225] loop1: p1 p3 p4 [ 1429.550737][T29225] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1429.558598][T29225] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1429.566375][T29225] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1429.613217][T29240] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1429.614604][T29240] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1429.922013][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1429.922940][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:30 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000140a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) 23:43:30 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080004024a01000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:30 executing program 3: syz_read_part_table(0x0, 0xc000, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) 23:43:30 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xb000000}, 0x0) 23:43:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x0) [ 1430.176896][T29259] loop2: p1 < > p3 p4 [ 1430.184436][T29259] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1430.199882][T29259] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1430.208987][T29265] loop1: p1 p3 p4 [ 1430.218230][T29265] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1430.337328][T29265] loop1: p3 size 1912633224 extends beyond EOD, truncated 23:43:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) [ 1430.381558][T29275] fuse: Bad value for 'fd' 23:43:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x6}, 0x0) [ 1430.435538][T29265] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x11000000}, 0x0) [ 1430.479484][T29259] loop2: p1 < > p3 p4 [ 1430.484784][T29259] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1430.493305][T29259] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x8}, 0x0) 23:43:30 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000160a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x12000000}, 0x0) [ 1430.599260][T29265] loop1: p1 p3 p4 [ 1430.614483][T29265] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1430.636347][T29265] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1430.646591][T29265] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:30 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000002000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1430.720817][ T148] loop1: p1 p3 p4 [ 1430.725985][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1430.733665][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1430.742251][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1430.788710][T29286] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1430.789751][T29286] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1430.946123][T29292] loop2: p1 < > p3 p4 [ 1430.951463][T29292] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1430.960118][T29292] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1431.137008][T29296] loop1: p1 p3 p4 [ 1431.141170][T29296] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1431.149132][T29296] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1431.157144][T29296] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x13000000}, 0x0) 23:43:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x9}, 0x0) 23:43:31 executing program 3: syz_read_part_table(0x0, 0xc001, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:31 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000250a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:31 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000402000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:31 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1431.261557][T29296] loop1: p1 p3 p4 [ 1431.268856][T29296] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1431.276438][T29296] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1431.284536][T29296] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x14000000}, 0x0) 23:43:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xa}, 0x0) [ 1431.390614][T29308] loop2: p1 < > p3 p4 [ 1431.397587][T29308] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1431.406260][T29308] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1431.590913][T29318] fuse: Bad value for 'fd' [ 1431.636891][T29311] loop1: p1 p3 p4 [ 1431.641695][T29311] loop1: p1 size 78398975 extends beyond EOD, truncated 23:43:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) 23:43:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xb}, 0x0) [ 1431.681927][T29311] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1431.690941][T29311] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1431.716285][T29315] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:43:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x99000000}, 0x0) 23:43:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 23:43:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 1431.839400][T29310] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1431.845387][T29310] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xeaffffff}, 0x0) [ 1431.950544][T29308] loop2: p1 < > p3 p4 [ 1431.960151][T29308] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1431.975796][T29308] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1432.159660][T12972] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1432.161520][T13567] blk_update_request: I/O error, dev loop3, sector 33920 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1432.171689][T13947] blk_update_request: I/O error, dev loop3, sector 233 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1432.212246][ T119] blk_update_request: I/O error, dev loop3, sector 33920 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1432.225007][ T119] Buffer I/O error on dev loop3p4, logical block 33920, async page read [ 1432.233507][ T119] blk_update_request: I/O error, dev loop3, sector 233 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1432.245540][ T119] Buffer I/O error on dev loop3p3, logical block 1, async page read [ 1432.253653][ T119] blk_update_request: I/O error, dev loop3, sector 33921 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1432.275516][ T119] Buffer I/O error on dev loop3p4, logical block 33921, async page read [ 1432.284057][ T119] blk_update_request: I/O error, dev loop3, sector 33922 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1432.295360][T29310] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1432.305422][ T119] Buffer I/O error on dev loop3p4, logical block 33922, async page read [ 1432.313848][ T119] blk_update_request: I/O error, dev loop3, sector 33923 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1432.325214][ T119] Buffer I/O error on dev loop3p4, logical block 33923, async page read [ 1432.333639][ T119] blk_update_request: I/O error, dev loop3, sector 33924 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1432.345041][ T119] Buffer I/O error on dev loop3p4, logical block 33924, async page read 23:43:32 executing program 3: syz_read_part_table(0x0, 0xc002, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x11}, 0x0) 23:43:32 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000003000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:32 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000480a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xefffffff}, 0x0) 23:43:32 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x12}, 0x0) 23:43:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) [ 1432.353468][ T119] blk_update_request: I/O error, dev loop3, sector 33925 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1432.367836][ T119] Buffer I/O error on dev loop3p4, logical block 33925, async page read [ 1432.376372][ T119] Buffer I/O error on dev loop3p4, logical block 33926, async page read [ 1432.384953][ T119] Buffer I/O error on dev loop3p4, logical block 33927, async page read [ 1432.393606][ T119] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1432.436385][T29344] loop2: p1 p3 p4 [ 1432.440256][T29344] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1432.451980][T29344] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1432.462448][T29344] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1432.652087][T29356] fuse: Bad value for 'fd' [ 1432.716381][T29346] loop1: p1 p3 p4 [ 1432.733820][T29346] loop1: p1 size 78398975 extends beyond EOD, truncated 23:43:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x13}, 0x0) 23:43:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xfeffffff}, 0x0) 23:43:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x0) [ 1432.781354][T29346] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1432.802253][T29346] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1432.857521][T29344] loop2: p1 p3 p4 [ 1432.863472][ T148] loop1: p1 p3 p4 [ 1432.872849][T29344] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1432.876769][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1432.883355][T29344] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1432.895039][T29344] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) [ 1432.902703][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1432.911683][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1433.031822][T29353] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1433.032866][T29353] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x1d2}, 0x0) 23:43:33 executing program 3: syz_read_part_table(0x0, 0xc003, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 23:43:33 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000004000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:33 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500004c0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:33 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x300}, 0x0) 23:43:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xffffffea}, 0x0) [ 1433.523478][T29381] loop1: p1 p3 p4 [ 1433.527505][T29381] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1433.543559][T29381] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1433.556677][T29381] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1433.623824][T29383] loop2: