ncated [ 1059.346226][T21212] loop5: p3 start 225 is beyond EOD, truncated 14:49:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0xa]}, 0x40) 14:49:49 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bind$pptp(r0, &(0x7f0000000440)={0x18, 0x2, {0x2, @broadcast}}, 0x1e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r4}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'batadv_slave_0\x00', r4}) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="c0010000130004134e233123f7ffffff0004000009000000ff200000000000000000", @ANYRES32=r4, @ANYBLOB="01000000350f000001000000060000007a000100b2aada893960845bd53c7cdba1677e46010a54c923024163a6bbad003839b41f0981b553fcb2b5eab9af5d35d3da450a676276c5eed131dc966f33273923419fb20abff5f447c9af6c6bb1f792bc5e56315bded0dcedbd64147230851ce5a23e80204b16bc279379210b4be5f1cc5e930e82902e1caf0000f70001001c387b2c04c44a40c6568ca202d68aab9a15c173c40d3a92086cfa55ffb5891c96b42e5f7bff2e59ee14cc9ac3406d394f3858ae036a7b95b30629cbf88521e7f22ac6eb25aeef79f6cd0315a3655a8051fc46ccf5fe67bb2fe6362811736f1246e99e336ed1c88ce4316a0994cac773854fff20d018d2ddcc9688f132f6bc5990c1ec7f58d0bbd5ade9f8c75b8b0e8ce5c6977bdb65b91d5f9fca9619787fd2f0316bf2fa9c73cfa651b9828cbe0b51963c0f3124378c185db6a406724fbb6f18c068166f967804f063b9e826310ed967aed18cfe861e048cba00881531719c1c95ec959dd7764152b3e28e87250c74da0db000"], 0x1c0}, 0x1, 0x0, 0x0, 0x8090}, 0x800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) [ 1059.355481][T21212] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1059.369824][T21212] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:49:49 executing program 5: syz_read_part_table(0x4800, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0xb]}, 0x40) 14:49:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0xc]}, 0x40) 14:49:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0xd]}, 0x40) 14:49:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0xe]}, 0x40) [ 1059.536167][ T1921] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1059.621373][T21266] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1059.629537][T21266] loop3: partition table partially beyond EOD, truncated [ 1059.642987][T21266] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1059.652617][T21266] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1059.661019][T21266] loop3: p3 start 225 is beyond EOD, truncated [ 1059.668647][T21266] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1059.677525][T21267] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1059.679446][T21266] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1059.684789][T21267] loop5: partition table partially beyond EOD, truncated [ 1059.684876][T21267] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1059.708720][T21267] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1059.718829][T21267] loop5: p3 start 225 is beyond EOD, truncated [ 1059.727706][T21267] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1059.736419][T21267] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1059.790255][T21266] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1059.797638][T21266] loop3: partition table partially beyond EOD, truncated [ 1059.805725][T21266] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1059.815478][T21266] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1059.823704][T21266] loop3: p3 start 225 is beyond EOD, truncated [ 1059.830954][T21266] loop3: p5 size 11290111 extends beyond EOD, truncated 14:49:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0xf]}, 0x40) 14:49:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000280)="5e99868f8349626e689d3d11d6454985e896a226605c9f9c824e89e47c61ba1e906da933b5c76150dc3426f1e9c78aabe2a2df2f013807d5d07b4d88814cf6ff3c263982a7b092816a3b818af8bd93926ff6c277fe45b132a4424136ea649cf1d3672e554ee4b9ed94188965dc069c22bc165d9513a2e7b62639fe890a6ff90277697b56e6d6637a5b5a21085945356b81db", 0x92) write$tun(r0, &(0x7f0000000200)={@val={0x0, 0x8906}, @void, @mpls}, 0x4) getsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000000100)=0x4) 14:49:49 executing program 3: syz_read_part_table(0x2c00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:49 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\\'], 0x1) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000600)=0xfffffffffffffe12) setreuid(0x0, r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r5, 0x28, 0x6, &(0x7f00000005c0), 0x10) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./bus\x00', 0x80000001, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000100)="86d3794514ae847e2c59c03a7022b9ab2ea6aac74f71de708796df906a639ca52a4f2465547d561c45912a366c8f8e82bf54059e6b9aa29344e86d4dde3f1ea5b24831bd614900234ca1", 0x4a, 0xaf}, {&(0x7f00000002c0)="75bb8b5ddf2d93834540d7f61a5482221e6edc75494508ce16da70c260e60aa9ae217553e479988ab700f61a0d941312d81eb5ff1cfa753e95b84da1f65b2fb882af9ea0f0a735c39fc295639f0e001a69f185b4661a3a0a711e75d5d28c2365d58d18405be30ba55516d4d7aa83f3c3231a5ca3180e38382a395ee3bce0bc5c5a43b46b079475584c07cf2fb4c5c72823b9555b2587ab938f10a98f9710abaed781d6a9e28285572b463a517f765f35640a5e725c4fc872b89fa141c6f5b1d345d38f4a2427a07ff775ef641f4b7b1e0c9166", 0xd3, 0x7}, {&(0x7f0000000200)="1581ad5b127678987304cf96f361ba0d88f592f9c7f0d1989b4e96806e03f34c1684951bb0b64beaa024c7b5dd6b7f285e51b32733a23189e1e6ee042d7686c8701e6c5dc224949f7c0b880ec7295a9ce4f4cda091", 0x55, 0x100000001}], 0x19588a, &(0x7f0000000500)=ANY=[@ANYRES16, @ANYRESDEC=r1, @ANYBLOB=',appraise_type=imasig,subj_user=/selinux/avc/hash_stats\x00,pcr=00000000000000000038,fscontext=user_u,fowner<', @ANYRESDEC=r3, @ANYBLOB=',\x00']) socket$inet(0x2, 0x3, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) 14:49:49 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f0000000080)=@ipx, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)=""/27, 0x1b}, {&(0x7f0000000280)=""/130, 0x82}], 0x2, &(0x7f0000000380)=""/241, 0xf1}, 0x851}, {{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000500)=""/234, 0xea}], 0x1, &(0x7f0000000640)=""/223, 0xdf}, 0x9}, {{&(0x7f0000000740)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/108, 0x6c}, {&(0x7f0000000880)=""/39, 0x27}, {&(0x7f00000008c0)=""/201, 0xc9}], 0x4, &(0x7f0000000a00)=""/165, 0xa5}}, {{&(0x7f0000000ac0)=@tipc=@name, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000b40)=""/117, 0x75}, {&(0x7f0000000bc0)=""/82, 0x52}, {&(0x7f0000000c40)=""/132, 0x84}], 0x3, &(0x7f0000000d40)=""/165, 0xa5}, 0x5b66}, {{0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000e00)}, {&(0x7f0000000e40)=""/216, 0xd8}], 0x2, &(0x7f0000000f80)=""/17, 0x11}, 0xcc97}], 0x5, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000001100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat(r2, &(0x7f0000000e00)='./file0\x00', 0x2e0000, 0x44) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000001140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r5, 0xc0182101, &(0x7f00000011c0)={r8, 0x5, 0x7}) ioctl$UI_DEV_CREATE(r3, 0x5501) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) signalfd4(r9, &(0x7f0000000040)={[0x1]}, 0x8, 0xc00) 14:49:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x10]}, 0x40) 14:49:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) [ 1059.839214][T21266] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1059.944031][T21267] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1059.955635][T21267] loop5: partition table partially beyond EOD, truncated [ 1059.967670][T21267] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1059.979224][T21267] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1059.987613][T21267] loop5: p3 start 225 is beyond EOD, truncated [ 1060.005422][T21267] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1060.013953][T21267] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:49:50 executing program 5: syz_read_part_table(0x4c00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x11]}, 0x40) 14:49:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x30, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:49:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth0_virt_wifi\x00', 0x1}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x4) 14:49:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) modify_ldt$read(0x0, &(0x7f00000000c0)=""/86, 0x56) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r5, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r6, 0x1, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2004c054}, 0x8d5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) 14:49:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x12]}, 0x40) 14:49:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x13]}, 0x40) [ 1060.141139][T21301] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1060.147092][T21301] loop3: partition table partially beyond EOD, truncated [ 1060.160623][T21301] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1060.169427][T21301] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1060.178330][T21301] loop3: p3 start 225 is beyond EOD, truncated [ 1060.186031][T21301] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1060.194206][T21301] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:49:50 executing program 3: syz_read_part_table(0x3f00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000100)=0xfffffe01, 0x4) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0600000000000000"], 0x4) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) 14:49:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x200, 0x81}) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4888ee76037cc59a83ea1cc339148240d05c8302a40940985c457b7143a76f2647eeb86c0d63e4300e1ea6642410bd59583a53be2244cbaf61d906d7b91471abfff8fa91d929ec82f61df4c932feb72399edd2183cf7fdb8fcf6414d358937"], 0x1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x191180, 0x8b) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_config_ext={0x0, 0x4}, 0x40000, 0x0, 0xfffffffc}, 0x0, 0x0, r4, 0x0) dup2(r2, r5) open(0x0, 0x0, 0x0) 14:49:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x14]}, 0x40) 14:49:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x45, [@fwd={0xc}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc}, 0x20) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r0) ptrace(0x420c, r0) sched_getaffinity(r0, 0x8, &(0x7f0000000040)) [ 1060.421032][T21350] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1060.430110][T21350] loop5: partition table partially beyond EOD, truncated [ 1060.438622][T21350] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1060.449570][T21350] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1060.457635][T21350] loop5: p3 start 225 is beyond EOD, truncated [ 1060.466042][T21350] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1060.479624][T21350] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1060.550354][T21350] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1060.561047][ T1921] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1060.626901][T21350] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 1060.665181][T21386] loop3: p1 p2 p3 < > p4 < p5 p6 > 14:49:50 executing program 5: syz_read_part_table(0x6000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x4000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) open(0x0, 0x0, 0x0) 14:49:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x15]}, 0x40) 14:49:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@val={0x0, 0x8906}, @void, @mpls}, 0x4) 14:49:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSCTTY(r3, 0x540e, 0x5) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$FUSE_LSEEK(r5, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, 0x4, {0x80}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8, 0x28013, r1, 0xe1859000) 14:49:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x16]}, 0x40) 14:49:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000800000000000000020000000000000000000300000000000000005f2500c336678adc97366ddcf7520700335db500000000000010f39a60cfd6adb61559925fa9ff7ad90dd4d4366159f690617df8f0c0f99005a0a344223644fdcffdb2c96da37273bbe0d20a9ab7ebd57a5e1bbf10c10c560d27360c02614f6a0720fa1bcb8a8e70e67cd4d749e15cb97ce89374b3fd5357c2a2c39100"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) setresgid(0x0, r5, r3) statx(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x6000, 0x100, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r5, @ANYRES32=r6], 0x9b) [ 1060.671273][T21386] loop3: partition table partially beyond EOD, truncated [ 1060.679536][T21386] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1060.687485][T21386] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1060.695757][T21386] loop3: p3 start 225 is beyond EOD, truncated [ 1060.702932][T21386] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1060.711923][T21386] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:49:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x17]}, 0x40) 14:49:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@val={0x0, 0x8906}, @void, @mpls}, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$IPSET_CMD_DEL(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)={0xdc, 0xa, 0x6, 0x101, 0x0, 0x0, {0xc}, [@IPSET_ATTR_DATA={0x38, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @local}}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e21}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}, @IPSET_ATTR_ADT={0x20, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x4}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x4239}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e24}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x3}, @IPSET_ATTR_ETHER={0xa, 0x11, @dev={[], 0x44}}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x3f}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x4c004}, 0x810) 14:49:50 executing program 3: syz_read_part_table(0x4000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\\'], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0xc) dup2(r1, r2) open(0x0, 0x0, 0x0) 14:49:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1060.926145][T21425] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1060.933814][T21425] loop5: partition table partially beyond EOD, truncated [ 1060.946396][T21425] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1060.954391][T21425] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1060.962495][T21425] loop5: p3 start 225 is beyond EOD, truncated [ 1060.964759][T21424] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1060.970215][T21425] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1060.974102][T21424] loop3: partition table partially beyond EOD, truncated [ 1060.991899][T21425] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1060.998578][T21424] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1061.006688][T21424] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1061.015791][T21424] loop3: p3 start 225 is beyond EOD, truncated [ 1061.023311][T21424] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1061.031274][T21424] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1061.131475][T21425] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1061.146761][T21425] loop5: partition table partially beyond EOD, truncated [ 1061.155043][T21425] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1061.163753][T21425] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1061.171371][T21425] loop5: p3 