p1[EZD] p3 p4 [ 1433.642955][T29383] loop2: p1 size 78398975 extends beyond EOD, truncated 23:43:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x500}, 0x0) [ 1433.736150][T29392] fuse: Bad value for 'fd' 23:43:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xffffffef}, 0x0) [ 1433.799175][T29383] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1433.815589][T29391] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1433.826054][T29383] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:33 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x600}, 0x0) 23:43:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 23:43:33 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800014a0204000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1433.943265][T29384] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1433.944303][T29384] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1434.122253][T29404] loop1: p1 p3 p4 [ 1434.134903][T29404] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1434.143713][T29404] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1434.152338][T29404] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1434.246996][T29404] loop1: p1 p3 p4 [ 1434.254925][T29404] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1434.278981][T29404] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1434.289164][T29404] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:34 executing program 3: syz_read_part_table(0x0, 0xc103, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:34 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500005a0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xfffffffe}, 0x0) 23:43:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x900}, 0x0) 23:43:34 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000005000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:34 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1434.427699][T11376] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 1434.429712][T29384] __loop_clr_fd: partition scan of loop3 failed (rc=-16) 23:43:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 23:43:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x2) [ 1434.547534][T29414] loop1: p1 p3 p4 [ 1434.551459][T29414] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1434.577414][T29414] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1434.679184][T29414] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1434.776115][T29426] fuse: Bad value for 'fd' [ 1434.794231][T29418] loop2: p1 p3 p4 [ 1434.804541][T29418] loop2: p1 size 78398975 extends beyond EOD, truncated 23:43:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xb00}, 0x0) 23:43:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x3) [ 1434.864373][T29424] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1434.892219][T29418] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:43:34 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x1100}, 0x0) [ 1434.919766][T29418] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x4) [ 1434.985943][T29414] loop1: p1 p3 p4 [ 1434.990087][T29414] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1435.006282][T29414] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1435.045147][T29414] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1435.076116][T29418] loop2: p1 p3 p4 [ 1435.080628][T29418] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1435.104628][T29418] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1435.123498][T29418] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1435.346819][T29430] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1435.348264][T29430] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:35 executing program 3: syz_read_part_table(0x0, 0xca02, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x5) 23:43:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x1200}, 0x0) 23:43:35 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000006000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:35 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000600a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:35 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 23:43:35 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x1300}, 0x0) 23:43:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x6) [ 1435.795541][T29448] loop2: p1 p3 p4 [ 1435.799574][T29448] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1435.810317][T29448] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1435.819558][T29448] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1435.995372][T29449] loop1: p1 p3 p4 [ 1436.010196][T29449] loop1: p1 size 78398975 extends beyond EOD, truncated 23:43:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x1400}, 0x0) 23:43:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x8) [ 1436.110575][T29449] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1436.129099][T29449] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x0) [ 1436.163220][T29448] loop2: p1 p3 p4 [ 1436.167233][T29448] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1436.181554][T29448] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1436.195728][T29448] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x9) [ 1436.214222][T29449] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 1436.300525][T29453] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1436.302246][T29453] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:36 executing program 3: syz_read_part_table(0x0, 0xcb02, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:36 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000680a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xd201}, 0x0) 23:43:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xa) 23:43:36 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000406000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:36 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 23:43:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xb) 23:43:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x38000}, 0x0) [ 1436.822441][T29483] loop1: p1 p3 p4 [ 1436.826893][T29483] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1436.853741][T29483] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1436.975895][T29490] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1436.990411][T29484] loop2: p1 p3 p4 [ 1437.004731][T29484] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1437.014773][T29483] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1437.014806][T29484] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:43:36 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x800300}, 0x0) 23:43:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x10) [ 1437.048836][T29484] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 23:43:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x11) [ 1437.106529][T29483] loop1: p1 p3 p4 [ 1437.110806][T29483] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1437.126031][T29483] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1437.141832][T29483] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1437.218842][T29484] loop2: p1 p3 p4 [ 1437.222800][T29484] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1437.238340][T29484] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1437.251286][T29484] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1437.279474][ T148] loop1: p1 p3 p4 [ 1437.284383][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1437.292682][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1437.301200][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1437.326731][T29502] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1437.327633][T29502] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:37 executing program 3: syz_read_part_table(0x0, 0xd401, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 23:43:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x12) 23:43:37 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000007000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:37 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500006c0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:37 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 23:43:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x13) 23:43:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 1437.812006][T29515] loop1: p1 p3 p4 [ 1437.817817][T29515] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1437.831532][T29515] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1437.866991][T29515] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:37 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 1438.079391][T29518] loop2: p1[EZD] p3 p4 23:43:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x14) [ 1438.113465][T29518] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1438.133265][T29518] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1438.146216][T29518] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) [ 1438.176570][T29527] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1438.215870][T29515] loop1: p1 p3 p4 [ 1438.219748][T29515] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1438.227489][T29515] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1438.235415][T29515] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x99) [ 1438.379347][T29521] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1438.381345][T29521] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:38 executing program 3: syz_read_part_table(0x0, 0xd500, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:38 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000008000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 23:43:38 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000740a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x300) 23:43:38 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) 23:43:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x500) 23:43:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) [ 1438.746590][T29546] loop1: p1 p3 p4 [ 1438.750525][T29546] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1438.762742][T29546] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1438.772266][T29546] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1438.790285][T29549] loop2: p1 p3 p4 [ 1438.820426][T29549] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1438.856969][T29549] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1438.900363][T29559] fuse: Bad value for 'fd' 23:43:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) [ 1438.980340][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1439.000646][ T148] loop3: p4 size 3657465856 extends beyond EOD, [ 1439.028967][T29549] loop2: p4 size 3657465856 extends beyond EOD, 23:43:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x600) 23:43:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xb000000}, 0x0) [ 1439.094899][ T148] truncated [ 1439.097151][T29549] truncated [ 1439.125757][T29546] loop1: p1 p3 p4 [ 1439.129722][T29546] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1439.140011][T29546] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1439.150074][T29546] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1439.236123][T29549] loop2: p1 p3 p4 [ 1439.240715][T29549] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1439.249015][T29549] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1439.257692][T29549] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1439.487924][T29573] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1439.489997][T29573] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1439.741396][ T148] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1439.742317][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x900) 23:43:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 23:43:39 executing program 3: syz_read_part_table(0x0, 0xd501, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:39 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000009000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:39 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500007a0a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:39 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x11000000}, 0x0) 23:43:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xa00) [ 1440.055287][T29581] loop2: p1 p3 p4 [ 1440.059147][T29581] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1440.123755][T29581] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1440.133848][T29581] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x12000000}, 0x0) [ 1440.293051][T29589] fuse: Bad value for 'fd' [ 1440.300458][T29583] loop1: p1 p3 p4 [ 1440.315072][T29583] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1440.328473][T29583] loop1: p3 size 1912633224 extends beyond EOD, truncated 23:43:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xb00) 23:43:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1100) [ 1440.337012][T29583] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1440.347151][T29588] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:43:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x13000000}, 0x0) 23:43:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1200) 23:43:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x14000000}, 0x0) [ 1440.479056][T29581] loop2: p1 p3 p4 [ 1440.483539][T29581] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1440.504602][T29581] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1440.513565][T29581] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1440.535077][T29583] loop1: p1 p3 p4 [ 1440.539148][T29583] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1440.547655][T29583] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1440.555772][T29583] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1440.616159][T29599] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1440.617264][T29599] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:40 executing program 3: syz_read_part_table(0x0, 0xe401, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1300) 23:43:40 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000001f000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:40 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) 23:43:40 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008000000000a000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:40 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1400) 23:43:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) [ 1441.141517][T29622] loop2: p1 p3 p4 [ 1441.145505][T29622] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1441.154128][T29622] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1441.169279][T29622] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1441.295435][T29618] loop1: p1 p3 p4 [ 1441.314866][T29628] fuse: Bad value for 'fd' [ 1441.339990][T29618] loop1: p1 size 78398975 extends beyond EOD, truncated 23:43:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x4000) [ 1441.409706][T29618] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1441.417859][T29618] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1441.435434][T29627] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:43:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x9900) 23:43:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xd2010000}, 0x0) 23:43:41 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008000000000b000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1441.517109][T29622] loop2: p1 p3 p4 [ 1441.524844][T29622] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1441.539045][T29622] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1441.552871][T29622] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1441.575584][T29625] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1441.579889][T29625] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1441.757300][T29643] loop1: p1 p3 p4 [ 1441.762991][T29643] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1441.776519][T29643] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1441.784513][T29643] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:41 executing program 3: syz_read_part_table(0x0, 0xe501, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x38000) 23:43:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xeaffffff}, 0x0) 23:43:41 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000025000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:41 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008000000000c000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:41 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x800300) 23:43:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xefffffff}, 0x0) [ 1442.146839][T29653] loop2: p1[EZD] p3 p4 [ 1442.184186][T29653] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1442.270167][T29651] loop1: p1 p3 p4 [ 1442.274385][T29653] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1442.293818][T29651] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1442.320993][T29667] fuse: Bad value for 'fd' [ 1442.344000][T29663] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1442.372184][T29653] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 23:43:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1000000) 23:43:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xfeffffff}, 0x0) 23:43:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x2000000) [ 1442.411161][T29651] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1442.439869][T29651] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1442.589311][T29653] loop2: p1[EZD] p3 p4 [ 1442.593743][T29653] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1442.602355][T29653] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1442.611404][T29653] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1442.643738][T29665] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1442.646186][T29665] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:43 executing program 3: syz_read_part_table(0x0, 0xf200, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 23:43:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x3000000) 23:43:43 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008000000000d000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:43 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500006a3b000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:43 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x4000000) 23:43:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) [ 1443.185114][T29687] loop1: p1 p3 p4 [ 1443.189122][T29687] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1443.198520][T29687] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1443.204876][T29686] loop2: p1 p3 p4 [ 1443.209471][T29686] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1443.234943][T29687] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1443.387143][T29697] fuse: Bad value for 'fd' [ 1443.418918][T29695] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1443.443673][T29686] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:43:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x5000000) 23:43:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xffffffea}, 0x0) [ 1443.503718][T29686] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x6000000) 23:43:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xffffffef}, 0x0) [ 1443.637744][T29686] loop2: p1 p3 p4 [ 1443.641927][T29686] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1443.655560][T29686] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1443.663396][T29686] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1443.675858][T29691] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1443.677129][T29691] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1443.775832][T29687] loop1: p1 p3 p4 [ 1443.780831][T29687] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1443.788463][ T148] loop2: p1 p3 p4 [ 1443.792275][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1443.800537][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1443.808135][T29687] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1443.815979][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1443.823582][T29687] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:43 