start 225 is beyond EOD, truncated [ 1061.177823][T21425] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1061.186849][T21425] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1061.195024][T21424] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1061.201674][T21424] loop3: partition table partially beyond EOD, truncated [ 1061.210079][T21424] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1061.220815][T21424] loop3: p2 size 1073741824 extends beyond EOD, truncated 14:49:51 executing program 5: syz_read_part_table(0x6800, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x2]}, 0x40) 14:49:51 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400000, 0x10) fsync(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYRES32], &(0x7f0000000140)=""/207, 0x4, 0xcf, 0x1}, 0x20) 14:49:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r4, &(0x7f0000000000), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000006462494c2701b661f07307ae1862f0cc2c919c0f798be76a0599a82ebeb2c24b10e8d9f795230447a36dd20ca8697869e6ac62aba8f8d69a7d6a0124fdd2e41b31172659ba848e9d165d20fe2a985ba622bb1709fc862c9a1367842c8bc200b"], 0x4) 14:49:51 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\\'], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) open(0x0, 0x0, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5514) 14:49:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="9fc6010118000000000000001c00009ff2ecaf6100000200000d000000000500000000000000100000000300000004000000005f2500"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x5) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000000c0)=0xc) setsockopt$inet6_tcp_int(r1, 0x6, 0x10, &(0x7f0000000040)=0x7fffffff, 0x4) 14:49:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x3]}, 0x40) 14:49:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x4]}, 0x40) 14:49:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x5]}, 0x40) [ 1061.228392][T21424] loop3: p3 start 225 is beyond EOD, truncated [ 1061.246939][T21424] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1061.258353][T21424] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:49:51 executing program 3: syz_read_part_table(0x4800, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x6]}, 0x40) 14:49:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x20, 0xdc, 0x1}, 0x20) [ 1061.614554][T21496] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1061.624992][T21496] loop3: partition table partially beyond EOD, truncated [ 1061.634092][T21496] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1061.645369][T21496] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1061.652986][T21496] loop3: p3 start 225 is beyond EOD, truncated [ 1061.659491][T21496] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1061.667085][T21496] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1061.674691][T21505] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1061.686187][T21505] loop5: partition table partially beyond EOD, truncated [ 1061.693833][T21505] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1061.705496][T21505] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1061.713669][T21505] loop5: p3 start 225 is beyond EOD, truncated [ 1061.720380][T21505] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1061.727779][T21505] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1061.880357][T21505] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1061.885692][T21505] loop5: partition table partially beyond EOD, truncated [ 1061.898285][T21505] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1061.906787][T21505] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1061.914632][T21505] loop5: p3 start 225 is beyond EOD, truncated [ 1061.921604][T21505] loop5: p5 size 11290111 extends beyond EOD, truncated 14:49:51 executing program 5: syz_read_part_table(0x6c00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x4) 14:49:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x7]}, 0x40) 14:49:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/200, 0x1a, 0xc8, 0x1}, 0x20) r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r1, 0x541c, &(0x7f0000000100)) inotify_add_watch(r1, &(0x7f00000000c0)='./file0\x00', 0x200) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) 14:49:51 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\\'], 0x1) readlink(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)=""/208, 0xd0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) open(0x0, 0x0, 0x0) 14:49:51 executing program 3: syz_read_part_table(0x4c00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:51 executing program 4: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000006cf83354503ebf0000001c0000001c00000008000000004000000200000d00000000addf8e9eab"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:49:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x8]}, 0x40) [ 1061.928939][T21505] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:49:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x9]}, 0x40) 14:49:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xa]}, 0x40) 14:49:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x1, 0x2, 0x801, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @dev}}}]}]}, 0x44}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x6}]}, {0x0, [0x0, 0x5f, 0x0, 0x0, 0x5f, 0x0]}}, &(0x7f0000000280)=""/230, 0x2c, 0xe6, 0x1}, 0x20) 14:49:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xb]}, 0x40) [ 1062.026257][T21529] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1062.046310][T21529] loop3: partition table partially beyond EOD, truncated [ 1062.061127][T21529] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1062.070790][T21529] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1062.099509][T21529] loop3: p3 start 225 is beyond EOD, truncated [ 1062.111351][T21529] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1062.162403][T21529] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1062.200239][T21570] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1062.224796][T21570] loop5: partition table partially beyond EOD, truncated [ 1062.232005][T21570] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1062.240885][T21570] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1062.248526][T21570] loop5: p3 start 225 is beyond EOD, truncated [ 1062.255160][T21570] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1062.262722][T21570] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:49:52 executing program 5: syz_read_part_table(0x7200, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xc]}, 0x40) 14:49:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000008000000000000000200000d000000000500000000000000000000000300000000000000005f2500f3d5c2489cc3"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:49:52 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', r1, &(0x7f00000000c0)='./bus\x00', 0x51) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\\'], 0x1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) r4 = add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000002c0)="ba993f563a9c3e29a6b5174088360afc864142284413c7674995419cda76579487021e793b6e86cd5704f4a7ce9f9c4404290b9e798a7d4ab616e069e786a1b675db5f351cba6fe9900d838edb10dd83cefd6f370610ad85be91a4ba80a5cbbd1f7691c1654058485d18e3dc29d3dced37d2276cac8429cbe1ee73490a822f09c6b6cda80ee1d5f7089268f9130d93bc286d399d60f2e5f1baeb42d2d88d863d8cd6212b96b91eb6a45f24e3", 0xac, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r5, 0x0) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r5) keyctl$search(0xa, r4, &(0x7f0000000200)='big_key\x00', &(0x7f0000000240)={'syz', 0x1}, r6) open(0x0, 0x0, 0x0) 14:49:52 executing program 3: syz_read_part_table(0x5000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r8) r9 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getpeername$packet(r11, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r9, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r12}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'batadv_slave_0\x00', r12}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000009340)={'team0\x00', r12}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r14, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockname$packet(r15, &(0x7f000000bdc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f000000be00)=0x14) sendmmsg$inet(r8, &(0x7f000000c000)=[{{&(0x7f0000006a00)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000006cc0)=[{&(0x7f0000006a40)="22fa4f1c3036830b78dc4548eb7330f82e", 0x11}, {&(0x7f0000006a80)="441a7937e182261616e74ed6c004774323b2273106ba2178425dad410078f0cf6b3f176d760f617a1e47879cf074a502a42c74c59cafe4575bbf66f03767c7338ec70dfe25", 0x45}, {&(0x7f0000006b00)="28f11ed80cc5646812e789a08c2fc8266ed85495b507a215c85583f89f56075d1dc868a9a2152dc9a14fb708ebf4788b633b70f42271c185713eafda6579ff0d6c0aa8a35ba7d5d2d15c524b27240294e498ffa3e4c58ca881eda63fb7e73b9c2a68c5107fa9ead0349dd0e1bf94df2605d09df4952690cccc52afa14ed30ec1cf2cfc96b74be47c85bc2f252ec5097de1fbd9ff9b53cc88e8ad3721657feb8dd3b96752cfb3121ee5472c1d37ddfba5478cfad0e5b4f3cd3dcd", 0xba}, {&(0x7f0000006bc0)="4b455db00270a2f43559d9fc30f3222186240d2b9bf76011cce697178243dc99cc8260e40088a970742743f75a86f457cbd3b70d2aab830c0553519239783453679dd18cc11361d0c44770fe9f380e789687c13f8253a1064888c6038e2f48026e396444f316fb0fa1928b172a89aba5381cb06e49493283b17a84410158dba7e09ce0291def6563115cf09c5bd6a7f555dc9c12310de642a046b0f628e24014f2cf7353c450ca6006c37b1e6db59484618829055f0719db5311", 0xba}, {&(0x7f0000006c80)="9e6abb3900943ff9a2423b95c818d5d35ea4938b4ea37b0eff5e398c9c4ab7f5c4122b58068bf9384914bb68d84c462f85dd", 0x32}], 0x5, &(0x7f0000006d40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x18}}, {{&(0x7f0000006d80)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000070c0)=[{&(0x7f0000006dc0)="08f4a371eca2f4e77e26bd41701dc3672f163b8650d7ba7b1fb9e948cc9f2eb61b25a25c0381e7254e96f6a7a2865f836f135e543ccd7e5b2184871644f01198af8845bcba420c390a8b8a78d61a919fad9da88d5913a67e8bac782ac0360223e67cc1f2341774ff70fdcb2e9700ba06b23bf8f5e639a729b41fb0b5c6f48a8c38f7a08f0d27cd2b44eab7aa59fc5d9c0f058d310a1aaba70959977fc96f70dd183d4ca75a06d2031c8bd1a16655eb8cbfa5f16e08a92e091cb2812c3a8a5e33c464cfafedc4b3fd1a395685aec31e9399bbad23b15a050e5f6ea70940eb362eeceb24f9dc2dda47105a3aec6f3dc5f47e591f4be006e16b4a", 0xf9}, {&(0x7f0000006ec0)='{', 0x1}, {&(0x7f0000006f00)="53d42873e207b26250495da6fbe8249cbad821a007a3edd96304e3ed669ee2cce511111486eb2b860408662169311e1944eede09afd335f94333dd22c5da635b28b6a05824218272295e52f867fe3c56f65f8ab65fae78661307bc7e9bf8a0b5acd839a0ee6be08c16a22ebb0659038584cb7d499ba58b9b4267585222eecc8ebec066a479f23ffb7a475828e91a5b285ec4b9b3f1ddeb149b", 0x99}, {&(0x7f0000006fc0)="b8d293e45e4f87e1d21162346d0ce7c7c7cbdda9415d3162a369a7648f33b55b4c0b8e083c2def3ba18c5ba98d5db3d908e26afa14ed81bf1551d60fedb7952d2da418fa2facecbb0af3fb4cbf55968a4955de05a13fb075c33c349dc32ec7f081f39f4d1e83b82665bb5af39ec086116b3661e22d92cecab51e9c7a7a251cbc4a8f74724036e621fe402f8a241bf9a8ff92f6e958df4a5a29415304d34a37ebfe22134cd0cabe6541304d55ce74ce46707f0733b3fea412e4f6a5ff7c1fb8ec49f5f8454b99d177585495f78dd1482d9c5f5fd0cbe75f8978a9e7004500ebfb5b340f1eaa262880cb82cbda31380f", 0xef}], 0x4}}, {{0x0, 0x0, &(0x7f0000008200)=[{&(0x7f0000007100)="14a271f74d617f015e9d19fbb30bb0a48173f6fe17f6a026bc61094a", 0x1c}, {&(0x7f000000c1c0)="07dde0f4788fede1e536a8fdcaefc426034f6679176818615a624d5c071240433523d67548b50fc93d137ace936fa3f2b47d8fe7e27c1afaa561ee2a8a4028ffbddef6d6b69a04a557d560f9ba32f643ede60a7b9540502895d02d456c7f5ef310f1c1d093c576a51fecc19bc96a2647fd42bc8f681bb7b4d0abcb7f69220d2eee59", 0x82}, {&(0x7f0000007200)="4f8ef8cb243a9436c0e2d47dd826880389645e0d37a729c41791a5f0169e6c239c97a94176496e52185a08dc7186199658f648dac5b4d46e92b21d6c39d91a462df9fb70beaecb7e2c44e2ddfce574a32feb08ab21542c794e530d8930d753007c0e0d0f5bd5d53cdd9bf2437539c3f46976c0d2fac59c5551a96b3b5ae1226f642bfd5da45759aaff1d19bba7cc4cd405a5900fa13d0101507390a34dea0b05b3ab80baac853c2895d001a9d99cc8b44430572266fd952abbce68ab686f6cd2f7175e84951ac1bd6e9f77879fb00739ea07108d1e9d2bd763745475508a7323facf84def01c39d375bc8ce34b924d2b3d52d459f9f5a406c47e14c9bd570d6578096f49fdd86f986352ba1aa9648a77500ee48f566e8f723c612184f29c63bca14d9326fdb99ac81236145e177b5ac6163a573053e280cf3445ecd6a627a4b610d31c6596104348e1d2e8038e381a4ad05114f419be40c26885242c372627c8a70336409720773fc61e1eccef7107a1564a83dc55cc54dc6f90999655593069f3e69678be44bb949a9d433db2b235b866f1fc468a40b7b87acb0579451f7533d54aa57b0afc72111ffb99b823186dd7dfe5e48fb58507ae6338ed154c4b941615c431b6bf7ff848356c72ea1f5e6d84c9983e1ae69f6432fef1a6546893299726cbed47351c681a9c8a77a3dbcaa1db3b5c2ae62b4c244b14b8f2afb9c0db033b0790e7d4c88914a9b6339158a43a8a7f73afd1372762b0c162109811801a257cf566b9ef4f28c168804f088e6e32a30dcae2635442261a260646061fe70f1f3dbc5944f2eeabeaf67b432e923690c06ec4a3c730167966560fc1429b0a3c6ad9c91d392eadf500a53d02fc52bf29b12d06106ee7c1e48fd06c0f346a5c94a438ff8cf925c31e6c36786c0b1c6ff0895f3bc15b2c92b24d46b70a7d16ccf963b26162bbf556bfe3fd5da8025ebac3a51eddf6c7d03776c0652d84c9907719e9e5edf440658ac1e449567b624f103ffe8cd5962c7b5bd54af2a1a7cccb41cdd1afc7f5e2723f49645017ad4d21b4682e3cb7db8f85371db88d2c2dc48ee7cf5587bc16d66b6775b91c1562cb4c827520339229f7e469f244e212629b01c57731a2def744ebf9e5d14f38eaaf4918b9042d8c8384571a278c35bcf5a09302922c7291a8d2808e169bd6b3ea91996d124c721215533a97f570690a440086a09b08c9dd0ea19fa0afddb810296ba626828c79bd5873a7bd1f3162c7c1f598b57ccbfec02c0d278289f7c5e5cb26afc522abde9030dfdba59352b2224e1332c126015c7ca1576c6fdb93202fbb98b53117c9b4c6557c79351928692289e02886836aa8551e8ee747763ddf83f9743b98186f3469c9490cba663075e3ecd1bc807932e4234e547036ef6fe735de597f00f933c3ac0d802329f8c4305690f26d96e73d79e232e68cf7483db327e551ddfbbeaf3a6b4ccb5b7316d8f2092bae17e1988be46548e976ddb128b154fc81fa6e4941cae0f8dee4502ce3c2f58d524372b0e0d01ad4b9a0bf35c316ad60d06a35ddce899d78d41fa4d92b54c963a35275714e5402f9e91bc3ab9f279c9c9da5c02a1b7b79ae45c901507040c9a83aebc04bfe82df7748c3d07f88b1b2d05064ca598995e12481504d9cb0fd0becea0ebfe5606738d423cd879089cef651e149c28194c60043d26ee6d631a2e17256a2f29bf093d20084296e36be656b1edca05237b071b8c3064fcbd647aaefb864d0d03c516fc063ef0d2a279ca9e1ee0941ac09d96ea57f7be723843627f2b3f5267963ab95266702d7e30df621d858efad313b061b70a9021d02b8ad6a38f175c9f6e5a49c2fabb1551d575f2f6e6c7bbe56df25617a92c4444b27a3c95821c7c2c740f908c0c36b1d2eb57cfa6f43ae06aca1ed97aca959f0be77c2ef4471eeb83a8a648a9f73e43b945ef641b694af26c795a4e17efade530d088db189389d621cf1ccf973be9a3fafd29fa92a79f153a5c5788b0663ce63ea5cb545a7526352f6f7cc1a3eb4a50f67e87363e79d8658210c57727d8c0ebac3f7fa9413f6d781e4cb4b72d4a1e2721dc38e42cb4d187c247e15adec46a84248a099852661b7921c1d36719ec6ea88d9c29b2d75166829f27b1ae1a09f3e95a17dd9bef7f521cb67ae665510fdebeac3b6a566e38a68273d421872eaa2e138f00b7618abb98175309ce35b3aff914a9440983164ac2c0de266190d6679b86bbb4ecc431b3f28fb3889c448afcf02fb34bb0fd9a8b2a1c8bcfb03a61540e69515f3e5d38b62b145eee91bcfca92355138fc2bead4954eea76e9c5d0d66bcf57516d50ff6c65ab91be527a0a2a6770bc0436b9e2ad0a320bac5dbcadf251a2eb6b929595377cbc64038596935fbf048e98ad7262a578bd9830c480699312d34ae9923d3cc68beffbc96f605a6b67a7d265621f9730b19c97abff47c4211a6be3c28e0358eb0638d9c82301f425340978c2d1524c5677c582eba5b217951f17382589c0a71a6024270f53e353b6c36dc6262b4ccf0fd93ee44cfb746699e26bd1c1f45887d83a2d5ac22dd6eb726fcb506faf70e2378759d3ade00d9c1e404e5c20dcea88eac87cfd4933d6d9705587e39257f7ae322581d50412f769c72ab