executing program 3: syz_read_part_table(0x0, 0xfffff, &(0x7f0000000000)=[{&(0x7f0000000040)="0201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x8000000) 23:43:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 23:43:43 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500006a3f000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:43 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008000000000e000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:43 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x9000000) 23:43:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0xfffffffe}, 0x0) [ 1444.134771][T29721] loop1: p1 p3 p4 [ 1444.138694][T29721] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1444.154096][T29721] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1444.336540][T29733] fuse: Bad value for 'fd' 23:43:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x2) 23:43:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xa000000) [ 1444.478226][T29721] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1444.494783][T29722] loop2: p1 p3 p4 [ 1444.499899][T29722] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1444.505821][T29732] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1444.510497][T29722] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:43:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x3) [ 1444.531214][T29722] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xb000000) [ 1444.709459][T29722] loop2: p1 p3 p4 [ 1444.730532][T29722] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1444.753131][T29722] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1444.764686][T29722] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:44 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0301051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x4) 23:43:44 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000010000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x10000000) 23:43:44 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000040000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:44 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x5) 23:43:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x11000000) [ 1445.075552][T29753] loop1: p1 p3 p4 [ 1445.079441][T29753] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1445.087566][T29753] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1445.137402][T29753] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1445.267288][T29764] fuse: Bad value for 'fd' 23:43:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x12000000) 23:43:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x6) 23:43:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x8) [ 1445.416402][T29759] loop2: p1 < > p3 p4 [ 1445.422540][T29760] loop3: p1 < > p3 p4 [ 1445.426037][T29759] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1445.440917][T29760] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1445.447458][T29759] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1445.452852][T29760] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x13000000) [ 1445.473799][T29753] loop1: p1 p3 p4 [ 1445.482949][T29753] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1445.492044][T29753] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1445.500201][T29753] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1445.574915][T29760] loop3: p1 < > p3 p4 [ 1445.579866][T29760] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1445.590952][T29760] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:45 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0401051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:45 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000011000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x9) 23:43:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x14000000) 23:43:45 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500003340000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:45 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xa) 23:43:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x40000000) 23:43:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xb) 23:43:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x99000000) [ 1445.894990][T29791] loop1: p1 p3 p4 [ 1445.898954][T29791] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1445.908217][T29791] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1445.916842][T29791] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1445.975468][T29789] loop2: p1 p3 p4 [ 1445.979300][T29789] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1445.987710][T29789] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1445.995836][T29789] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1446.014140][T29787] loop3: p1 < > p3 p4 23:43:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x10) 23:43:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x9effffff) [ 1446.019790][T29787] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1446.032452][T29787] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1446.058517][T13947] print_req_error: 54 callbacks suppressed [ 1446.058529][T13947] blk_update_request: I/O error, dev loop1, sector 42112 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1446.076350][T29791] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 1446.083950][T12972] blk_update_request: I/O error, dev loop1, sector 42081 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1446.093708][ T119] blk_update_request: I/O error, dev loop1, sector 42112 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1446.107195][ T119] buffer_io_error: 44 callbacks suppressed [ 1446.107202][ T119] Buffer I/O error on dev loop1p4, logical block 42112, async page read [ 1446.121586][ T119] blk_update_request: I/O error, dev loop1, sector 42113 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1446.132971][ T119] Buffer I/O error on dev loop1p4, logical block 42113, async page read [ 1446.141458][ T119] blk_update_request: I/O error, dev loop1, sector 42114 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1446.152769][ T119] Buffer I/O error on dev loop1p4, logical block 42114, async page read [ 1446.161213][ T119] blk_update_request: I/O error, dev loop1, sector 42115 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1446.172521][ T119] Buffer I/O error on dev loop1p4, logical block 42115, async page read [ 1446.181037][ T119] blk_update_request: I/O error, dev loop1, sector 42116 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1446.192311][ T119] Buffer I/O error on dev loop1p4, logical block 42116, async page read [ 1446.200748][ T119] blk_update_request: I/O error, dev loop1, sector 42117 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1446.212029][ T119] Buffer I/O error on dev loop1p4, logical block 42117, async page read [ 1446.220454][ T119] blk_update_request: I/O error, dev loop1, sector 42118 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1446.231748][ T119] Buffer I/O error on dev loop1p4, logical block 42118, async page read [ 1446.240168][ T119] blk_update_request: I/O error, dev loop1, sector 42119 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1446.251410][ T119] Buffer I/O error on dev loop1p4, logical block 42119, async page read [ 1446.259864][ T119] Buffer I/O error on dev loop1p3, logical block 5232, async page read [ 1446.273941][ T148] loop2: p1 p3 p4 [ 1446.278227][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1446.285842][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1446.293570][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1446.316757][T29787] loop3: p1 < > p3 p4 [ 1446.321477][T29787] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1446.329814][T29787] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1446.526891][T29812] fuse: Bad value for 'fd' 23:43:46 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0501051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:46 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000012000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x11) 23:43:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xeaffffff) 23:43:46 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500006a42000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1446.687177][T29821] loop1: p1 p3 p4 [ 1446.691160][T29821] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1446.699088][T29821] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1446.707063][T29821] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1446.726515][T29824] loop3: p1 < > p3 p4 [ 1446.731225][T29824] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1446.739191][T29824] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1446.785611][T29825] loop2: p1 p3 p4 [ 1446.790491][T29825] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1446.798696][T29825] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1446.806975][T29825] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1446.816714][ T148] loop2: p1 p3 p4 [ 1446.820611][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1446.828559][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1446.836603][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1446.906333][ T148] loop3: p1 < > p3 p4 [ 1446.911038][ T148] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1446.919480][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1446.928818][T29824] loop3: p1 < > p3 p4 [ 1446.933465][T29824] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1446.941429][T29824] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1447.019463][T29825] loop2: p1 p3 p4 [ 1447.023310][T29825] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1447.031438][T29825] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1447.039528][T29825] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x12) 23:43:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xefffffff) 23:43:47 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008000000001c000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:47 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0601051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:47 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:47 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105000003a7000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xf0ffffff) 23:43:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x13) [ 1447.138335][ T148] loop3: p1 < > p3 p4 [ 1447.145146][ T148] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1447.153131][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xfeffffff) 23:43:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x14) [ 1447.305399][T29835] loop1: p1 p3 p4 [ 1447.309215][T29835] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1447.317003][T29835] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1447.325046][T29835] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1447.346595][T29837] loop3: p1 < > p3 p4 23:43:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xffffff7f) 23:43:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1d2) [ 1447.351460][T29837] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1447.365021][T29837] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1447.651784][ T148] loop3: p1 < > p3 p4 [ 1447.652629][T29844] loop2: p1[EZD] p3 p4 [ 1447.659468][ T148] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1447.660430][T29844] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1447.670054][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1447.675664][T29859] fuse: Bad value for 'fd' [ 1447.689761][T29844] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1447.690972][T29835] loop1: p1 p3 p4 23:43:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x300) 23:43:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xffffff9e) [ 1447.701469][T29835] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1447.718960][T29844] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1447.730497][T29835] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1447.749394][T29835] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1447.764866][T29837] loop3: p1 < > p3 p4 [ 1447.770862][T29837] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1447.779502][T29837] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1447.902283][ T148] loop1: p1 p3 p4 [ 1447.906202][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1447.913550][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1447.921854][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:48 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0xfff4) connect$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x500) 23:43:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xffffffea) 23:43:48 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008000000001f000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:48 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0701051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:48 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105000007c8000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xffffffef) 23:43:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x600) [ 1448.326559][T29875] loop2: p1 p3 p4 [ 1448.337584][T29874] loop1: p1 p3 p4 [ 1448.345381][T29875] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1448.352551][T29874] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1448.363593][T29875] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:43:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x900) 23:43:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xfffffff0) [ 1448.372762][T29874] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1448.380876][T29873] loop3: p1 < > p3 p4 [ 1448.382448][T29875] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1448.386004][T29873] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1448.394343][T29874] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xfffffffe) 23:43:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xa00) [ 1448.422904][T29873] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1448.631955][T29893] fuse: Bad value for 'fd' [ 1448.766487][T29892] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1448.878861][T29875] loop2: p1 p3 p4 [ 1448.882805][T29875] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1448.900372][T29875] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1448.925124][T29875] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1448.986649][ T148] loop2: p1 p3 p4 [ 1448.990506][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1448.998672][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1449.006586][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:49 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0xfff4) connect$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xb00) 23:43:49 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000026000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:49 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0801051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x80030000000000) 23:43:49 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="020105000007cd000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1100) 23:43:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x100000000000000) [ 1449.295399][T29906] loop3: p1 < > p3 p4 [ 1449.300566][T29906] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1449.313166][T29906] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1200) 23:43:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x200000000000000) [ 1449.505148][T29909] loop1: p1 p3 p4 [ 1449.509805][T29909] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1449.526722][T29909] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1449.537937][T29909] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1449.557819][T29920] fuse: Bad value for 'fd' 23:43:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1300) 23:43:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x300000000000000) [ 1449.648070][T29908] loop2: p1 < > p3 p4 [ 1449.657561][T29908] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1449.670449][T29908] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1449.686819][T29921] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1449.724588][T29906] loop3: p1 < > p3 p4 [ 1449.733813][T29906] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1449.745755][T29906] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x400000000000000) 23:43:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1400) 23:43:50 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000530000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:50 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000ffff7f0000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:50 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0901051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:50 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0xfff4) connect$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x4000) 23:43:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x500000000000000) [ 1450.174806][T29940] loop1: p1 p3 p4 [ 1450.180165][T29940] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1450.188810][T29940] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1450.202323][T29940] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1450.224579][T29944] loop3: p1 < > p3 p4 [ 1450.230484][T29944] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1450.288968][T29944] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xd201) [ 1450.403040][T29953] fuse: Bad value for 'fd' 23:43:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x600000000000000) 23:43:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x38000) [ 1450.493435][T29942] loop2: p1 p3 p4 [ 1450.501453][T29942] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1450.516208][T29942] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1450.525063][T29942] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1450.559199][T29940] loop1: p1 p3 p4 [ 1450.561663][ T95] Buffer I/O error on dev loop3p4, logical block 33920, async page read [ 1450.564209][T29940] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1450.578884][T29944] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1450.593435][T29940] loop1: p3 size 1912633224 extends beyond EOD, truncated 23:43:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x800000000000000) 23:43:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x800300) 23:43:50 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf0008000000003f000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x900000000000000) [ 1450.605462][T29940] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1450.615572][T29944] loop3: p1 < > p3 p4 [ 1450.620485][T29944] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1450.629532][T29944] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:50 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0a01051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1000000) [ 1450.894411][T29969] loop1: p1 p3 p4 [ 1450.898361][T29969] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1450.907075][T29969] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1450.915082][T29969] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1450.945018][T29976] loop3: p1 < > p3 p4 [ 1450.949755][T29976] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1450.957823][T29976] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1450.967055][ T148] loop3: p1 < > p3 p4 [ 1450.971697][ T148] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1450.980154][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:50 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = openat(0xffffffffffffffff, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r4, &(0x7f0000004200)='t', 0xfff4) connect$packet(r4, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:50 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000002000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xa00000000000000) 23:43:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x2000000) 23:43:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xb00000000000000) 23:43:50 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x3000000) [ 