6257f6be3018c9ed81a2c68902a0d1818caa30c14be2b7b10e280f4058b79cdb0380ae66663db4a5f45cf1b86f47c87c0ecaeb19cbf6be8240270e3b3f59ceeacbce3a800120475cdfa4ba5667c705d6fd1a1e78d05d9e5826805f01d423cb9afc3065b9db7d49430f823954f20dd774d68a8dfd3f3d176b1b7916e50de544abab5daf313a8cfcd13b88978f9bb83bb591ab662372dd1dc5add9e40ae0758f497f4d47716f99eb9cabc79b7c0f0cc3b2f7e2198eda744a0b8453366c560dfc57d30be20bf60c6e75a23b0986e48087b5489944f3724d4f0b752d9d8dbc2311ab114f108359744ef1a75f0e452ab6209c9271fbc0a5f9e52f26f7964157679afea28606c16eea353f0e8836b680767b3157adc25d1c78cf5c5165d45da7bccef5008d51a24c077acf0407f6450408a0a174478a318cb10085741ace928ec6e34f37c3a7bf4b8fe94e35d8b342c63c49fe9e178f382a8c4a63d89f64f4b7bbc57f385c487bb19678b2b715221c0e7d5720be8bf3145724d237fa7e1e865258bacce9fd6f9df40597d086f090b787a46c506bfeb94d6c1b201d9bf164525eb0d26a7c4ad4bf86ea98d415e6334d40ec65d822fa247dabc725c52fa81fa2053039f8518115ed5b433349c82b594c031c88697e393ddb7ef11627e0622f75d8f63745e171797a8222b0cca7f75dbcc01f63b9273e543558b0f0971051ba3fce8cb7941eeb1df6424bfc27a02c25cb7cb3ae7761053ad3c26c7e1383de4f7d101ead384d66e34acaa01b950884433304dea9840c0b746fc5c47d0809e218c006f81d9673821622b02948c05a07482c39942f51785d4312a27dd8069e870839ef38d7bc5694c5cf50f479dc069f187795994d5219691d946e694786eac6558ad3ab585aa15cf269521bcac684fc268dde2ad4c997d5172b84b297d7f7853bd011569f281ea68eba6da3680fb24657cc195497cf748ac3a50d1542cf6474f807710c77620888b40feae51a3547590d01afdca51082ef7e451a62be4eb2df00673157b823c72d7a68586bd251b077f1bb3e04bbc8e157a4fc579ff85ea68c023e225f58e3067ebfc3df345d9c6ebbcdb94c823faf762879e87a9c47708ae6887bd9690b7183431130e030d2204e8d55240da7c3f5c1926a659809ab80b2a6020f662689cad31c9ecde414b61467183733863784a0187f52bc1c95587fc7f0589f93c492c1d78f2eb20cd7acd68ec53d88b05a6a2f5a18e1e2382040db31eafcc024649e5ddf7b0b699bd9384b8ed10b6983845ccca23b9e7f1a52a14ed1538eb544b17a0c8d4f9462ab7df0cda0bad7f20c6b453d4fadeea946a817309f274b1f87eec3c01bbd06753b85c7f9d496810684c83d25fe0bad1b24bd1d04a365ef6f5a5aa99f0de27d725ab243354f5396981b9da82412806ad68388896e4324da407c006f3803b6072bd6e0740e34d9d9431a98277bed2aec5b8b05097d447e5dd2f9868a81209c05d52bbdd60f9bd4229b9851d289bab12e9031f658b2827e032e2a44edb5674b1cec8848d653781052d21ec9efb1093751e78ed4bbc6761157f5b03dcb939b2675950808cd089bfdbbc543323c03d71262e11e8afb30a4de425da75d82b7964d63ac8243b5596f752df19eddf8aa5953ead12e18e1423da7911251911ad05eb85e4e9863230b56197fb8596402f269d06236d083748f54a8e4c73ad417abd2156d4f9dc0742ddfb79ee0a8d530ed39394164ee730cb2b03a1154a1dd22ee82e064ff36ff73a200d9e3bd8a3f144164251e0224e28a3aca8b23a7eeaac5c6da914ac889eb884bb4aaf0e3a503dfe3b2d76b144119bfe8832ce15a5f91fa3004912ad730953a40d6417ffdbf9e970d60aee12037d9fc98eeac3b53e3507599a7252986fc0458193a84393132d60dcf0d1c37647c80a77cdf8a5e752177bce62fb8fb312bdc611a8233caa487ffdd41cc150ef0214f8947ef1479853e5eb3cf56f8534311f0ab49be0a025ff57b435459f0b30bb63dc477ff6184842828a8cbb6e821cee5e42d585a64eb1749d641234fa1747ae3f0d2fafbaeb9138cfc35ea7188826f0e8d6a035492319511a50371c4b407956fee9bb608cc87b345472310583492ed3e26ce9b83cb93a4e90ea9c51a115f8f51d83e44f58f8f286ef43ba180f887c98025b03ae5928d200333e80564b94a9170912c27630fba88c278d3fba0b94c96aa1913847f043376128cc7e83ba1ac5f945da9edb6b5a0da48593da4ffee113bd27b0f4bec753446f19b74981a120bad1f85729b4e04c4a531920e118514381e54f08eec56b8cd791d58f39a111c0486362559b588d016c42b0270fdddc1ea3aae075f252c11b001e700d87e70758885497ab33dc7b1282c94d330baaf76dd3b548c814c884243935e17d9a20318cfa09391aaa369a26a9b451579ec59c5367c83a0f96ee8b7740c55c8f01cfce469a0fa09be1ed1a6ffe8e2a46ca9cf386089d91547fb3b36ce26914de17c643315c0f62f690c4314dde545f3eef88d786ff7f284e3946e7547e89c71e6a571e32f584d04b514e3da69b8042aefba2ac1f8e851f4bf0beef1e0635e03560d24f21e3b19a6cbc3be9068d543457b4ac8a090d35f080faab79a632b096c9a91ca0de0462e6cb5d9d7002d12f1b7524f3964ea858897d137464ef879b90175c0e8f028792804d9021948032d0b0788f83b4bf3452b60762ff708cdc662b21fe1acbef22214aa904dc1577593525caa8f939a0c84999193fdb1f0e25b02a2a23dc6d6eb59bbfc0960c6e6c7651b0afe095afe49fb8d04bc2ce73446e28b226735f158b567cc1cf8e883623ca25b0988470550278ba1a5436c18e3f6e5543608b69a723426c7ad9d376cbfbaf64f4a09a86496020ba52377b3712e3c27bb87272eaa01f343e8c58fdf331788c4d4d25c682e04523de5b70809a7256f7b6d17aca47e226758d6fdaac7c866b535aa7113be41c7df5c51e8424f9f423541e3fd0a955c283ff2bb9d5cf53a46c2d22f450e2b8a51c7606beea7ab6c54303056d9ccb70883f66b26b4cf3436f0c7cae28cfd168a3596c2824b9948164cbe25a9c2ffc499e7ab87a2c54e2ce597d3162f90571fcfcdfad4ad23f67cc2f5ae772", 0x1000}], 0x3}}, {{&(0x7f0000008240)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000009300)=[{&(0x7f0000008280)="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", 0x1000}, {&(0x7f0000009280)="2decfa16ee40ef530ca9577f2269e2622ef72591511cbbd39fc8a90ec06155c6e64896e8a4decc58bda3097235346ddc680a43cb93afcfd2aa058b736c62392fe9b37b834a29bf34bf1234f0e790c7a94ab050c9596ba19d84fffc7b81d53dd0aecf02e46869b4", 0x67}], 0x2, &(0x7f0000009380)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @rand_addr=0x1, @broadcast}}}], 0x38}}, {{&(0x7f00000093c0)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f000000a800)=[{&(0x7f0000009400)="e64671b3e2ee1af6b6c84161b364182380a144372a511e32f31d17ca85b41d038a2f0cce3793", 0x26}, {&(0x7f0000009440)="2baeab01732a52ff7af0fcae6784a31c6e002d2baae3dfda73714fa086e1f94b7bb2a0c0169cd206ba4f5dc25ea939b9046cab7f9d0c33ec47413b4dad70ed93bb518a88a04ddbc59a0cc636f3890b62be5cdbffb101b86a4070cae0c02b38fc7b92a58fd64b0f580f99ab53cf227ed458ae853e68b3499eb63d483d8be38e1eed2122573103e4a512f664fe2bb72b336f97c3fa8bb68c23ec70cf9bc22b2091c0046088aeb0f9530ac15c6d3e0482285025d6f4d51ad29c39893cb31acb", 0xbe}, {&(0x7f0000009500)="42f5f72aa9fec666bbfba3b2f0cab8d92fd1a5cc4797073e3d990ce477a451be2956f2966b4684b848842cc5fe3f0f3bc4448c4bc0804a5fcf3e2e327eae462ce81ff6eb5e96f3e53f1b1cd7e29649bd7c2f4b2b8e2f65ba807ebc9d23199c7f1ea8f6c087c3257cd0c4d7ab760ca6ae458099a3c8e890128db80694e98620100db360a585ed8b09d5a47d", 0x8b}, {&(0x7f00000095c0)="bc46789e142b42df04b2f654cdc441a7133701d86d1bb3c1c27ad6ee47318c0a704b194b9a2f53ef7175b6e73f1bfdcdafefa59dffe1e32048eccceb1d6b620b7251ef10", 0x44}, {&(0x7f0000009640)="2c2548a795d0c28c3978cdeec2dbc5e78832ef89ec04d0aaa1d88ac1f1648e451673f50d632db6d00518b1d03bb5cba0f76da7ef030ccbff45a216539b49df72a6577a660a69b7d6f5009ba8cd02d691e92e290eb7", 0x55}, {&(0x7f00000096c0)="5921b50092ade721248a0ce2e5649e50aeb198bbb05bff67", 0x18}, {&(0x7f0000009700)="f7cc0a67af2590be5560773f69d109332f620172fd9b1624d323e7e300f4b99e91df11353839321c1081d75ee76e09972fb3b2f2a12dd4e80ff8e5b1c64889d549b80a24", 0x44}, {&(0x7f0000009780)="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", 0x1000}, {&(0x7f000000a780)="5bc7b0d08f451263e3cd268f94f85da98383b4aa241940d3d8e3d52c68724f9c09fa7949b11d162d084495d08b10602e0d35ffc92763420ec7d84de3e80b69275f1fe14535108291f241d63149ebc387e8", 0x51}], 0x9}}, {{&(0x7f000000a8c0)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f000000bcc0)=[{&(0x7f000000a900)="b4b38c25f6a7590bf4fefaa2adf9ec300bf013bcc684c014199eb6ad", 0x1c}, {&(0x7f000000a940)="278ed0ce63004971798a948afcc5df7182f697c6a6ab6ba15b4147af0cb3bab790f841d0406e2dfac1746e381a1ab97d7f40662f2b8d4aa1d8c24e832d4521fe5bf801c15ecaab1326d48fb2232799c48cc4faea6a0e6afd844058217480ddfaa65944badca7b1b2eee4f4db0c1e8bcc7c0fff08d3d4d60c1c763050f53e3cd221f23292ad71005397e892086ba432813860cd96d6911ac7e0da36f3af16db6c97417dc93206d09056", 0xa9}, {&(0x7f000000aa00)="85557a90ec17744cecfcb8fbfda3911ada5da554a8419563f2e2580f2f0b3b4388cf5eed2acd18d7b1c99f583803eaeb8c3e1c26258ad4a142d6487ff79f90573298bf1baf", 0x45}, {&(0x7f000000aa80)="e0be4a39bc04a4ec8e4d1d22d316cf57936fa8dbd03f3ba86ead26a1c1d9b8fb00f41b68ed6ff36d9658e75f9a66443b76fe0a9e00d9fbaa29a5dbc82fa5b12dbde058bba2b3a1966befc6", 0x4b}, {&(0x7f000000ab00)}, {&(0x7f000000ab40)="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", 0x1000}, {&(0x7f000000bb40)="b772dbd9c9692e09178f1454d88783ccf58d80bf79a244fa6dfd81bfa5179a7923a6c1628a3895e6a1183b01b4bdfd53dac9405d4e43e5aca553c762e306b0374230188745cf30f87d041fb6ed757984d8f48268883c6b24a2ae4b2fd8a2dab3e3232a55210d0651277b763ff27970537958f0cac47e77ab3835ec0fea0e49fa079e7b763b68c86f0331038e5bac4faa6a2f9fe6b30f5b5fffc0ce0c07254d2f", 0xa0}, {&(0x7f000000bc00)="28e4fbbfc49b00ce292e53b5844a1270a037387269524f810aec0b64cdb9f58579d979727f4fca5fb2cd4dd3cb04f470ed30fab89387fc2f69b135e69989cc5947804d8bb814ce29ab5f98c04b448ada9bc4417dea17851037a46619934586cd3646f250f71bfd0f1b4cd8efbd76a098996c67d4056271862035b32bafe0a7c34be21e9edf00a7120c0a838a61f43317db97db9d563b785eb815581bc33cbf3c8b", 0xa1}], 0x8, &(0x7f000000be40)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0xb8, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0xb2, 0x0, 0x2, [0x1, 0x9, 0x7, 0x3ff, 0x3]}, @rr={0x7, 0x7, 0x6a, [@remote]}, @timestamp_addr={0x44, 0x54, 0xea, 0x1, 0x4, [{@loopback, 0x3}, {@multicast2, 0x9}, {@multicast1, 0x5}, {@empty, 0x4}, {@loopback, 0x9}, {@multicast2, 0x5}, {@remote, 0x7fc}, {@broadcast, 0x1}, {@multicast1, 0x3}, {@local, 0x9}]}, @ssrr={0x89, 0xb, 0xc8, [@rand_addr=0x1000, @remote]}, @rr={0x7, 0x3, 0xbd}, @generic={0x82, 0x7, "c2f28ac86e"}, @rr={0x7, 0x1f, 0x19, [@local, @rand_addr=0x1, @empty, @empty, @loopback, @rand_addr=0x1ff, @remote]}, @end]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r16, @empty, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8000}}], 0x108}}, {{&(0x7f000000bf80)={0x2, 0x4e21, @loopback}, 0x10, 0xffffffffffffffff, 0x0, &(0x7f000000bfc0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x5}}], 0x18}}], 0x7, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r17 = ioctl$NS_GET_PARENT(r7, 0xb702, 0x0) ftruncate(r17, 0x100000000000) r18 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x10001, 0x0) sendmsg$NFT_MSG_GETSETELEM(r18, &(0x7f00000069c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000006980)={&(0x7f0000000280)={0x66e8, 0xd, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x2108, 0x3, 0x0, 0x1, [{0x2104, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0x20f0, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x1}]}, @NFTA_DATA_VERDICT={0x50, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xb, 0x1, "001feda4dd0fa0"}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VALUE={0x57, 0x1, "fbf6cfebe523093f1ea2bda0096c16c6c4002c5d3261c2539c7995e6a3cbfc170bb6687e61dc9f0200b41ae8bc195a47c11f909fac1df29a3932d6058256fad58c99bc9cdad7ba6c1375ce560957db4d226d10"}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x45a4, 0x3, 0x0, 0x1, [{0x20, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}]}, {0x13b4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x1344, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xca, 0x1, "6bb798f67f74ddcf1b235c5729aae4904bf3024b2afa0c7d2d0c00f2ebf53af7429c2b8226c0080aed29a77a1d60c116d82762c42143a14d2d97d7fc1b91cd1fe81c31ee4311f250659effeb748168054d4a89fa83eea95352a26bd05fa51e4c13b024bab1782555ad3fb1fc6ce9f14107c20b778a0f2c3ee1efe5a31d41f58edfe18850778f33f7be0339f165c201c096d43803e1454e54253fc0007c06fe432709ddf89d2fb733c5431ab56334f7413f5f3081609ec0ad3ad3da20e758ae065843cb28208e"}, @NFTA_DATA_VALUE={0x91, 0x1, "1053ca74f1097858ef6587f6f6113732cefae3a34972307542b7571ab33946b0e6b95d12afa4a1c2621b3725aa28b972fedf2cbd51ea4d6b314c4aaed84388c7114915139dc6a935777ccb115817dbfa538ee4aee015025fce3c72bf3649e1728f66de2167a59a9dc3fbdf37bd7fcf8eb93894ffda346b09d22314b86e5ae46f688f9d4b143b00529b803d2960"}, @NFTA_DATA_VALUE={0xbf, 0x1, "e63235c45184d8213f66d13705076d66ec60b37cf83b8640f45865eb6c792fc9e3ab0b173c94743d29349ac90fb2596c01dd1d1d8551d5875f8de2cd6c7ac78e5aedfa7bd97b89017f1cb409ca93731797d77ae3c2a0e1d90761dda548ee7fc4e2824292f3f5e47a5dd04caa9b93fde84dfd40a8cb6891af82a759eecce0126a733a6f860022bd1dbbf21f1bc8ca4e7cf72ad1cd77c2fba702ddac7cbdab6ca370ac3db0acc945ca181de0da5710497e5d3d8ecca0f0cfc7938daa"}, @NFTA_DATA_VALUE={0x1004, 0x1, "baa517ea8dc9a3cad19624b801ca409427ec5384949106b2d53986e8247465a00fe653dd10aaa1ed648bce93a592268276c93ab84a46913212ae8c64f004550902ad3180c7784f584cbca2d1dc83dd06da3581ef4b90564f4b67c423fa4265a8898c36a3b943902d1d00df08cd3b46a20b0dd0387f35c26ac10b97e4a08078551d0e0c61964325ecfd8dce42ede2ccdca477f4ffc724dc54228885686fb2bf2a47fb35943bc537864713da1231e0c0cca58eba1c0322235c4cb6efc8dd898bc72f85901f5b9b886d86e04b538fe1d3014773726745701242fbb32098cec991a30007c96ba77a2f6c46f762e0f1a2ade2cfddbe104b89f205ebf800c1b0be4fd6a008b7ec2ed27e70740937829aedadd34432fe074f15bf9adb08c8f3b3e46e8a075862953becacb9eb1ce96ca282871544b0a9b6f848d04b151efecd73d150776dc4356c0494f56a769b769dad0517f3cface3a8fc928aa87027b6f55fc131be1bdd954f2bbd508c992dda5389d963cd4e232af99e997b4eaced8f9940623a20d67617a35b93ee30c5a67b00733dcb8d901d61a7e1d46d8537a5bf6d8fa9c9ff1168c878d7e96443255a8d8dd6d59f20dec4f4701a7bb990ec327f5341fbc46bd8bcca4e91404c57f716c5a221498a69e54c0be1f4e2fa1650544dc51b1d3bc1fbc24ceef047f02ef7047eb40be660681ee3ca6a4c8081904aec405160b685302562d1b4f4c5e7c352969493be980b4c1649d41f7dde5425c963d617950560e842ca3320c56cd0b2baf7d193412fdb985bd5d02591e3ef8a6668da95d945f23452f45d73fbc360ee2bef750e16f12e8d063965253bcc288214e7e299d58f40d298e6967172a05d5b3e94e0b8c0a05558aa6f6129e1316f26c51f15fec8ef7972b3a1003aa43f86dfda7b80342b66e4b1ea102e61e9ecc600de510a6c04c946ce3bc29e2920312db942d9769bf06db0a335935814092d39b0abe97d87cf3b7e28ac1467adb3aba8d690cb3b4c8e879dcf79a9f4498453ab0d638efa6522999ea778f1ada2251acff8a41f963ba7e8f9e038f0c11412cd9b12b67c6ded66cb10a8645378052f8407c9a424ff713120832abedf7ed4d618223379415e711c4a603bd2a6682fba064cda0614b765f96806a75bb5317891d7afcb66da8fa05cd3d3dca02540789fc04f3582c949cc388728c2121005a8fdeec94be62bb126cc66c7cf95bd2694f7b93c9c8c4b6a7d878363840497ede687323b38640688939c2e2a5db10d049d158eeb5b43af8bb7815004be235d58f983748a9cfdd848f4067bde52761f7c33f6df563c9c54efb7721cbc157b1e6b9bbbabd99de1f8ced65c212bcc80cae383d25abad2dd853d07603209cc4bd60e05472ffa55c31f657bafc9a87345914c50dd728471b4df8f6ea3ee272fc5d9998f7693a0069e648c26e470e70b49016898fe7611c06c440943c306ecef6d59c39380e814f3fb2377406cf58c5be6882d1015237019493ee380baa7b34587de885d12b51d9d2e53d9d282352a026aa7a322c08105a6d0e48e9b86bd3cf1c06a8f8df920519922c21aa983bdb74d25e4c5fa6ee4b11be27abf6fbed8b2dd1869dca4724cdf05ff6363ff83e76ba54f38b7b25357e4f5303599cac278c6863282329580041852c41d4565fd748457b380d053bde362b58c73e65ee53509e58bdb45b8ff1e626b247feec547b2ee54fc1290de3b18071732c1b08f76b27ad53be2f4c4b542807ff1f28305f7daa5bd6e4c11b345cd0ed5d0445490e2947a928474f2363da37363c3be4b9437e9bd62f26403bac0a44ce2e015ff7d9394141c9ea11672c63726bcaaeacbd87f422e9904d407773f29bfa5bf377006c809c50604dbd2b264c131d3a844a40619594e2b373580ae78e1aec2bdc58f81ba7c1663f22bbcb6f05b94bc223dd2f5669766a145386fbf1100eaf5bd22344cca06e7762da4b89c1290172a5d40ebdcba1f138584819997abbf27e51ab6c85d68898fc65b81b0488902234bcfbfd5f69e955467ac73fad155cf3a9b1b0dea7dec25369767b829cd42862f49e13d99b3c4ac049ea2b16f3d713bbaefb68efc7548aa37f3eceaf8171076516b1ebb544dbda10f2be33f7f0a53a19dc32f7daa0556fc99c91ac6469428cf690cae19385a0cc1e6f0b101a7e81594df0fb7b275bdb0f4ff38815effbf659a412ddaaeeb5c9ebe6094e78125e8cc800a0441e7f12c0b880e7a7013da4ea63a7f83c524b21fd0707d0a97512baf24e832e5b337b347f440881405d0c4f74118e74c2649ec73f1a2875f645ac4bb2d011c00002c8096fc5386d4fa09ccf0a825f4e6183562a0425762cefe5bb4cebf82aa616941c0a6836d649b640ddfab4dc85c5639f3894b92928bf96effa470ca8fa8f32f5e5a5bb4da8715d13c00f3f2a7695d5e35b76d3ba3735b7b2db298b1f3a211c4a0ad588b778a1d087f56e2895141ba521a8d805cb450862ba39c4c6ff56c81a1b88516c6842742ad15d5000f6cf362e174e2a779db534c49eb1a03788a85f67f95771e8f16a671ccf7b9a60777ff038ea578bd6f9f49fc4a113c3