1451.014360][T29969] loop1: p1 p3 p4 [ 1451.018300][T29969] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1451.033710][T29969] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1451.042281][T29969] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:51 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0f01051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:51 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000040000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x4000000) 23:43:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1000000000000000) 23:43:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x5000000) 23:43:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1100000000000000) [ 1451.191868][T29983] loop2: p1 p3 p4 [ 1451.196220][T29983] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1451.204644][T29983] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1451.212523][T29983] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1451.223016][ T148] loop2: p1 p3 p4 [ 1451.227347][T29997] loop3: p1 < > p3 p4 [ 1451.232078][ T148] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1451.234354][T29997] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1451.242204][ T148] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1451.249872][T29997] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1451.255124][ T148] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1451.377314][T29999] loop1: p1 p3 p4 [ 1451.398712][T29999] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1451.443024][T29999] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1451.492810][T30004] fuse: Bad value for 'fd' [ 1451.497837][T29999] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1451.616296][T29408] print_req_error: 10 callbacks suppressed [ 1451.616308][T29408] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1451.633459][T12972] blk_update_request: I/O error, dev loop3, sector 33889 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1451.633479][T29997] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1451.646459][ T95] blk_update_request: I/O error, dev loop3, sector 33889 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1451.663340][ T95] buffer_io_error: 7 callbacks suppressed [ 1451.663347][ T95] Buffer I/O error on dev loop3p3, logical block 4208, async page read [ 1451.677382][ T95] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1451.688258][ T95] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1451.696375][ T119] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1451.707934][ T119] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1451.723948][ T95] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1451.723995][T29983] loop2: p1 p3 p4 [ 1451.735184][ T95] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1451.745099][T29983] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1451.748970][ T95] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1451.755619][T29983] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1451.764486][ T95] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1451.773323][T29983] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1451.779755][ T95] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1451.797929][ T95] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1451.826623][T29997] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 23:43:51 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = openat(0xffffffffffffffff, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r4, &(0x7f0000004200)='t', 0xfff4) connect$packet(r4, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x6000000) 23:43:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1200000000000000) 23:43:51 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000080040000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:51 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000003000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:51 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="1001051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x8000000) 23:43:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1300000000000000) 23:43:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x1400000000000000) 23:43:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x9000000) [ 1452.154651][T30017] loop1: p1 p3 p4 [ 1452.158558][T30017] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1452.170198][T30017] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1452.179034][T30017] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1452.264435][T30035] fuse: Bad value for 'fd' [ 1452.286039][T30024] loop2: p1 p3 p4 [ 1452.290675][T30024] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1452.328034][T30024] loop2: p3 size 1912633224 extends beyond EOD, truncated 23:43:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xa000000) 23:43:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x4000000000000000) [ 1452.394314][T30024] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1452.492561][T30027] loop3: p1 < > p3 p4 [ 1452.497485][T30027] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1452.522960][T30027] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1452.535260][ T148] loop3: p1 < > p3 p4 [ 1452.544391][ T148] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1452.552643][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1452.594569][T30024] loop2: p1 p3 p4 [ 1452.598537][T30024] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1452.606588][T30024] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1452.614566][T30024] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1452.754620][T30027] loop3: p1 < > p3 p4 [ 1452.759305][T30027] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1452.767375][T30027] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:52 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = openat(0xffffffffffffffff, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r4, &(0x7f0000004200)='t', 0xfff4) connect$packet(r4, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:52 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000f0ff7f000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xb000000) 23:43:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x8000000000000000) 23:43:52 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000004000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:52 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="1201051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x10000000) 23:43:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x9900000000000000) [ 1453.034515][T30049] loop1: p1 p3 p4 [ 1453.038439][T30049] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1453.047069][T30049] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1453.060241][T30049] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1453.152994][T30061] fuse: Bad value for 'fd' [ 1453.267087][T30054] loop3: p1 < > p3 p4 [ 1453.292778][T30054] loop3: p3 size 1912633224 extends beyond EOD, truncated 23:43:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x9effffff00000000) 23:43:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x11000000) [ 1453.334311][T30051] loop2: p1 p3 p4 [ 1453.342052][T30054] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1453.352426][T30051] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1453.361090][T30051] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1453.372890][T30051] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xeaffffff00000000) 23:43:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x12000000) [ 1453.406283][T30049] loop1: p1 p3 p4 [ 1453.410157][T30049] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1453.433437][T30049] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1453.446724][T30049] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1453.474814][T30054] loop3: p1 < > p3 p4 [ 1453.475773][ T148] loop1: p1 p3 p4 [ 1453.482920][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1453.490272][T30054] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1453.491592][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1453.505794][T30054] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1453.506206][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:53 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xefffffff00000000) 23:43:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x13000000) 23:43:53 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000007000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:53 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf00080000000480000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:53 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="1801051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:53 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x14000000) 23:43:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xf0ffffff00000000) [ 1453.946894][T30080] loop2: p1 p3 p4 [ 1453.950842][T30080] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1453.977526][T30080] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1454.048344][T30080] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1454.148570][T30095] fuse: Bad value for 'fd' 23:43:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xfeffffff00000000) 23:43:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x40000000) [ 1454.271197][T30083] loop1: p1 p3 p4 [ 1454.278162][T30083] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1454.286171][T30083] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1454.296764][T30083] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1454.312919][T30094] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:43:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xffffff7f00000000) 23:43:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x9effffff) [ 1454.318685][T30084] loop3: p1 < > p3 p4 [ 1454.327082][T30084] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1454.340739][T30084] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1454.394296][T30083] loop1: p1 p3 p4 [ 1454.398248][T30083] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1454.406593][T30083] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1454.414748][T30083] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1454.509221][ T148] loop1: p1 p3 p4 [ 1454.514586][ T148] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1454.522855][ T148] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1454.530990][ T148] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:54 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:54 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000009000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xd2010000) 23:43:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xffffffff00000000) 23:43:54 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="6401051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:54 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800fffffdef000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xeaffffff) 23:43:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3400000012000100000000000000000000000000b42d5856c9517d293fda0c010400003901000000000000ff000c001500"], 0x34}}, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffffffff, 0xe}}}}, ["", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x40001) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'veth0_macvtap\x00', {0x2, 0x0, @dev}}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) recvmmsg(r0, &(0x7f0000006a40)=[{{&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f0000001740)=[{&(0x7f00000004c0)=""/239, 0xef}, {&(0x7f00000005c0)=""/246, 0xf6}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/77, 0x4d}], 0x4, &(0x7f0000001780)=""/45, 0x2d}, 0xff}, {{&(0x7f00000017c0)=@caif, 0x80, &(0x7f0000003e00)=[{&(0x7f0000001840)=""/156, 0x9c}, {&(0x7f0000001900)=""/76, 0x4c}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000003980)=""/221, 0xdd}, {&(0x7f0000003a80)=""/185, 0xb9}, {&(0x7f0000003b40)=""/231, 0xe7}, {&(0x7f0000003c40)=""/205, 0xcd}, {&(0x7f0000003d40)=""/132, 0x84}], 0x9, &(0x7f0000003ec0)=""/79, 0x4f}, 0x7}, {{&(0x7f0000003f40)=@caif=@dgm, 0x80, &(0x7f0000004240)=[{&(0x7f0000003fc0)=""/157, 0x9d}, {&(0x7f0000004080)=""/207, 0xcf}, {&(0x7f0000004180)=""/143, 0x8f}], 0x3}, 0x800}, {{0x0, 0x0, &(0x7f0000004480)=[{&(0x7f0000004280)=""/112, 0x70}, {&(0x7f0000004300)=""/64, 0x40}, {&(0x7f0000004340)=""/183, 0xb7}, {&(0x7f0000004400)=""/128, 0x80}], 0x4}, 0x3}, {{&(0x7f00000044c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000006940)=[{&(0x7f0000004540)=""/171, 0xab}, {&(0x7f0000004600)=""/4096, 0x1000}, {&(0x7f0000005600)=""/4096, 0x1000}, {&(0x7f0000006600)=""/190, 0xbe}, {&(0x7f00000066c0)=""/86, 0x56}, {&(0x7f0000006740)=""/223, 0xdf}, {&(0x7f0000006840)=""/56, 0x38}, {&(0x7f0000006880)=""/134, 0x86}], 0x8, &(0x7f00000069c0)=""/122, 0x7a}, 0x7fffffff}], 0x5, 0x40000100, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd, r3}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)=@getae={0x170, 0x1f, 0x100, 0x70bd2b, 0x25dfdbfb, {{@in=@remote, 0x4d2, 0x2, 0x6c}, @in6=@ipv4={'\x00', '\xff\xff', @empty}, 0xfffffffc, 0x3501}, [@XFRMA_IF_ID={0x0, 0x1f, r3}, @tfcpad={0xfffffffffffffeef, 0x16, 0x20}, @XFRMA_SET_MARK={0x8}, @algo_auth_trunc={0x10b, 0x14, {{'blake2s-128-x86\x00'}, 0x5f8, 0x60, "b3d2c6ed4bca8a5de383c4a7843142996fefa76a2ed48d8c5b5bb142be716abf365f9d8a10f8310e315603d98494ad7d06a30fc6d37f45354438549ebdd0af07113846130c15d6997412bd810e56db87d0476f511a1b5560db3f24f0fe613bc7597912918e3c6d422a1ffa0d6e8bb876e983358dc5497307efcac3ad44ee782262ed18dcd84a8184e9632f853fa596e406f7acb146288115ce36ad5cd701c4320164351e93b9dd011eee1e8d422eaead2a210ac798635c873eeaf268e72e95"}}]}, 0x170}, 0x1, 0x0, 0x0, 0x100}, 0x20034840) [ 1454.814177][T30110] loop2: p1 p3 p4 [ 1454.818077][T30110] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1454.830208][T30110] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1454.841564][T30110] loop2: p4 size 3657465856 extends beyond EOD, truncated 23:43:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xefffffff) [ 1455.038183][T30125] fuse: Bad value for 'fd' [ 1455.115258][T30116] loop1: p1 p3 p4 [ 1455.119766][T30115] loop3: p1 < > p3 p4 [ 1455.121221][T30116] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1455.125900][T30115] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1455.135041][T30116] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1455.138569][T30124] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1455.146858][T30116] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1455.153560][T30115] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xf0ffffff) 23:43:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xfeffffff) 23:43:55 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000010000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1455.413668][T30132] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1455.436305][T30115] loop3: p1 < > p3 p4 [ 1455.448148][T30115] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1455.459399][T30115] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1455.484967][T30116] loop1: p1 p3 p4 [ 1455.497593][T30116] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1455.516765][T30116] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1455.527935][T30116] loop1: p4 size 3657465856 extends beyond EOD, truncated 23:43:55 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0202051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xffffff7f) 23:43:55 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:55 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800fffffff6000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xffffff9e) [ 1455.634589][T30139] loop2: p1 < > p3 p4 [ 1455.641344][T30139] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1455.649271][T30139] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1455.736349][T12958] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1455.739708][T29408] blk_update_request: I/O error, dev loop2, sector 66657 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1455.752883][ T95] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 1455.764157][T30139] __loop_clr_fd: partition scan of loop2 failed (rc=-16) [ 1455.768285][ T95] Buffer I/O error on dev loop2p4, logical block 66688, async page read 23:43:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xffffffea) [ 1455.963053][T30152] fuse: Bad value for 'fd' [ 1456.021187][ T95] Buffer I/O error on dev loop2p4, logical block 66689, async page read [ 1456.030027][ T95] Buffer I/O error on dev loop2p4, logical block 66690, async page read [ 1456.046427][T30143] loop3: p1 < > p3 p4 [ 1456.050747][T30151] FAT-fs (loop4): Unrecognized mount option "" or missing value 23:43:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xffffffef) [ 1456.064813][T30143] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1456.078399][T30143] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1456.136077][T30157] loop1: p1 p3 p4 [ 1456.141735][T30157] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1456.149535][T30157] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1456.160380][T30157] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1456.224100][T30143] loop3: p1 < > p3 p4 [ 1456.228773][T30143] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1456.236849][T30143] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1456.247207][T30135] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 23:43:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f00000001c0)={0x1, 0x1, 0x1000, 0x27, &(0x7f0000000000)="12d0cfb78848e160817c58f926a9fec7cbb4c307dc06394ab16f0ca04dd29d8b27af734da2951e", 0xd4, 0x0, &(0x7f00000000c0)="8d1a5adda1ff1bf41c621d6a75d682fab633d2d9318abb2a6d27f669d039b5bc67d3dd9e9bc7345b97c7de54412410b638c0901e792f2ae2dd82f8802269ab141566cb05d10b42d7c55a1debb6b4dd332fe82385fd1e5feecddeb37592468f6a0ac69855a73ce002c2061130268a02852fa7210963f043ca95d475ab6a8e1543dd20ca3704c68a9190366f9cdb9cb78673ae184f05de8e103a3f694a894bcc66ec8855037be717e406b668824e6107a4d4bfb0c6656653bcd6e87c1a8e7f4ab76e421b54e829ec1c754670d286060e3e30b07671"}) 23:43:56 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500000025000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xfffffff0) 23:43:56 executing program 3: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0203051000000a000000ff45ac0480ffffffbf00080000000000000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:56 executing program 1: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000040)="0201050000000a000000ff45ac0480ffffffbf000800fffffdfc000002400000000063000000e10000008877007200300700bfffffff00000000008000da55aa", 0x40, 0x1c0}]) 23:43:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0xfffffffe) 23:43:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x101}, 0x14}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000680)={&(0x7f00000008c0)={0x13c, r1, 0x803, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x15}, @void, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_vlan\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x10, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}]}, @NL80211_ATTR_MNTR_FLAGS={0x2c, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}, @NL80211_ATTR_MNTR_FLAGS={0x20, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}]}, @NL80211_ATTR_MNTR_FLAGS={0x24, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}]}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "24d176caca14cbb9966c938eadaa640345a0b7dd966d8692"}, @NL80211_ATTR_MNTR_FLAGS={0x28, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}]}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "22a6cc58f28e1d9a75bccd632b9e8825015483fa72f0832b"}], @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x13c}, 0x1, 0x0, 0x0, 0x40}, 0x20000080) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000040)={@rand_addr, 0x0}, &(0x7f0000000080)=0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000780), 0x200000, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') pread64(r4, 0x0, 0x4d, 0xeb4) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000007c0)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000100)=0x51) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, 