bd86db173ee8b3e620e18949c76dc46db2a4d00fbf7c5ede907b1457dc782c61f1cb50f4fc819b595b34b03027e8a876953974bf5a3fecceb31b1a37b78088b859c8dfac76126c67f0806bf26007bcd8af354bec7ebcc05ffd82aec8ba901800b1967cab31d893c2baa075d67a9d10d188ff05653a50e47da00d2989bd0e5bb578cfb8b191bc87544c8a8f57d252ab694cc5e4ccb300254c1f31b7ccc4d41fb11f4dc9c277f928181742219a0ff34c9c529c91eff52b07c67779ffd0e9ea21601a1b1375b711a77f609ec7aac07dcec264e92403b4176af23ac1bebd3b5a8e62bd04a070e70cbf2cecdb072bb0573b85c8aa7d4663319483cca94b548233b342be2c266b6928b1ac167a79335e643284cb229d9d02f42d8fb031e4477dcf6e6997cc8113079a2ca43e5a07a60430d17eeef86c1bd680074c256993cb40325739cfd32a603a819bc7cdf31ea24d978c7f11fddbbd5764d82653e699aa7a82663990bfd58ffaeddf81188e7a55d9e8350274598eb90d8cfa90c9c2811f5b8d5803101c1d6098b58563c1b88e69d6c94dcfd6f7447b163073c66e650085ad8e9e6e396e85f4df8b19850157aef76d51a31a337e8c2b55ce232c4d8d6f118fbb4028847d32a88401256ffd4dc3a611c7d4d63c9fe07704ffb660a8895e6e8abab4db7b6f7856f9a9cd263fe3330bc0fb69bd9d239a7654327392d72400ceee8b80b6a502cb99806e072d4b455b1bdc7791ebe7d237cb8d0200b7775b82dbfd8838f97411eab7a88b4599e7f2a60f28cb1f6f5056f2af2a55b49441e38edc44b5e118f79747c4152e01f04d8fc0b08acbdcc7a14fc3635a920d62c1c282d343515b39f5ed051a960b4af907dd3051183ee018de60bf950c59cc6ffc2ce646cdf65a36cdc55e8b3a98d655d589f2a90803f3ed4c94cb77908574487eebe045ea6f819798b6a3ca8d72a87456ca67609d5a674d93754af4a19fdb1707b0105987856254b0b029cdf3e990eddcb363d9ae909cd92799e26cf9688ed57d16d780a46d8d5da5f55182339c43f2eb37e130b136140191503c2b671ef5dc57f7a007efe0bc78fb56e6027f7c5a8ad508ce00c22b17d34346e2b0b488248e973b164505fde7abf6fb47fedd347161564ef64359cc5a9dd2a825aedf137d706ba6bfe169a73dcc6400d7d9abe972a17f491f3f23704ba9c374edaaf5a9b1de9998d452f44e0e9ae3c7bb2c8c1c4e13ed3b05d14775e6265c937a180ec39b0b3aec24ae10769887d56f73b72f290e0aba03d2ea87af65392f39e1251b41e50bbf794542eb5f3dc3c0770505f92c4d423b9d8e2ddd66de93956473fb3f6598fc5af074d1e2f393f7fd790545e27120e3957215fa31cc87e6be4f69274afe7a6aa05dc2cf5706a3bce544fa7b128ecc509dfb70ae59f23d5444fa6067b2a762b267ebbd9ecf5fa45d7027450ba670940723f6ff0d5982fafff777823bd0a2a89818341a5dcc0253ac5085ef66c1e9f821cc6ad1280cead4244be7725cee939529faa4bd810e1e97c60d4aff1f489c39bd639ea280ecc354daf00e772c1c2f7c59d57017fdcab436f0ac8f0e6e090cc6fd13f4b4b0da8629f67d2b93483e8cc3c57f60070369706f6a48475b2293546d830dd0fb4d793fe5f8eed81eae0cd3cd4ffe48d017a068c85cd076fdf6532d32328b8029c00ec826ef0383da5f98069f0f14ce70d18f28a0c4809a8f1a067a5ea0d99b519d10d30c7268ad0e01afbed12d108bc8e3e08c0355ac0cca93c021444fe4a2f6dac35ae3f041b0bc9af096d74b3c8e416b1ddb99c61af8b4fdea6b2bb98ccf5c5ae9269d37c2cb2bf69b8187abb744508692cbe7bba0113576257180755b7c1dc8fe68db7b4632f2e8df40bf653893eb75958a388a199d69a5e922868051dbe56ec7122039263976563e4e7891a503968261994c5021d600f6a876aa41629380da28e2978a379f4fb2f63d8b6e283a39babeb23220f1b51a707cbffe1a0465b360cfb40e42026de62a3600d4c929bdc254e4b70c49f9b6a1ca878f853c990d880397ec028bd1be11f39004fbdbcb6fd31e1e1d630ab6ceb0666bd62a7c4a1a9fb857755f0d580ab28ddda185898cfe397213a96ae1d1ec643d2aadb99b20e366409345c5328f9d31e5d5a52d03b929e5e22a011eb46746b6b5b74dd902e8cabc1ed1ec7f2f3a8ee3e453836786a9f1a13f4e8d2e8aa0d8110e67cc751d2ddd3e82432aa295fb19388074afdc30d32e3b74cfa215c0b040be1577ab914d60b9423577c2ee8d848a052c5d4be4ee6c1f7aa4ce6b6f90506b351cc6d245ac98a410f0056c9943d7a411e199511eb2858cf15cec7c9ee81026f6119cee5f57c9096236a592e68e086401f90411d9e8ceb1f6b17f678a1b9d018d3eb67fce3867dc4eaf284981fc4870e2cdea03e95abca10b42b7deecbf1ad02c2af067021fc07010ada43813d0364a06fef33fab99dc512e0928c6df9744b32d45e24b34936a883bb2a1f9a249b9f09a7110e7fdb7d3f0fb16a95ba2a5a98d83950317d7b883e2f9e4aa50e0223831964ecc564cedc159ac3b4782b0ffc9b998fa6eb2243111fb9eb2125aff8737bee9b0bd48e98598e6b12f1e46705ea2c5acf8a1b8ffc0d3d9f90ecfb39257717cdbbeac4ef6ddcba22450110198f9764987ff87890561bdb86a63cb5ba3325b7c51d0ae5e8e0ce0e92aa3bbed1839551d2a375329d66a3e9345efb5b7e7d52b030fd5525c5397fba48ef7b0ee2d001b6219fb2b8a923bc4a420bdc39fa0a0450367bb7d3f01733bfe5ea0487499b3d259779b4494554bfe3d7b24254f59144e5a9312588bc52a49fa3acf6fd659059540ca83aee149a00f8fb1fdbd3718e1f53add5356b7046e512ced2069ae43ac006bbb21f0962486c55bf492f2bbe77453cb71239a0ee39318570108021d6ba6e0f8a80224e6c287086101f3a0968018fa7c4776abf43bb13f5b7da26b7d3cc1739bec045e76d40a790f374464e3790febd4bb82adcebca8fab9bc230fee67f99e283292fc7551dfa877b1064c8020c3786a3ddb72ef0fbf636ef7b8e0e9d6441a6c8ac99d137babda2f6b6dce6e8303529d9d9ee73f5aa9887a181591cb88a815e9188770f3a9c4413de9f6ca9f6ba19a208e774710790e5b3f58ef29333ff11b7a203e9dc2db9a175cfe640cd1b86157f44b10ec5346dac8ef9a679"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x4a, 0x1, "1799749ce9588ca1861f63131554742a5e3726993d314ef6c3a9fdc0569fbaa9c2ce3299525d9e0d127c0aebc61ef7af2547fe6719a9c1ea41338f4a54015ed91e0e7e79b31c"}, @NFTA_DATA_VALUE={0xa7, 0x1, "aca802dd4cc27b229b1e087a6497b0e1fac1dc6f6b20e0cfcfc4c2eb80b7415e0901789228d7f69be9a8577409bf4ae6673f000a03b3476fee94953132944b2f888fd8ffa8d11649c9da72021aaf2111a03d0711e02f42d4802769914929b4e89b44ebd25d8ff964f57d6f02e737178e7d92422fa14f197c4c667d17566759dfb086388e1eb121015f04c7236b6b593244acc758b7d6d5ace8d1bcfbc7331f0ba41251"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x9}, @NFTA_SET_ELEM_DATA={0x50, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}]}, @NFTA_SET_ELEM_EXPR={0x4}]}, {0x30, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_DATA={0x28, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x21, 0x1, "362230f998b18d0c64ed8d3269b77cdefb9c7527d200d9310d2e414000"}]}]}, {0x12e8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_KEY={0x98, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x4c, 0x1, "2340e147feae83f9488c6411dc1124784943a184779fd278bda8b3927014c18fd92f4fffbe595be7e741e11108ff7f836e7d1f8c7a9ebeeafcf18d4386dab1c2112dd956c55ff863"}]}, @NFTA_SET_ELEM_DATA={0x108, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x64, 0x1, "fbe1571ed47f0f6f311e979cba99e6eaf7868fd4cf64265077130a56ad17055fece990a959833343f0dc907a2d6d0fdfa04bf1e6aaae00a951a1c7a011f46a3d2766fcb796ec4794595692d5e3dc0228968bf3c0563788be6ba8c1255e783e20"}, @NFTA_DATA_VALUE={0x85, 0x1, "779e06cc4703dafec223bc89c524cc6617187d9906e887c564ab881ee7602e3bcedd2a228ee39e1187fa1da7b38409a4e4753f2b6ebf4c7ed9e8c8639ba7fcaf66fec1874432cb985551bdf86a61878d6e1590599366ddd9d3b70bea02004d80b23a412a0b58b4a2511a6d7b6c872448f3f13841540396e7b0d5a352a68641dd5f"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xfff}, @NFTA_SET_ELEM_KEY={0x1110, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x7e, 0x1, "1d20a1c1c02c067fb15f808fcc54139bca9cd8c74606ca7f6e7795ae1e179133e62015ff389acdee02d9ef5c41d9de92a1e2195a08a2787840716a030acb890ecea016fde28ac91c338d3c560653a749c7f565c3290d35ff032c5eb9d12a8d3b60902f5817b38fa4bd11d62f0ada986a823fbd0c6d7ff037d9d7"}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_FLAGS={0x8}]}, {0x1514, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x1194, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x1004, 0x1, "f01df881d1360fb6243692f3d0dedd96973dbfb76b77da276a026203b2cdbe30f35e8d2db01225f4255ac977c3ba5619b028cc6c763c786a508bfbbb5f9dff6cfc550a72c3ac93d2fcd1bf909e18c93f7599a93651e7628281360df7ed1029c181e7906ed33c8cf80fc988eada139a007e3c6e64e613c17cca26a50cbaab94b2d0b6e3fec3e8d5d87f286587987fcb87f082f162921747cdb92611b258ade064a7b8a77ec831c89e9b23d80e2da61cf55d0a4a19e22eef4c3d8d411a778085c29d1b4b8b45725abeedc248c23396aa9efa7438f899f7a546bdfd9a8af8d7a1f3443c1fa0a38ada8cfe2dd170d1ca5aab8a6d07a405ee5eeece6676bef6173b68c95f59e7516ac8c028ca433b24fc9ab88cfbbb1581645b9bccbb1bc5e3aa45cf20d579fb7134b230397063c193cf9976842c9f58b7552726a8f7ea544a164fc148b3db2b14e34822a99de79d418cc362863f933307d13e3a9186bceffed9807ba5c4d879868683c33609d339fab79eb144b7d99113c78ee2ed9b74a97686e2c67174bf22fd8d9fb75aa93f175e1942cc6246e0c7d94da3cd6cf7e67e0a62d03c47aaf46e88b50106b87f9a8cb12ffe62baded7effdbd0101a2a4bcace81c9759ee1a810c45424a64f6b3b8606d5df98f855aaa7aba9fc1d784aa9cb449cf18852841b821fec95abea3e94a63008700853f96cbcfe349d05e32ad3f9258461f7a578265e6330fb27733513e4ed64e4967b491083ddec3993de7e4c111f6447e2d220e703ae1c1cf8e7feb89a31dbd5b66b9e60d14a79098ae92eac7382c89da47592bc18f8676cb888884ea60fe7813ca9835c966535137ff38118d89bdbe1eb37f7ec0656917886270247a8dcedb6f17b9647c43f061aeeec5980d8506b8e8920fd1e48aa438bcb33cb7123863cd9f92ee3de0365e75f7f04256649fb45d853e226db9a3746d1f9f9e2c888496d4a146d5f1e04556eb38833cc677889cdbf080494b4caa2c89b510cb2a8e97c0831c16955c7f671f06be148b9cbf720b0210c94569586e628f774000ea313434155608081aa44a38459714e5b49ba311e0eca73de6149401ace76b810abc6d38753c7c85a29b4814225bf004756bb5ce5b11e782ff1d4eb0398287ff2fa6f4a8a1e279a25a06093186088d8c1a75827bbfb1a0a3d987b09e811c96db645a9803873464b560d0c67ee46499efff43e0783ae1dd29f11d1bd11c125fc97c4cb1855876aaae3b9442c9c5b2541d8cea5d3714ab90ed3260ed78a291e75f2959a154a02f6cbeaf299bdfcc5f64aa260b5c4fb28ee745ca69f51aa798a08d29f3a62b78c00b7db6a0c075b2a7b1265b1c865e1750470aad6a67cbd9ae6e8c10ff713f3a8c343722dc5f72ba6ba3ac40d3051da2498d8b557e7cf4bfbe18becbb41e8c4ece7210253032bc055de438e6683c9704519db3fc892cff3a4b4f9380404cd21043a68614d5125102ad89103eb7a589d0ce2a9706aee08a5e8752a3bcd6d913c8ea96412c79d7ed711106319be3f0c4c1270aba5b7c04d38c45ab76d77e76097b44f0366ea86af96fdf4f441bf6b3df23018ce71a4603d5315b98eb2d4d192fc1a1956e322efcdf6b59f9448a8e43f5048698b91f75750399533240a72f071b937a6577fa47077d115123d12662862a2fe788987f3faf12aa55e8e995870ad5637d271d0f30bc4651a6d1b21ab2b1644a2b408a3d1b09d7fd1517d6a0e9ea62ce2e0aac87f15ac879c774069a95062a27cd9c061cad81982e6ea75abe7837d2bd3538cb6c8bddf2ecaf006f236b697c118cf0dfc9c9a59fdba5fc10c06bfe11394a268e9341df1738bd88160b08dc27c3908cf1d2bf029b061379b49fd57828a6e76487176ecde7497312ee632fe2db239230009a9bdb6765b211f063d018051bc92f255ea5b54a6aa02a60127a8f57f52382d64b02aa16e0db605901892f281ca0862e82625b253021600d57e31c7441a923948b80df3661f25828ea7e36e5d77d28f3c029a7fc0c26e04cb629aac6cd331d3efeabe6889aa72d872cbf660e5f949ce96845bd93764444e72c76ff44b640a7183b2b01d858b16f4dffcc3809dbf5da7b1e80e5ce8a5233a3c0fe20fe0e5f1c3c0c7469fd5960269d603beaa659938b4b2fb88c4df79319ce661bc8e961a57b023461a5858b8d3c2a62c997e13d1d09a7808a3e57478dcc572c47c915618155d4f9fb0db9c6a64a98167c4717b4f8c8afce3231bc07aabfb988a4f31b723372b90693638da56231dea282bc30aa96a25631cc57e1c449eaf7599f671c57b87c2cae8ba5ef95ba34aba05e4d9f9a9ca996ac5d54adc46aec9f11a612fff747378ddd63edb9ac82c51de431f6e45fd8ea500e626e50476724f40cdb43f70de237836fc4fc3342b79db7cb2c32250bbd698ce769a45668e9ec497ee09f890fec7bb62f6b1aefef0e2f713445a6c1e54baed947370a6c3151f5fadb43c23d8f74aff9f194837e22bc92dad3c71ab37973d6168414f27b4f7d324dffe6651a8de22b0b8adfca36a3e07cae5671f12b6789c28b32f0a7f72b5c3f57dd132ee10d7da747c289613c6d5e636c4017aa98446b2ddcc553c387813aace42d1ca76fe450fee45c50ca602aaf057e32bf77b150aaffde45e3864f3ca6d155490cfecebc9b766c1fd66c3387c05aab6258b0a1677e47106d8ea2ddac1dd03fb37d86112f268d7b55aef95ac13d1e8b7589cfb8e75bce4efbab4a362dbf71284dc60c19778fd885eceac9d303585887c424e15ec13d089629240e66d46c17af315a8328498d94b58f92808531c943edd2ad09bc29961afd198a904b114f1c875551bae76a09e0395a266d6b5f897ae07912289abab8676f2398908fa5020948047e8ee7e697b2d5c26a9c8d227c045f0d65f4c5ae29cb93504873407ae7c7a82455b6a76b0ea1feb734c900a89baa3f24161d09d7e7f9c6c8a758ec8ea002236b6115b8f760a83a512f511de7a8d70c1f18c20002709c2e9ce89ec2f3437e6b9afaa9d956ccac3340ea6912dc79d0331ee1ed3bebc642f6f65e2eb3c0531887f32c6e1222bd52410b7b476883f7b5e7bcfb953b09f8d65cae876b000481f6a73068a441ec5914d5e25f38f0985f9d14aa09f7b7af1ae6095143cb8e1dee50b1272c4038173e69b621cf14a4200818b80e7ffa1dc4f2244113e33f45ef1d685594e5ad00036024f76006443dced66d01b84b361abf555aef9cc877b5d3847e86bbbc0a367cf23bd7341fccd24742bad47537a499a45023993f66c105770fc5823fadee04b12adffbff6b37624faa59fceecb169cf319e8e936c1a1fa519e958682e653ac7d86e1ea5a4b267ba9217bd6eb85158f2cce772d4e43aaa09a1af5d7f385324fe32e7b270d661f41a270f2d4dd8b2510631957df24e7e2946f1cd1ad464cc2fab9930e057f589a9b1224c0599e9ec4b27e4f9a1795cf02c8a330dbe303636a798c08dc33ac78e896b00aff2966a81af5ecec385ab969ae759669b4e720a9d7b452268605dfbd76534e779ab309d8cea8b65f4ed745c4acc1c1f147cc3594902a44526e7af00c3e00820ea9dddf639e945bd2af20a2ab3d71fc40ffbac8c565adaa97da47d9669b7a0d2c0c43aa9c1acb73858865fc4386a03f5ff1eb2ff95fed273906b32bbfecf2cebafc98304869189bcc28f98690b748b26c31ae4ea9b281a5d4534210a42d0084cb7e0f99ab810d65e5f50483ebdbcc7eb36a7f54796cfb26dea33998ebd1cd1c9f79033ce84ae178afc2cb6f80a79a296a1917299333901f04170f14ede78a30195bf5c463569ae2b25ad6add844293c14482bbab456bc13268aeb46e6edea707a3cfbfcc5646dea2837781c4a3bdbda2e759a230f8270c2981f7945227b8bee679cd2c80de4c37b951c7c630e7137a667fe8ddf78eaf06508a05a528c2d30b877d804c7cacf9a221baf1c015b0d438179b5d94684a58bee70a7927fdb9cd5d09a54a9c3bf7c15c790a12c8aa5f4b8695ddd3370ebd53109dc3caa3410e7a6a85718ff6b2a1724df4b7b19976b05db103610907ddd486c79bfc489ffcbcd851e1f6deaf984c372d700c3f00a8759018403523acba3e1fdffa0bc2a244fbe230e3887dfb7f813114c4978e3a059f048dce222b8b02becfc0b58abc137a6e3f644826707e2402f27aa07ee4dd1b5e83929c6a0dedc1710d321c39cb422d354ed4ab8eb33b1cf43828a8b53d92ff1868804665130802e15479c655044df3b8cdd4bcc0253264820e58a1a78446027b6eaa7bf15e31f8b089e57899a9cd4fea9835c66c09c2ca42a6940ff20352a5455d060945adb6732445ca2fe4e5c95e9f2bd4d81a21b826079917727cb60fb2d50333f848274539b73cf3b4d9680ea01f843300311e70c3e938b9058b3816ee1d1a997f0234e94fb545c764ec56b26d66c87eab914eff41c71a43e28df66343c3ccac51eda35af5f316e09b1479d56a602662d9046fcd7e56e54838806b86daaeffd820024b7d916e63a4b53fda4a38c4bbf03d97a5200194387c834513151eeef96637630b5b194c1d5fbfd49fef1feb66d05a8d539895d2475b817c820a0fea0d2a1b4383fad1ecb69612ec5ebc500bea3277e698e18cb108ef75e31bfc587d5b54864e32be659d93feaa2298d3248b2e70402b5d9477526ea50b16048741927e698a4927a5082603e8fcbeb671b183fc54b9d8f56a1cba02e84d9776ba7d0c5ccebc31cc62b04d13c2a97a0108277b83f9adc574b82385eee6557cafa8e5b399faa2e91f05ff72ef99430b2060d9c11892070f4eb1964957677256ac6c7341aee019f935a7399a76015e5bb5e42d1120d641ac79ef52b74f8ffaaded2424b5f6bc40bc4b6e8ac177831bf323ac8545198559b008fe1f03ac585c66d940fa8685bf51369f8304986bc478cbd51fc1f740eb6d0602a39750698d6bfed54864a003b7057e3a1dc6b5b24167541ed6f5e21af0b2894ef38c12f18b3d9116544b5489a864a361aba05c71ce6a2206866a97d1a38af6cc66c16818346d8effa421b82dbada4e091f0584947aeed66831bc907729e83d8434a9405ebc9e3a41a58a2a0432c9dcd1085b6133c94d41e57a633ae1198ee17420f4bea5c56a3db0137396260ffafc076d78bd6b67800f39ef838df95066acbbd958a606ff9b566dd5a636c721d7b4b5c1e5dc03875c681ffb0b9f1686fa4bb15bbed2b1e87e046b68c93045292e78f1b3968fbaf46952bc8d33b8f8f6ed5f3d0f47c38a8d0e540a11b9afde98879e9958a364cb1134a31936b7b30521509025e14a2eec5e526f3f28e39e9392c90060f8a6ae3104a1e5c44fa89b12dccb654ba874bc0dead1d2dae975f5ba4af2fe06d051efb7b6bb07db4f290754b73019d3734fe8c905038d372575540e19069651d5b2dec7c818fd7e1f9f988878383dd6aef15ce015e770d0681bc9ba826d6c3866115fd67198ecf691b1646c8c1962ce6db96440a9bc594e4de7ce8f6757c19fd9ce88ad4fe7f300e49e9206663b48907ecfd752668d94868b8201f773a98e51c40f6c8f03ae41c82f59a29b810add1ec27be8c4511ec3128d07685dd2b8c6ae61a8d2955b527f0c82e45d29f2ee933125398576007108fba240cda3abe00c652c82375cdd883eb4e3d2d241e597d6502f920acc4d77e11f8c7856a31f1a86476f8bb0203aba08535c3a1464e54f42efb3bfe63e2bb28f09f8f5af47638916d3c679ec3f19ddf57f603e9f7b13fb0bec25e40e48141d9458c5d5aec6a5eddfacd81babbd41c0d8a"}, @NFTA_DATA_VALUE={0xb5, 0x1, "f0939e9262c6c23c6fe35e2cf935f8df6624bad54a3ae4779f647d64a26ba6d1bbc5fc47912eb0402af4141f63b1cc12f8b0e6eba3b22bacbb2efa8d5c9621a6e24285141d6cd0adee797329ccc5cd0b4446796035442414ce5c6431bf92bdfb13dc2fb045e192d3deff742495dd5555debd57a33bfa201a3044d85c7e871ecb42ce793104e980f89129270190a5d14fee5f0a9d294ecf60fbaf88f303a2e0a489bd5cdd28926f823f6046b1aaa04299a4"}, @NFTA_DATA_VALUE={0x26, 0x1, "8a597dc2b2b9edd9d6adbe1f6423da89e3f15711c8c8f3d835e30f686437aeaa78e6"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x2c, 0x1, "4549f8aaf1f8cc736cb1088dac0174613c0e6f6f7fa0fa100019097b059087b8001e09767211e099"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x4a, 0x1, "1bd6b129cb1b430c9a61bddfe6a594af25ceaf2fe4e478330364802e8550cd3d278a0b009db3009aed6085cf736cb1534850e9ae358f2e37a39b21d5dd20cd67b994be993e45"}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x10001}, @NFTA_SET_ELEM_USERDATA={0x79, 0x6, 0x1, 0x0, "fd9be5406a62bcd9e7ff299f721121f70986d8f64c071350b7a9a86367a8127adc798aa6fd52a618cd539ec156e0da62b0ef6b910142ecff6a0fbc824d38379719664093d8ac8e788fb1d4b985579b6721c268f56201bb97b6bb07a116d1b459a863127e2a852e6c1f18c22cbda1b41f2bfd902a3f"}, @NFTA_SET_ELEM_KEY={0x1f8, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x8000000000000003}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xc8, 0x1, "ef181daa93007ac3d65c44e3fb6ca2aa33af75a38480c913ae42ff9e3a808b7438745abbe1cf735eed2515b7687d3d3870979c68b03ca014f25114a9a27eec661cdfde6b5587ce8c87d5799cc83fd6ef024dcd5256814c376485050c95273ad075f055ba56433338ecab5313e6ecbe30b88facc2353c3d0d1a9a5395deccc056625c34bac5dd950e7121dafcbb16fd6db7102273928b508bf8b16b8f94197395fe32206e5b52189dee5e7908dd6842f6b8d0d7148afac2c7f921f4a01eee244c954b68f8"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0xcf, 0x1, "18d1142b951362233fa08bf47e2928905e5da447cd2b52b7549dae11df6d31fdf891c1df5853c9ed92736f3fd6ed201f4047601108593b56454ba7183cb409728ba46f1023cad993a35a67d120a919a9b1155290fb7bfbc7a64bea9d25d625dc0dc0ab04fc5cfc2d620620c7814d2870a379728099fa70bb13f027df7b1f5622bced0ca5ec097a921f40ebfb03e185b8efd3865be32c638ef364348a93ff04f02e598ff46d9e514a5d1c3a5445af1d82d3f3c8ae75eb2341bdf1489d9f1c82b67d0e9ac04d0ddd0e06f48f"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xb6}, @NFTA_SET_ELEM_KEY={0x84, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x59, 0x1, "853db3d6df40a4cbd034ad2bd61fe9aaf4d0ea6832f61fd40b81d3d9b64166c7bccba3b2091f045794b07620d0056fe071e2522dd9504912a0c56e6f2d148ec6888c3c4c4873a15f934a82c8a6d5c3aa04afca015b"}]}, @NFTA_SET_ELEM_USERDATA={0x58, 0x6, 0x1, 0x0, "5ca62df23677d7596a72a070786eede2e04e6d4d71e05f2531d5ea2a8067f6413deefc3a65ce9e7820ed75c0b468c240eaaf34ab2b0ed2727b9919f81931efa159ab25c6ceb58f8084ab986632d3259563b8d8c7"}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1d9}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x228, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_DATA={0x1f4, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xca, 0x1, "dd408d3aadaafa72770a4164422f61f53a5791459f05bba7e9828292e69716938313c72a4b820e99ace899e790a51d3ad9415688279235e618abe00cdbc5826f5f03323e694b5bda5dbafec42165711df5830eef28ae6db1d72ab22941634a0cda9ae7630f4c02b2131ed8a44485ca465bea661b5ab56271d203ec5e2074c8243934b5f10abbb77fe6cd7d2bf50081fbd0fe15c03c193498a30afc83bfcc572ece7bec60bf4a0b2b8170aaa5a58b993f2ebd21c6711c7b40f48052444a867cee25bd682954ba"}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x3}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0xc0, 0x1, "d6d896b4986676dc76a036a550569d313686ad27d4b7e8dc16d6346f44ec0c3be77a556b5e7694a44711a1f2ef2b6c43d6e2e267dd03e7102ebe116738a3bd4e140398da4439b0508aa5e8a288f0c6f4b8e5e9519b7b09153c3a44605641bd6c1e554048d4a60d0e6b337183734b8980874afa5816ab471ee5c5abf9a57af538d5d409def7f43ceb1a754e1193b8bebcf31846ea2d89b085c79c35c67fefbf82ae99a3a8df8feb32117db060a8df85f605f941ab3a9ed41ca7a5afef"}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x53c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_SET_ELEM_USERDATA={0x46, 0x6, 0x1, 0x0, "c02d3999cdeb29e6d1c38bcf496f7c0ee883ec7e8093e650cd9b2e365bb5972f77042fe29e1ae0c1f8bd5fda59e6e70d8c7e4ec7940e30aef36ce428ad9836120a6f"}, @NFTA_SET_ELEM_KEY={0x40, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x1f147b0107ceac4c}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_DATA={0x44, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_DATA={0x1c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_DATA={0x444, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa7, 0x1, "2362c8e11444dd3dcc352f46765db1ec067b3d7c39b39458c1d94792097553c3de814469f757624bcaa5d513c6fe490205ce990b60d36e85c660cb1076ae5bd4de6bb5921fabe981f314ba3aa813719ac46977cb29c8ab528c0facf10903d37ff4c89b36bbb9d070d33bb7586f9db5f74f084bd992f3311fbb8844f8ab336fb8b871f73f325c03e453a3831b4a518f93e22912d3f965eceb2d009479453837c9c83995"}, @NFTA_DATA_VALUE={0xf2, 0x1, "8b81bd5577fc27cb60b192d535777bd2b204d8eba2c0353285d7db13b9e868723eb418843e0a459d4f36273c7c215e18a97f774d711f308454991b35a9e9f559fc6b008e1e41221213634f69e26545e30800f1eba64948eaca7f084f2d2c0624de54e857effb74e36b366eef22b011af4fa87ad0f7e4fce75e91e8c358995a04bb7fc288414a28cdbd7938a6e271d79adc398ed183f16249f0fb22bbe59b0bba8ce0bbd0f95cf477864b457e52bc673254bc99bf9f196bdb6fa415a0466f50027b0d24c20d15fe969044063746396b1a66910afdcd17ea512cabfe82a69d17aad67e9f0f348b5e7f25d339ff5f95"}, @NFTA_DATA_VERDICT={0x58, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0xb3, 0x1, "ba97d52b0acf136a2c1379e31df725735cf7ceb061591d70124c2626dd53ed3b3e71bc50447e72f96557727b9a2ba74b0ef55cd9e16afb774f56560b2237df4c93130e473b9a67a0fb30d6c41d99d1b8ffad2aa3faa02e8d608c4fefa7bb8347e3760b1346ddd84f9b01eb1f34846b46d636121288c5190961266498ee9c7f573f685f8a5c8f889c629b33f6718c1fe618ebdec8359f30294a0e169916d1f480daf93b5d9a920411f07a570946d01d"}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0xeb, 0x1, "f54e6a096aca35b7f2e4e9e189b06c78757d5ea7a2c8531dcfe866d0de7918b2f0e91a605b36c0b48c7e43ad20393561dbe06b0b26dfcd8bdab250723ec754d98ee63a103f5ada0bee46e967202c4fa5c55be8e63e79c28d913b17f6fd13ffa659b11be7c05f09572febcb4148a9f1cfa29d22051e4eedd147f1c7c05024fd3d42143bcf5e2c23e90915c249dc3a2c67db951567d42e83bb4f8b6899b3111f727e48e34e1e26521ae2d48ceff92af9601a6d31c9ce97ab32dfed798bc1e0508ded92687d6f35c5de86403f8ee9f75d4a7d5493637feb8eae57823a6d3ed845dd6b2adb6d737e77"}, @NFTA_DATA_VALUE={0xa7, 0x1, "eba90d9657e43e9eb1f913a01ecf712ce04a7e4cdbfba9190db30df4f16dfce6f05932b7eeaa5f80f1157a3644a05113de6d05381596c983116d69be1658b6d35a873d75fdff19f6eb7ac7ecd2b8afc886ca405ea9f7555c538acb0d8050671d1546f4e9c372998f642e130b4edc85195ff9b992d23947c38f1fe3480f8d8262befae4ed3a18890c3f30ceca6b37c8bf51143485b574f987cf96abf09a7506cf3107b0"}]}]}, {0x224, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_DATA={0x1e4, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0xa5, 0x1, "b5af9bfd4b31f3b588e01d689dd78bcff399d1e5b6258665bcc0b8012249a579150d478b969dfeadb3e094fd3b4253ccdd63c51c20f8f42f663685d86f36f07adb1017adefccafdf6cfc7a70eace089b73c0ccf3bc4c0e185701f4b3f014f1c09ad9545a705e400db4cd230b969744abda7f8c35d753b8f30377640d7a91a8152fe0d91c5795fe50598f02857e4a72830068cbd24d0c9686775351db18bda9fddf"}, @NFTA_DATA_VALUE={0x4f, 0x1, "e4bc1081647ad644561c3dec6734377ab1877532a029496b0760a033ce4e295e2cd0b42dac876385d7e2d2788e0e773198d1ba176491662e07e2ff30b407f1a171bc881055cfc807fecf9c"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x16, 0x1, "5e090a15456fb0f83fff13023353e5cad717"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x7}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x7}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xd9a}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}]}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, 0x66e8}, 0x1, 0x0, 0x0, 0x4044801}, 0x8044) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="c3daec6a38d3a34ff2019f768ade19527746a39b33b1666d05233e744de961d523d8ca6613853256ecf717221fa400a86c7d1c2498388b39543918c9a998392fee05994501488904dd21b588332ecaea87479cddfe90c773673a4e4c087878a0b7fa268efd566bc076c8296b77b04d7bf4"], 0x4) 14:49:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x30, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) [ 1062.330467][T21570] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1062.334556][T21584] print_req_error: 2370 callbacks suppressed [ 1062.334566][T21584] blk_update_request: I/O error, dev loop5, sector 10 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1062.360025][T21570] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 14:49:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xd]}, 0x40) 14:49:52 executing program 4: 14:49:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xe]}, 0x40) 14:49:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xf]}, 0x40) 14:49:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(r1, &(0x7f0000000040)='./file0\x00', 0x4000, 0x7ff, &(0x7f0000000280)) [ 1062.464636][T21598] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1062.472905][T21598] loop3: partition table partially beyond EOD, truncated [ 1062.510281][T21598] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1062.517990][T21598] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1062.526544][T21598] loop3: p3 start 225 is beyond EOD, truncated [ 1062.533215][T21598] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1062.540803][T21598] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1062.555961][T21628] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1062.569560][T21628] loop5: partition table partially beyond EOD, truncated [ 1062.577013][T21628] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1062.585968][T21628] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1062.593755][T21628] loop5: p3 start 225 is beyond EOD, truncated [ 1062.600590][T21628] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1062.602021][T21635] blk_update_request: I/O error, dev loop3, sector 10 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1062.609599][T21634] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1062.622812][T21598] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1062.631716][ T177] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1062.649704][T21628] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1062.656953][ T177] buffer_io_error: 2349 callbacks suppressed [ 1062.656961][ T177] Buffer I/O error on dev loop3p2, logical block 0, async page read [ 1062.700355][T21598] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 1062.810525][T21628] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1062.815769][T21628] loop5: partition table partially beyond EOD, truncated [ 1062.823496][T21628] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1062.831017][T21628] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1062.838706][T21628] loop5: p3 start 225 is beyond EOD, truncated [ 1062.845655][T21628] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1062.853758][T21628] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:49:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000280)={'raw\x00', 0xaa, "aa30f629a716abd7b5b08337679dddfd52613bc768a522a0bea54709e62e2892a51db653518d2407739f6d768580f02a6bb90be3e7893819967e3eafdc0166553281e4be4d10ba8f4ba924273f42f750d6e918bc1033168c4854cba2cb1e90f3ebec9407f8a9f8fba142e9a2521c46e8a92ba4dec4decd5f056c55ec08fa396f2721c84760e2c1ba67338fbf3db89076bb6875d9b337024ed318a35658130d83899e1d84cde81c28c2b4"}, &(0x7f0000000040)=0xce) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="000089065e963ddeb7b5a7531f4a6d7e25020893dd20b945347a"], 0x4) 14:49:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x10]}, 0x40) 14:49:52 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) r1 = dup3(0xffffffffffffffff, r0, 0x0) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0xa, 0xc9, 0x7, 0x6, 0x0, 0x70bd29, 0x25dfdbfe, [@sadb_lifetime={0x4, 0x2, 0x10001, 0xff, 0xe82, 0xffffffffffffffe3}]}, 0x30}}, 0x80) 14:49:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x34, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x34}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$UHID_CREATE2(r5, &(0x7f00000002c0)={0xb, {'syz1\x00', 'syz1\x00', 'syz1\x00', 0x32, 0xfffd, 0x570, 0xa6, 0x0, 0x4, "27c6e93eb476ae094166744a88f6eea53b1959191dfdf1fe7f646b8c1f829e7508853ebe125c6b171ca8ef8cff9a159f233d"}}, 0x14a) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x78, r3, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x4c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2d}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x40080}, 0x1) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r6, 0x0) write$FUSE_DIRENTPLUS(r6, &(0x7f0000000280)=ANY=[@ANYBLOB='\\'], 0x1) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r8) open(0x0, 0x0, 0x0) 14:49:52 executing program 3: syz_read_part_table(0x5400, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:52 executing program 5: syz_read_part_table(0x7400, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000000)=0x8001, 0x4) 14:49:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x11]}, 0x40) 14:49:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x12]}, 0x40) 14:49:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x13]}, 0x40) 14:49:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x14]}, 0x40) 14:49:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x15]}, 0x40) 14:49:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(r5, &(0x7f0000000000)={@val={0x0, 0x8906}, @val={0x0, 0x1, 0xac5c, 0xd, 0x9, 0x6}, @mpls}, 0xe) 14:49:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x16]}, 0x40) 14:49:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01000d00000000000000640000002400000008000000000000000300000d00921e083275000000070000000000000000000000020000002500000000000000000000000000f600", @ANYBLOB="d7e09dfe87994fe6ca3c7c6a1ab03c77c39bc6745fa18bb9f1d493b51da8d73a3f4cc0b7f1e9778999cdbfd0e2aa4befacc652b2b03d1262cda27913fd8629fd6ad727753a6f36fd987640db4db1f8b6af3fa57cbe8211db4b5691735b091685ffb60c5a257fbec8e73f8cf787f7017906aaafdf89d13a6bc3201dd2a7b160644ff1af429f2b0a44fc0a4c45a3bacfef455e1205dd39d8b483a911ad692ef4ad5c12d1a998c89d5361284bc068b6f2a49bf0a3d515e6384c4fe422fca48e65cca59581e0acd6fd98479090cbb6da"], &(0x7f0000000280)=""/220, 0x117, 0xdc}, 0x20) 14:49:53 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\\'], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r3 = dup2(r1, r2) open(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000040)=""/249, &(0x7f0000000140)=0xf9) [ 1063.106477][T21651] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1063.121729][T21651] loop3: partition table partially beyond EOD, truncated [ 1063.129417][T21651] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1063.137008][T21651] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1063.145190][T21651] loop3: p3 start 225 is beyond EOD, truncated [ 1063.153663][T21651] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1063.162277][T21701] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1063.167964][T21701] loop5: partition table partially beyond EOD, truncated [ 1063.175724][T21651] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1063.184928][T21701] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1063.193001][T21701] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1063.200722][T21701] loop5: p3 start 225 is beyond EOD, truncated [ 1063.207334][T21701] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1063.220698][T21701] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1063.282276][T21651] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1063.287556][T21651] loop3: partition table partially beyond EOD, truncated [ 