0x0, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @dev={0xfe, 0x80, '\x00', 0x28}}]}, 0x28}, 0x1, 0x0, 0x0, 0x200000d0}, 0x81) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="b40100001700020026bd7000fddbdf25ac1e0001000000000000000000000000000004d53c000000fe880000000000000000000000000101ff020000000000000000000000000001ac1414bb0000000000000000000000004e2100044e2010000a0020c089000000", @ANYRES32=r2, @ANYRES32, @ANYBLOB="0000000000000000000000005ba6d5c77da52f00000000000000000000014e2400"/48, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="01000000010000000000000000008003010000000000000086ffffffffffffff00000000000000000400000000000000f8ffffffffffffffa500000000000000bb0000000000000009000000000000008d0c000000000000c0ffffffffffffffffff0000c06b6e00000001030000000099ba1349000400000100000027bd700008001800040000002c001300ac1414aa000000000000000000000000fe880000000000000000000000000001000000000a0000000a00100001000000000000000c001c00", @ANYRES32=0x0, @ANYBLOB="010000002c00130000000000000000000000000000000000fe880000000000000000000000000001000000000a0000000c0015005a0735000900000008000b0004000000"], 0x1b4}, 0x1, 0x0, 0x0, 0x4}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x40, 0x0, 0x2, 0x201, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x40}}, 0x0) getsockname(r6, &(0x7f00000005c0)=@sco, &(0x7f0000000640)=0x80) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000440)={{0xa, 0x4e23, 0x0, @empty}, {0xa, 0x4e21, 0x1f, @remote, 0x5}, 0x4, [0x2, 0x0, 0x39980000, 0x6, 0x8, 0x6, 0x7fff, 0x7]}, 0x5c) [ 1456.478918][T30178] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1456.489724][T30178] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1456.501745][T30178] list_add corruption. next->prev should be prev (ffffffff861080a0), but was 0000000000000001. (next=ffff8881a4b18680). [ 1456.515598][T30176] loop3: p1 < > p3 p4 [ 1456.516646][T30178] ------------[ cut here ]------------ [ 1456.522556][T30176] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1456.527011][T30178] kernel BUG at lib/list_debug.c:25! [ 1456.527980][T30178] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1456.539787][T30176] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 1456.545487][T30178] CPU: 1 PID: 30178 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 1456.545492][T30178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.545507][T30178] RIP: 0010:__list_add_valid+0xa0/0xc0 [ 1456.545515][T30178] Code: 20 8f 03 85 4c 89 fe 4c 89 e2 4c 89 f1 31 c0 e8 72 7a 21 ff 0f 0b 48 c7 c7 e0 8d 03 85 4c 89 e6 4c 89 f1 31 c0 e8 5c 7a 21 ff <0f> 0b 48 c7 c7 a0 8e 03 85 4c 89 f6 4c 89 e1 31 c0 e8 46 7a 21 ff [ 1456.545519][T30178] RSP: 0018:ffff8881b26df2c8 EFLAGS: 00010246 [ 1456.545526][T30178] RAX: 0000000000000075 RBX: ffff8881a4b18688 RCX: c4a0350cc82f8700 [ 1456.545530][T30178] RDX: ffffc9000bd25000 RSI: 0000000000030c36 RDI: 0000000000030c37 [ 1456.545535][T30178] RBP: ffff8881a4b18680 R08: ffffffff814e90d7 R09: ffffed103ede9608 [ 1456.545546][T30178] R10: ffffed103ede9608 R11: 0000000000000000 R12: ffffffff861080a0 [ 1456.635784][T30178] R13: dffffc0000000000 R14: ffff8881a4b18680 R15: ffff8881e4fbf380 [ 1456.643734][T30178] FS: 00007f9474914700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1456.652637][T30178] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1456.659197][T30178] CR2: 000055769b884bf0 CR3: 000000018ba43000 CR4: 00000000001406e0 [ 1456.667155][T30178] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1456.675102][T30178] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1456.683046][T30178] Call Trace: [ 1456.686318][T30178] firmware_fallback_sysfs+0x480/0xb20 [ 1456.691766][T30178] _request_firmware+0x1287/0x1770 [ 1456.696855][T30178] ? request_firmware+0x50/0x50 [ 1456.701683][T30178] ? __nla_validate+0x50/0x50 [ 1456.706338][T30178] request_firmware+0x33/0x50 [ 1456.711205][T30178] reg_reload_regdb+0xa0/0x220 [ 1456.715949][T30178] ? reg_query_regdb_wmm+0x510/0x510 [ 1456.721206][T30178] ? nl80211_pre_doit+0x156/0x590 [ 1456.726203][T30178] genl_rcv_msg+0xed8/0x13b0 [ 1456.730769][T30178] ? genl_rcv+0x40/0x40 [ 1456.734900][T30178] ? preempt_schedule+0x16b/0x190 [ 1456.739911][T30178] ? rhashtable_jhash2+0x1bf/0x2e0 [ 1456.744998][T30178] ? jhash+0x740/0x740 [ 1456.749057][T30178] ? rht_key_hashfn+0x112/0x1e0 [ 1456.753881][T30178] ? rht_lock+0x100/0x100 [ 1456.758185][T30178] ? __sys_sendmsg+0x2c4/0x3b0 [ 1456.762919][T30178] ? rht_key_hashfn+0x1e0/0x1e0 [ 1456.767740][T30178] ? netlink_hash+0xd0/0xd0 [ 1456.773086][T30178] netlink_rcv_skb+0x200/0x480 [ 1456.777820][T30178] ? genl_rcv+0x40/0x40 [ 1456.781949][T30178] ? netlink_ack+0xab0/0xab0 [ 1456.786508][T30178] ? __down_read+0xf1/0x210 [ 1456.790982][T30178] ? __init_rwsem+0x200/0x200 [ 1456.795632][T30178] ? __rcu_read_lock+0x50/0x50 [ 1456.800366][T30178] ? selinux_vm_enough_memory+0x170/0x170 [ 1456.806065][T30178] genl_rcv+0x24/0x40 [ 1456.810020][T30178] netlink_unicast+0x865/0x9f0 [ 1456.814766][T30178] ? netlink_detachskb+0x40/0x40 [ 1456.819686][T30178] ? _copy_from_iter_full+0x29e/0x830 [ 1456.825114][T30178] ? __virt_addr_valid+0x1fd/0x290 [ 1456.830331][T30178] netlink_sendmsg+0x9ab/0xd40 [ 1456.835092][T30178] ? netlink_getsockopt+0x8e0/0x8e0 [ 1456.840283][T30178] ? import_iovec+0x1bc/0x380 [ 1456.844941][T30178] ? security_socket_sendmsg+0x9d/0xb0 [ 1456.850374][T30178] ? netlink_getsockopt+0x8e0/0x8e0 [ 1456.855549][T30178] ____sys_sendmsg+0x583/0x8c0 [ 1456.860298][T30178] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 1456.865477][T30178] __sys_sendmsg+0x2c4/0x3b0 [ 1456.870043][T30178] ? ____sys_sendmsg+0x8c0/0x8c0 [ 1456.874971][T30178] ? _raw_spin_unlock_irq+0x4a/0x60 [ 1456.880146][T30178] do_syscall_64+0xcb/0x1e0 [ 1456.884624][T30178] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1456.890751][T30178] RIP: 0033:0x7f9476b9c709 [ 1456.895172][T30178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1456.914943][T30178] RSP: 002b:00007f9474914188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1456.923940][T30178] RAX: ffffffffffffffda RBX: 00007f9476ca0f60 RCX: 00007f9476b9c709 [ 1456.931888][T30178] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003 [ 1456.939843][T30178] RBP: 00007f9476bf6cb4 R08: 0000000000000000 R09: 0000000000000000 [ 1456.947787][T30178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1456.955737][T30178] R13: 00007ffe53fd867f R14: 00007f9474914300 R15: 0000000000022000 [ 1456.963686][T30178] Modules linked in: 23:43:56 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x44, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1612c2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4) r4 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) r5 = openat(r4, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) write(r5, &(0x7f0000004200)='t', 0xfff4) connect$packet(r5, &(0x7f0000000180)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001800)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="9a228dfa0c009900bf0fae93b09b24d74a8abb000500000004e853000100000008000500050042bc114cc9210600a5fecb9ab902755800000a010000030303030303b0637b3d9b31a41081235cd66e8892bf000008000500000000000a0018000303030303030000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x44010}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643dfad50be36a8fbbfb6e708f244ef945127a80f167e1d88617ccd92b397808d8898cd1946ba4e4b9928d2e091fb784f2aa44c7637f92155641fb451e289c749695049a356c732d6cf6915d9d8e412f4d74c6f95a9af98ceace9e711411045b08cc42ec8db8f8ee0c14c6fccd7f0e9e347bac25dcc60c4b66c5f6e4d8d74a735ce29f5d8ea978b8f2cd6d226087371cc89cad7c6f8f4501d907e05256cec579b14a0082d43e171dfbdef7bf2fdcf928e4290c9f312f6051259b443a4d199ed6a3f2b889ee591241381723a3665c6b44722cfe80fb5e3db282a1a1db07ffe18775c0ec3161fb16456092903e4e253671fb12a612a232b2065b3c4cff75c2738a84109d72195e81", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:43:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x80030000000000) [ 1456.981605][T30178] ---[ end trace 4c875dc42fd0353f ]--- [ 1456.986779][ T148] loop3: p1 < > p3 p4 [ 1456.990620][T30178] RIP: 0010:__list_add_valid+0xa0/0xc0 [ 1456.995037][ T148] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1456.997813][T30178] Code: 20 8f 03 85 4c 89 fe 4c 89 e2 4c 89 f1 31 c0 e8 72 7a 21 ff 0f 0b 48 c7 c7 e0 8d 03 85 4c 89 e6 4c 89 f1 31 c0 e8 5c 7a 21 ff <0f> 0b 48 c7 c7 a0 8e 03 85 4c 89 f6 4c 89 e1 31 c0 e8 46 7a 21 ff [ 1457.006333][ T148] loop3: p4 size 3657465856 extends beyond EOD, truncated 23:43:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x100000000000000) [ 1457.026623][T30178] RSP: 0018:ffff8881b26df2c8 EFLAGS: 00010246 [ 1457.033604][T30180] loop1: p1 p3 p4 [ 1457.041160][T30180] loop1: p1 size 78398975 extends beyond EOD, truncated [ 1457.045190][T30178] RAX: 0000000000000075 RBX: ffff8881a4b18688 RCX: c4a0350cc82f8700 [ 1457.049545][T30180] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 1457.059002][T30178] RDX: ffffc9000bd25000 RSI: 0000000000030c36 RDI: 0000000000030c37 [ 1457.065780][T30180] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 1457.072686][T30178] RBP: ffff8881a4b18680 R08: ffffffff814e90d7 R09: ffffed103ede9608 [ 1457.080016][T30179] loop2: p1[EZD] p3 p4 [ 1457.088120][T30178] R10: ffffed103ede9608 R11: 0000000000000000 R12: ffffffff861080a0 [ 1457.099211][T30179] loop2: p1 size 78398975 extends beyond EOD, truncated [ 1457.107599][T30178] R13: dffffc0000000000 R14: ffff8881a4b18680 R15: ffff8881e4fbf380 [ 1457.119341][T30178] FS: 00007f9474914700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 1457.122010][T30179] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 1457.131111][T30178] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1457.142212][T30179] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 1457.144696][T30178] CR2: 00007ff035e4ede4 CR3: 000000018ba43000 CR4: 00000000001406e0 [ 1457.157563][T30178] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1457.166012][T30178] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1457.174312][T30178] Kernel panic - not syncing: Fatal exception [ 1457.180647][T30178] Kernel Offset: disabled [ 1457.184952][T30178] Rebooting in 86400 seconds..