1063.294803][T21651] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1063.303100][T21651] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1063.310326][T21701] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1063.310989][T21651] loop3: p3 start 225 is beyond EOD, truncated [ 1063.316242][T21701] loop5: partition table partially beyond EOD, truncated 14:49:53 executing program 3: syz_read_part_table(0x6000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1063.322806][T21651] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1063.330349][T21701] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1063.337147][T21651] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1063.344391][T21701] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1063.363813][T21701] loop5: p3 start 225 is beyond EOD, truncated [ 1063.370512][T21701] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1063.378081][T21701] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:49:53 executing program 5: syz_read_part_table(0x7a00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x17]}, 0x40) 14:49:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) r0 = socket(0x15, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) setresgid(0x0, r3, r1) setgid(r1) 14:49:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_opts(r3, 0x0, 0x9, &(0x7f0000000280)="04b172886ccc83b4f29c6ac5038b54b1ede9e2beeb377e71f0ec625eeae40fc8835f8ff904e6858fd1c65310332d6123f44447dd8c11b7ac0e41cf509b86e2c8687312f62ad4e684a4737ed2d660ab1ca39f29ac2fb5a01c8683a9e6effdab05992fc27e53d3ebae243f50ccf952986be72ab697e192dd5c02a3d40adb0ba9014bb335dac412c496376364", 0x8b) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000180)={{0x0, 0x0, @reserved="684c06e5c0f99be15360391f6f0be63809c22e6f3c0421178222293c43396e85"}}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x6ea) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="fff3890699fa0c641bc68ded6e2e363450e6912fa3c2de7b9020028bdc59a942064af2d6e4c8b1a5dbd30625e7a1e689172fe1e9ab17430f69f97b7807fdde5ec25dd81cfcdefddd9e6497cb8a82b4b1196f0e047ee4175cb59eae7d60ded018e26c132caa"], 0x4) 14:49:53 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x1}, 0x16, 0x2) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='F'], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x200, 0x20) dup2(r1, r2) open(0x0, 0x0, 0x0) [ 1063.500815][T21715] blk_update_request: I/O error, dev loop3, sector 10 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1063.501597][T21717] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1063.519594][ T136] blk_update_request: I/O error, dev loop3, sector 10 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1063.527294][ T1921] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1063.534549][ T136] Buffer I/O error on dev loop3p1, logical block 0, async page read 14:49:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_open_pts(r0, 0x400c0) 14:49:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:49:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x40) 14:49:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x40) 14:49:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x40) [ 1063.549812][ T136] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1063.561058][ T136] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 1063.569201][ T136] blk_update_request: I/O error, dev loop3, sector 10 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1063.580486][ T136] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1063.588715][ T136] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 14:49:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x40) [ 1063.599945][ T136] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 1063.607988][ T136] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1063.616122][ T136] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 1063.624176][ T136] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1063.632246][ T136] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 1063.640511][ T136] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1063.769105][T21750] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1063.776811][T21750] loop5: partition table partially beyond EOD, truncated [ 1063.784289][T21750] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1063.796925][T21764] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1063.802704][T21750] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1063.802785][T21764] loop3: partition table partially beyond EOD, truncated [ 1063.810537][T21750] loop5: p3 start 225 is beyond EOD, truncated [ 1063.817286][T21764] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1063.823819][T21750] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1063.831113][T21764] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1063.837919][T21750] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1063.845619][T21764] loop3: p3 start 225 is beyond EOD, truncated [ 1063.858422][T21764] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1063.865892][T21764] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1063.960996][T21750] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1063.966528][T21750] loop5: partition table partially beyond EOD, truncated [ 1063.974622][T21750] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1063.982015][T21750] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1063.989661][T21750] loop5: p3 start 225 is beyond EOD, truncated [ 1063.996349][T21750] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1064.000127][T21764] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1064.008867][T21764] loop3: partition table partially beyond EOD, truncated [ 1064.009247][T21750] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1064.019031][T21764] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1064.031711][T21764] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1064.040241][T21764] loop3: p3 start 225 is beyond EOD, truncated [ 1064.046890][T21764] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1064.054526][T21764] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:49:54 executing program 3: syz_read_part_table(0x6800, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_aout(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="07012080ec010000bd030000010000002803000080000000000000000000000021ffd899366ec12980b2a5e28b4b7dece86d7e2c2a416c737d54de01582891ad7de980ec893ebbf2218f7ed76c053ebbea825259d519157af97716fc6e776e6dcf5ecdf1b24a5a505bb8f6e411d47244334ab7e77511744165dff508387e62736f4c43123e8b084d183e49993560ca3fadf8a230d7933fc2a8e46a62218bda1227ba55f5d68eba048ac493017f2a316626ff2d775b91d549448db5011b01a407d8c3231cc491b8d726ec451d3d59119ca1b28d589aa265248c62f96782d02e6a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ddbc00"/1760], 0x6e0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x1, 'ip6_vti0\x00', 0x4}, 0x18) 14:49:54 executing program 5: syz_read_part_table(0x8004, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x40) 14:49:54 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\\'], 0x1) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) open(0x0, 0x0, 0x0) 14:49:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000300)={'raw\x00', 0x3a, "bae81f662633758dbf3171310f890dfc3e11c5006600f02579ed92b713a59e78ac7b32c06035513442bd6c87675454512cbd0801af1d9fbd953b"}, &(0x7f0000000040)=0x5e) sendfile(r7, r6, 0x0, 0x100000064) getsockname$packet(r6, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) bind(r5, &(0x7f00000005c0)=@xdp={0x2c, 0x8, r8, 0x1e}, 0x80) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x4, 0x7fffffff, 0x0, 0x541, r4, 0x4, [], r8, r2, 0x3, 0x1, 0x5}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r9, 0x28, &(0x7f0000000040)}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r10 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r10, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@val={0x0, 0x8906}, @void, @mpls}, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r12, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40000) 14:49:54 executing program 4: 14:49:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x40) 14:49:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x40) 14:49:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x40) 14:49:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000200080000000000000002000d00000000050000000000000000000000031b0106d3000000005f25006726953212a72780c2ed261e266ac706972514ca897c5670fb8171b94889ee27b87c1da657fb3e45ca35fc7fe2303f82c225a1cff3609f1fb08d19b2a2d8a9e5be"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:49:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x40) [ 1064.400523][T21830] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1064.407715][T21830] loop3: partition table partially beyond EOD, truncated [ 1064.415539][T21830] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1064.423910][T21830] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1064.432328][T21830] loop3: p3 start 225 is beyond EOD, truncated [ 1064.438812][T21830] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1064.446301][T21830] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1064.453844][T21832] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1064.459071][T21832] loop5: partition table partially beyond EOD, truncated [ 1064.468964][T21832] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1064.477912][T21832] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1064.485676][T21832] loop5: p3 start 225 is beyond EOD, truncated [ 1064.492319][T21832] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1064.499994][T21832] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1064.640582][T21830] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1064.645882][T21830] loop3: partition table partially beyond EOD, truncated [ 1064.654128][T21830] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1064.661569][T21830] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1064.669690][T21830] loop3: p3 start 225 is beyond EOD, truncated [ 1064.676504][T21830] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1064.684075][T21830] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:49:54 executing program 3: syz_read_part_table(0x6c00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) ioctl$VT_RELDISP(r2, 0x5605) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'gretap0\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@val={0x0, 0x8906}, @void, @mpls}, 0x4) 14:49:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x40) 14:49:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01faffffffffffffff001c0000001c00000008000000000000000200000d000000000500000000000000000000000300000000000000005f2500"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000280)={0x3, 0x0, 0x5, 0x9, 0x5, [{0x0, 0x6, 0x4, [], 0xc80}, {0x3, 0x9, 0x1ff, [], 0x100}, {0x8, 0x2, 0x3, [], 0x408}, {0x6, 0x4, 0x4, [], 0x208}, {0xfffffffffffff5e5, 0x796e, 0x100000001, [], 0x4}]}) 14:49:54 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="b9000000006353c767ae6d6fc9b0336c3693d4ddb14f378cfe5681e4326e8afdea3a51fdf14262e3656a4c0dfb6296fe1740f8646a23054c712b94d90042b4c438d87a9d55415eaef545"], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) r3 = eventfd2(0x1dc, 0x80000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r4) r5 = dup3(r0, r4, 0x80000) ioctl$KDFONTOP_SET(r5, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x6, 0x8, 0x155, &(0x7f0000000340)="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"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_mreqsrc(r8, 0x0, 0x27, &(0x7f0000000140)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, 0xc) r9 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$USBDEVFS_GET_CAPABILITIES(r9, 0x8004551a, &(0x7f0000000040)) write$binfmt_script(r3, &(0x7f0000000200)={'#! ', './bus', [{0x20, '$!,em1trustedbdev'}, {0x20, '$-eth1.#.,'}, {}, {0x20, '){@*eth0:trusted][}\x1f'}, {0x20, 'loloem0(md5sum^'}, {0x20, '*eth0'}, {}], 0xa, "2778bda0e0bd156793358c44dbcd550bcc1dac495225303478b7131aa42345bdcd29f91133bef728b2adb9de8edcad0dddb07d7dd757674500978af0dc4b41bd21991003fc75f763fe0ee5a4fc43cd53ed361a15b1bbb0862ef6da68ec234076fe84be06ed9e0542ef0a8cacfea7a36e723ac62866a908f202ffe4141101c78a0741d1794819a74cf98e17a5ed4245819ae5b0aecbd03f6168dd13c68687dd366c1e02ef741441f410bb191979f2aa04559cb1bd80284b7c1623437f2b8be4e0"}, 0x113) open(0x0, 0x0, 0x0) 14:49:54 executing program 5: syz_read_part_table(0x9000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x40) 14:49:54 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0xfb, 0x2, 0x1, "65f468f6d5e6bbcbe7993c0967b288e4", "738b4cd124181b4cb78712a06b6b049d94bd18e7a7605d3259c92af073835d1a36c11a91ddc5070b53d2bbf1f6e13667d90323e8ea03520f5d0d0639dae3f5d2bd926d546414070bd54ef356dd75659e559f9d0c71b8aa4fa99e192ef6870272550da70d91ba5659933a52a4b5d7fbc762375f0032ddbdc23e1664f7992581e8c79a9f27a37a81e9b8736e3363d93a4305e68d7e9a84127bf3aa274bea3c1f35a3f04507a3886488a57df4431f020a400840b4a0fcfb7043a8891a0e2e3c52bab59b475b625cc0c2e4e6b1c3a8ecc9f0deccc0c1e6c409226149aabc59bf03a25168971e7c01"}, 0xfb, 0x1) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='user\x00', &(0x7f0000000280)='!\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb157afbfa4357de81be550295d59f7701001800000000c158151677f2504078a1e60000001c0000001c8c040000000000000000000200000d000000000500000000005aa7c1062c5de6b5e3de7a957f293a29bed4b90251455d0b8b99b2a4ffe0b7b070a38d85fc8de043ddf4f75972eeeb70e24d86b5a09c473b479723dab48c953893553c228e7af6278091ec6eb624faad48fdc38eedeb4172945150c6648f60f856aafc1d3e330ac5eaadb2621369ce1d53f84b867320a6226801"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:49:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0x40) 14:49:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x40) 14:49:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x40) 14:49:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x40) [ 1065.068345][T21906] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1065.074234][T21906] loop3: partition table partially beyond EOD, truncated [ 1065.081839][T21906] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1065.089502][T21906] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1065.099707][T21906] loop3: p3 start 225 is beyond EOD, truncated [ 1065.106076][T21909] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1065.113936][T21909] loop5: partition table partially beyond EOD, truncated [ 1065.121465][T21909] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1065.121681][T21906] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1065.128982][T21909] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1065.136800][T21906] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1065.150210][T21909] loop5: p3 start 225 is beyond EOD, truncated [ 1065.157323][T21909] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1065.164650][T21909] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1065.322696][T21906] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1065.327982][T21906] loop3: partition table partially beyond EOD, truncated [ 1065.335480][T21906] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1065.343188][T21906] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1065.350709][T21906] loop3: p3 start 225 is beyond EOD, truncated [ 1065.357598][T21906] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1065.361406][T21909] loop5: p1 p2 p3 < > p4 < p5 p6 > 14:49:55 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="b9000000006353c767ae6d6fc9b0336c3693d4ddb14f378cfe5681e4326e8afdea3a51fdf14262e3656a4c0dfb6296fe1740f8646a23054c712b94d90042b4c438d87a9d55415eaef545"], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) r3 = eventfd2(0x1dc, 0x80000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r4) r5 = dup3(r0, r4, 0x80000) ioctl$KDFONTOP_SET(r5, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x6, 0x8, 0x155, &(0x7f0000000340)="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"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_mreqsrc(r8, 0x0, 0x27, &(0x7f0000000140)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, 0xc) r9 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$USBDEVFS_GET_CAPABILITIES(r9, 0x8004551a, &(0x7f0000000040)) write$binfmt_script(r3, &(0x7f0000000200)={'#! ', './bus', [{0x20, '$!,em1trustedbdev'}, {0x20, '$-eth1.#.,'}, {}, {0x20, '){@*eth0:trusted][}\x1f'}, {0x20, 'loloem0(md5sum^'}, {0x20, '*eth0'}, {}], 0xa, "2778bda0e0bd156793358c44dbcd550bcc1dac495225303478b7131aa42345bdcd29f91133bef728b2adb9de8edcad0dddb07d7dd757674500978af0dc4b41bd21991003fc75f763fe0ee5a4fc43cd53ed361a15b1bbb0862ef6da68ec234076fe84be06ed9e0542ef0a8cacfea7a36e723ac62866a908f202ffe4141101c78a0741d1794819a74cf98e17a5ed4245819ae5b0aecbd03f6168dd13c68687dd366c1e02ef741441f410bb191979f2aa04559cb1bd80284b7c1623437f2b8be4e0"}, 0x113) open(0x0, 0x0, 0x0) 14:49:55 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x40) 14:49:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) setns(r2, 0x2000000) socket$netlink(0x10, 0x3, 0xb) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="55eb98b17c26dbc84cf88847671a178f17d3f645bde5b0420018d3b89417ee883067371eb2a51f339e3e08fe99"], 0x4) 14:49:55 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000000c0)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r1, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000086b27e42c9664ddb3aec12c2556e2165025f1f1842f602af58c9945ba54c3d794d262f20213ff9a6968584e0bad8da0cf0cc191962b65016d387628b0d9117f18fcd7990cd3c58758200a39666144b82ad092b2eaa320b4abb1af32fa8f7fa9376176dbccd830d3fceea74d83a066817caa79575fa536a07b7e1879f61cbb4e30b0618ee38e900add6bf8b45520fa1b63fac68b02167a0e12542a212dfd37a9e82f2bc74bbb1f4464f48ff47bc7be2f773f6b969b9dee82e246c3799950eb7ae1c1964d23c24799", @ANYRES16=r2, @ANYBLOB="20002abd7000fedbdf25040000000800020002000000080002000200000008000100030000000800010001000000"], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='macvtap0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r4, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000f1f10000001c00000008000000000000000200000d000000000500000000000000000000000300000000000000005f2500cdd104f14fbeaba2e265ad228e7b829ac985e69e66014d775f9252a7f172f0c5c3ab451719a1bb88b267b18ea01885385d706b5c77b19a3494d85c5835811f6e90b95830b640043e5a3bbf6d45cd21d4b336a4b02947eb99f1e2e2b99d8b88fc90ab82f174a9868eb8216cf220a613548e11baa0a747f915127ae8a9e98efa267948a75cbb9fd31b8c7c885bb2bd1debd6eb2c496e670c62b7f5c25396629cc9085361"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:49:55 executing program 3: syz_read_part_table(0x7400, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1065.370113][T21909] loop5: partition table partially beyond EOD, truncated [ 1065.370241][T21906] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1065.380048][T21909] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1065.397550][T21909] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1065.410480][T21909] loop5: p3 start 225 is beyond EOD, truncated 14:49:55 executing program 5: syz_read_part_table(0xb400, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:55 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x12]}, 0x40) 14:49:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x30, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) [ 1065.420892][T21909] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1065.430788][T21909] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:49:55 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x40) 14:49:55 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10242, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000080), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:49:55 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0x40) 14:49:55 executing program 1: r0 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="3dc4838456f5d2525b37cb378a985a50959b3bc56719ad0bba8e3ec70849398029ca8dceac8e7c2eb733d5ac844f7cbce7ed2f7c609adbd9c66e47454258b58fd57f20cafd502e20dc8925a0cb7150f6822f9666482cfd51ac4b39675277df39cc4cc9d9663ff42158dc1103130fdbbff6a0f53a", 0x74, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r9, 0xc0506617, &(0x7f0000000580)={{0x1, 0x0, @descriptor="1565d53f20ad9684"}, 0x94, [], "5377ac6d3296896b6af290902749a04b9ab1e8bd617eedc9f44793805df1b6dce4d8d5a11a0e982bf90fbc64b2a6c276b0ed36710a9f473cbbc46199ff71a0dba8d2d8653935039806e98dcb3054421915b9f798d6c6d3406728866279aa8ef0d757451c12c776260a02635d8c37c109bb00fc09047bffb24d8fdf84a4aa10658562e99ac1edfa9d042eda191ba6d56d7e2d9a80"}) setsockopt$IP_VS_SO_SET_DEL(r4, 0x0, 0x484, &(0x7f00000003c0)={0x33, @multicast1, 0x4e21, 0x3, 'sed\x00', 0x2d, 0x8001, 0x6a}, 0x2c) write$tun(r7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0103f1f96707002e3b3f6c04ea685a13e58000000000ffe0a9880d688c6c306386b0866aa01290f071611ab784b0fdfaebf4d5d42620994a39111562758e490b1a8609c95e000000000000000000000000bdfa065dd15e42d821ef945f58e24c343d10e3fd49b9bd436ec4aebd552de18c4dd02fe040a57ed5217e04975788a46b8cad93d77dee9ffb"], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x2) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r10, 0x200, 0x70bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) 14:49:55 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="b9000000006353c767ae6d6fc9b0336c3693d4ddb14f378cfe5681e4326e8afdea3a51fdf14262e3656a4c0dfb6296fe1740f8646a23054c712b94d90042b4c438d87a9d55415eaef545"], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) r3 = eventfd2(0x1dc, 0x80000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r4) r5 = dup3(r0, r4, 0x80000) ioctl$KDFONTOP_SET(r5, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x6, 0x8, 0x155, &(0x7f0000000340)="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"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_mreqsrc(r8, 0x0, 0x27, &(0x7f0000000140)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, 0xc) r9 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$USBDEVFS_GET_CAPABILITIES(r9, 0x8004551a, &(0x7f0000000040)) write$binfmt_script(r3, &(0x7f0000000200)={'#! ', './bus', [{0x20, '$!,em1trustedbdev'}, {0x20, '$-eth1.#.,'}, {}, {0x20, '){@*eth0:trusted][}\x1f'}, {0x20, 'loloem0(md5sum^'}, {0x20, '*eth0'}, {}], 0xa, "2778bda0e0bd156793358c44dbcd550bcc1dac495225303478b7131aa42345bdcd29f91133bef728b2adb9de8edcad0dddb07d7dd757674500978af0dc4b41bd21991003fc75f763fe0ee5a4fc43cd53ed361a15b1bbb0862ef6da68ec234076fe84be06ed9e0542ef0a8cacfea7a36e723ac62866a908f202ffe4141101c78a0741d1794819a74cf98e17a5ed4245819ae5b0aecbd03f6168dd13c68687dd366c1e02ef741441f410bb191979f2aa04559cb1bd80284b7c1623437f2b8be4e0"}, 0x113) open(0x0, 0x0, 0x0) 14:49:55 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x15]}, 0x40) [ 1065.532687][T21943] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1065.539157][T21943] loop3: partition table partially beyond EOD, truncated [ 1065.547418][T21943] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1065.558802][T21943] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1065.568495][T21943] loop3: p3 start 225 is beyond EOD, truncated 14:49:55 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x16]}, 0x40) [ 1065.589916][T21943] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1065.626405][T21943] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:49:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf0, 0xf0, 0x8, [@fwd={0x8}, @enum={0xb, 0xa, 0x0, 0x6, 0x4, [{0x7, 0x5}, {0x3, 0x1}, {0x1, 0x5}, {0x6, 0x3}, {0xa, 0x1}, {0x8, 0x6}, {0x1, 0xfff}, {}, {0xf, 0xc96}, {0x8, 0xfff}]}, @ptr={0x8000006, 0x0, 0x0, 0x2, 0x4}, @enum={0x2, 0x7, 0x0, 0x6, 0x4, [{0xd}, {0xe, 0x9}, {0x1, 0x5}, {0x1, 0x1}, {0x0, 0x9}, {0xe, 0x6}, {0xc, 0x1}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0xf0a}}, @restrict={0x1, 0x0, 0x0, 0xb, 0x3}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x110, 0xdc, 0x1}, 0x20) [ 1065.638787][T21968] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1065.649921][T21968] loop5: partition table partially beyond EOD, truncated [ 1065.676232][T21968] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1065.698463][T21968] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1065.708719][T21968] loop5: p3 start 225 is beyond EOD, truncated [ 1065.715323][T21968] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1065.723000][T21968] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1065.749043][T21943] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1065.760765][T21943] loop3: partition table partially beyond EOD, truncated [ 1065.773398][T21943] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1065.789938][T21943] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1065.805290][T21943] loop3: p3 start 225 is beyond EOD, truncated [ 1065.812632][T21943] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1065.820682][T21943] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:49:55 executing program 3: syz_read_part_table(0x7a00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1065.912232][T21968] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1065.917665][T21968] loop5: partition table partially beyond EOD, truncated [ 1065.929388][T21968] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1065.936851][T21968] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1065.944307][T21968] loop5: p3 start 225 is beyond EOD, truncated [ 1065.950836][T21968] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1065.958197][T21968] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:49:56 executing program 5: syz_read_part_table(0xe201, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x17]}, 0x40) 14:49:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000008000000000000000200000d0000000005000000000000000000000300000f00000000005f2500"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:49:56 executing program 2: syz_read_part_table(0x2000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x88000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth1_to_bond\x00', 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@val={0x0, 0x8906}, @void, @mpls}, 0x4) 14:49:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:49:56 executing program 4: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/fscreate\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) [ 1066.081076][T22014] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1066.094250][T22014] loop3: partition table partially beyond EOD, truncated [ 1066.108344][T22014] loop3: p1 size 11290111 extends beyond EOD, truncated 14:49:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x40) 14:49:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x40) 14:49:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x40) 14:49:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x40) [ 1066.126685][T22014] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1066.139313][T22014] loop3: p3 start 225 is beyond EOD, truncated [ 1066.148175][T22014] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1066.156233][T22014] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1066.207919][T22021] loop2: p1 p2 p3 < > p4 < p5 p6 > [ 1066.217766][T22021] loop2: partition table partially beyond EOD, truncated [ 1066.225044][T22021] loop2: p1 size 11290111 extends beyond EOD, truncated [ 1066.236941][T22021] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 1066.244781][T22021] loop2: p3 start 225 is beyond EOD, truncated [ 1066.255369][T22021] loop2: p5 size 11290111 extends beyond EOD, truncated [ 1066.260528][T22042] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1066.265655][T22021] loop2: p6 size 1073741824 extends beyond EOD, truncated [ 1066.268670][T22042] loop5: partition table partially beyond EOD, truncated [ 1066.283191][T22042] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1066.290838][T22042] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1066.302276][T22042] loop5: p3 start 225 is beyond EOD, truncated [ 1066.308874][T22042] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1066.317133][T22042] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1066.411719][T22014] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1066.425828][T22014] loop3: partition table partially beyond EOD, truncated [ 1066.439318][T22014] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1066.454108][T22014] loop3: p2 size 1073741824 extends beyond EOD, truncated 14:49:56 executing program 3: syz_read_part_table(0x8004, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1066.461846][T22014] loop3: p3 start 225 is beyond EOD, truncated [ 1066.468300][T22014] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1066.476204][T22014] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1066.484184][T22042] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1066.667222][T22042] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 14:49:56 executing program 5: syz_read_part_table(0xff0f, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x4) 14:49:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x40) 14:49:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000140)=""/214, 0x1a, 0xd6, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2480, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x28000, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000100)={0x7f, 0x7, 0x4000000, 0x5, 0x2}) 14:49:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {0x3, 0x3}, {0xffffffff, 0x3}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x44, 0xd9, 0x1}, 0x20) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000300)=@v3={0x3000000, [{0xff, 0x4a9}, {0x727, 0x2}], r0}, 0x18, 0x1) 14:49:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {0x3, 0x3}, {0xffffffff, 0x3}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x44, 0xd9, 0x1}, 0x20) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000300)=@v3={0x3000000, [{0xff, 0x4a9}, {0x727, 0x2}], r0}, 0x18, 0x1) [ 1066.780487][T22075] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1066.787033][T22075] loop3: partition table partially beyond EOD, truncated [ 1066.798553][T22075] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1066.809568][T22075] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1066.823225][T22075] loop3: p3 start 225 is beyond EOD, truncated 14:49:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000008000000000000000200000d000000000500000000000000000000000300000000000000005f2500551a38e77ca10dbc2271307ee7eace71e3bdcea8e135838c758f7630c8144b30b1d2ed1dd21500"/110], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0xfffffffffffffd22) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x851bff87fc25d6ae, &(0x7f0000000100)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r3) ptrace(0x420c, r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x9, 0x1f, 0x29, 0x0, 0x0, 0x100, 0x800, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x220, 0xfffffffffffffffb, 0x1ff, 0x9, 0x1, 0x3, 0x5}, r3, 0x7, r5, 0x9) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x3) fsetxattr$security_ima(r2, &(0x7f0000000380)='security.ima\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="03010200000101004e3633027c03177176057603a306bf619dc8c4fff3a707c9b81a8a654f110900000000000000a1a0c2b0334eb59012bc01c8ee9dfa0c2430f5d280cd1caff1f55c8c3950b40a6fce35b0fcf9d82ba5"], 0x1, 0x3) 14:49:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x40) 14:49:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x40) [ 1066.844026][T22075] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1066.860200][T22075] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:49:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {0x3, 0x3}, {0xffffffff, 0x3}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x44, 0xd9, 0x1}, 0x20) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000300)=@v3={0x3000000, [{0xff, 0x4a9}, {0x727, 0x2}], r0}, 0x18, 0x1) 14:49:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@val={0x0, 0x8906}, @void, @mpls}, 0x4) [ 1066.922912][T22094] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1066.933443][T22094] loop5: partition table partially beyond EOD, truncated [ 1066.944869][T22094] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1066.952545][T22094] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1066.960230][T22094] loop5: p3 start 225 is beyond EOD, truncated [ 1066.966748][T22094] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1066.974528][T22094] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1067.041010][T22075] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1067.046291][T22075] loop3: partition table partially beyond EOD, truncated [ 1067.054274][T22075] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1067.061620][T22075] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1067.069695][T22075] loop3: p3 start 225 is beyond EOD, truncated [ 1067.076419][T22075] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1067.084148][T22075] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:49:57 executing program 3: syz_read_part_table(0x9000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1067.210994][T22094] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1067.216648][T22094] loop5: partition table partially beyond EOD, truncated [ 1067.229919][T22094] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1067.237427][T22094] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1067.245044][T22094] loop5: p3 start 225 is beyond EOD, truncated [ 1067.251572][T22094] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1067.266026][T22094] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:49:57 executing program 5: syz_read_part_table(0x30000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x40) 14:49:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x28, 0x7, 0xa, 0x401, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_RULE_COMPAT={0x14, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x29}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0xc}]}]}, 0x28}}, 0x1) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xf0, r1, 0xb28, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xdc, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdd5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x44000}, 0x40054) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x1ac, r1, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x14c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x81, @empty, 0x2}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x6, @mcast2, 0xa4d1}}, {0x14, 0x2, @in={0x2, 0x4e24, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x0, @mcast2}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1549}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcc23}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7debf411}]}]}, @TIPC_NLA_MON={0x4c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4c751157}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2834}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xae}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x24008081}, 0x801) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x228100, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') io_setup(0x3, &(0x7f0000000800)=0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={0xffffffffffffffff}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = syz_open_procfs$namespace(0x0, &(0x7f0000000c40)='ns/pid\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) io_submit(r4, 0x4, &(0x7f0000000cc0)=[&(0x7f0000000a00)={0x0, 0x0, 0x0, 0x7, 0x9, r5, &(0x7f0000000880)="2438bb92123cfa8be4caea5561a1efd538ee614d30eded7e59a9bff1b9186c8bc1cc2351cda736d87b733feb1aa4434e129487f67110dba8222066a8341c7e75db99bad829d84c36ba918462a086b43b2ac4fc0b55751e440ebb8c65e5e80aacc76daaa7d555f3f10565793a2abc98f7cae2b0774b30408fd3c01d04525b2e27d2c31993573b00823e94055e92d8bfb4be1cd89f5b95d441ab8a51cbb1afb4ccc50f89e6cb421b711c5812f309f3f302976cb3f88317e5dcf61281c9262aa98c5597d5ffbe9235eaacad9b4ba9a86c424dea1c176ab53ed20e83a19d02645012dd8175b0eae221998dcf982dc87a19a460cd3e", 0xf3, 0x3, 0x0, 0x3}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x3, 0x6, r6, &(0x7f0000000a40)="7a4b7f2d9afd87e9995774eacdf1f95f8ddc3ed2dd36b249c777657056eaf0ed661f84718fdd730cb0c10e2da210f1cfecdf74cd2ca926bd40ff098edf6b8590a81ff2df444ebd652bc3ecfbb327222e3ab9e47753771b46d072", 0x5a, 0x6, 0x0, 0x1}, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x6, 0x800, r7, &(0x7f0000000b00)="16f0501caa5292483c3f619654ef2ea31dd7ed5670c2edd7f606468e3a3321840ca5894a98dcef9e4206853fbf181b454f659db798a67c29b8548ecb3c39f47abaa4f7bf35de0fd7b247180cbfb818ab01fbd12a926f658376b4d6b8c24b91e7770665841060213430cac7e060406230d004c642d10623901b0ddfc14c5ad8054ef01febab184ec6c8888230aa1feaee84cd5ecb6ed21da88f3d5f87899d4a042c2e624e993a4fea9234e23da7423793775d467a9785bea3a03d275fc756fb591f720badde9f43febb8026ab2684365b21dd7f6e7e40111bda06b35498ef1f6bfd96871ddef323b4ac732204b3c2c8f925f69049c9", 0xf5, 0xffffffff, 0x0, 0x2, r9}, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x5, 0x0, r10, &(0x7f0000001080)="254834ad72c17335bcc854f40b6de2c7e513340fa7e9980524049cbf39331fcdd11a1b13ec4c8790dc80d60f8a8caf6fcd14a5730e47d45472b779b9bc2d9bda306cc1ba5cebd09b0de36f7169b7e728ffca971c5d298caffe553bc2c4a5f50efda866b124a42855acbfe0e25d6d1f736d82b2939e99e6e7091df0b361e3a1ea826115fde65e4d8601724dd8afb314373b0e902a5dffe744c4cf5d38c96b3ff09172eb1072adbb5c003ca348a5cf30f0a0f3a7ef55df16ee72747bae621048843410b108124f4f8789c68597e0a3ab2cda44a50c47b9674a93914b1060f06ae8bfb6cdf423d1395052d39a193ad8a8554b43c1dc27041882", 0xf8, 0x3, 0x0, 0x2, r12}]) sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f00000009c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000980)={&(0x7f0000000d40)={0x330, r3, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7ff}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xc4}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}]}, @TIPC_NLA_BEARER={0x68, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'ib', 0x3a, 'veth1_virt_wifi\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x7, @ipv4={[], [], @empty}, 0x101}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x5, @mcast1, 0x401}}}}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xd95}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_SOCK={0x74, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2a3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x489c}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1bbe}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10001}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA={0xd0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x79d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}]}, @TIPC_NLA_BEARER={0x94, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x7, @ipv4={[], [], @multicast2}, 0x7ff}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}]}, 0x330}, 0x1, 0x0, 0x0, 0x10}, 0x0) 14:49:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {0x3, 0x3}, {0xffffffff, 0x3}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x44, 0xd9, 0x1}, 0x20) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280), 0x800) 14:49:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0x1c, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) write$tun(r0, &(0x7f0000000200)={@val={0x0, 0x8906}, @void, @mpls}, 0x4) 14:49:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {0x3, 0x3}, {0xffffffff, 0x3}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x44, 0xd9, 0x1}, 0x20) 14:49:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x40) 14:49:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x40) [ 1067.310066][ T1921] __loop_clr_fd: partition scan of loop3 failed (rc=-16) 14:49:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x40) 14:49:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0x40) 14:49:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000001a00001c0000001c0000000800000000000280e5e5b25a7c132403b64600000200000d00000000051f000000000000000000000300000000000000005f25007e27a94c29f6f2d8c7d717f7bc5a58d4b1b7adcfa22f88dca40168a71441ad2b45de435d26a97b50941e5916a250978d9eb70902458c94164bbd94eed01ef4be0d42d9b07dc7829534b3"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000340)={0x14, 0x0, &(0x7f0000000000)=[@increfs={0x40046304, 0x2}, @increfs={0x40046304, 0x1}, @exit_looper], 0xd5, 0x0, &(0x7f0000000040)="03a1f3dd94daf41da1d37c18f0d8f8071158d46ff5bd36bf97ef2dfbcd3f4ba0f728667f7b3cd6d7070eb7a73d3c8e6b40376ffcdcb4b93cf7fa7d748277a9e5fd2ac65821d211d7eddc406285d1fbead81c497499baabc078daf789c7554d32934fe6581fd7c76ac75c0faa9f601c42d4d677bbc2606400b18e096f5d05f8d89f05e08592335f8b4cbd50626d23a1661c0894fd5c37237dea104f619cdce9f326e369047533cea570d7ee1ac442676d447f14e983371139946727a3078edf34309081c7ee8c94b67ecf41dca14967025b96aedf31"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000dc0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000ec0)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x60, r2, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_SECCTX={0x2d, 0x7, 'system_u:object_r:hald_sonypic_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @rand_addr="f380de7536f87a4a3cdf20d97cc0212d"}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x20010811) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x81, 0x7f, 0x2, 0x2, 0x3, 0x3e, 0xfffffffe, 0x155, 0x38, 0x17c, 0x3ff, 0x0, 0x20, 0x1, 0x0, 0xffff, 0x8}, [{0x3, 0xffff7fff, 0x0, 0x5, 0x7, 0x4, 0x0, 0xe8a1}], "0415fe00866a05dcd727b6ccaea29c6329e59c826e386516d4c79f85fda7ddee5ca6a0f94c13b5fad020e5e0466cc413f181a4746ac6d588e4d70ef4b72dbcfb302215987172ba709add2da1c4fa3933088be31532bfa871bb3928eda6", [[], [], [], [], [], [], [], [], []]}, 0x9b5) [ 1067.396816][T22140] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1067.408858][T22140] loop3: partition table partially beyond EOD, truncated [ 1067.421537][T22140] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1067.433979][T22167] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1067.453067][T22167] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1067.454037][T22140] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1067.470569][T22167] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1067.475105][T22140] loop3: p3 start 225 is beyond EOD, truncated [ 1067.486678][T22167] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1067.494572][T22140] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1067.501835][T22167] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1067.505306][T22140] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1067.630472][T22184] print_req_error: 1834 callbacks suppressed [ 1067.630481][T22184] blk_update_request: I/O error, dev loop5, sector 10 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1067.630898][T22183] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1067.636625][T22167] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1067.648010][T22140] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1067.659985][T22186] blk_update_request: I/O error, dev loop5, sector 225 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1067.666688][T22189] blk_update_request: I/O error, dev loop3, sector 10 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1067.673920][T22187] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1067.687681][T22188] blk_update_request: I/O error, dev loop5, sector 10 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1067.698076][ T177] blk_update_request: I/O error, dev loop5, sector 10 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 14:49:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x40) [ 1067.710534][ T136] blk_update_request: I/O error, dev loop3, sector 10 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1067.719360][ T177] buffer_io_error: 1822 callbacks suppressed [ 1067.719366][ T177] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1067.730157][ T136] Buffer I/O error on dev loop3p5, logical block 0, async page read [ 1067.762926][ T136] blk_update_request: I/O error, dev loop3, sector 12 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1067.774221][ T136] Buffer I/O error on dev loop3p5, logical block 1, async page read [ 1067.782390][ T136] blk_update_request: I/O error, dev loop3, sector 14 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1067.793339][ T136] Buffer I/O error on dev loop3p5, logical block 2, async page read [ 1067.801451][ T136] Buffer I/O error on dev loop3p5, logical block 3, async page read [ 1067.809672][ T177] Buffer I/O error on dev loop3p5, logical block 0, async page read [ 1067.817815][ T177] Buffer I/O error on dev loop3p5, logical block 1, async page read 14:49:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="edb528fb"], 0x4) 14:49:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:49:57 executing program 5: syz_read_part_table(0x40000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x4, &(0x7f0000000040)=@raw=[@generic={0x9, 0x5, 0x9, 0x8, 0x3b039b70}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map={0x18, 0xa}], &(0x7f0000000080)='GPL\x00', 0x4, 0x81, &(0x7f0000000280)=""/129, 0x41100, 0x4, [], 0x0, 0x1, r2, 0x8, &(0x7f00000000c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0x2, 0x2}, 0x10, 0x0, r4}, 0x78) 14:49:57 executing program 3: syz_read_part_table(0x9400, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x40) 14:49:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x40) 14:49:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:49:57 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x2, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x2, 0x803, 0xa0) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @remote}, 0x10) connect(r6, &(0x7f0000000340)=@ethernet={0x306, @local}, 0x80) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x49aacdee9cd5c7b9, r6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000200)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) pipe(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000a80)=0xe8) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 14:49:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x40) [ 1067.825847][ T177] Buffer I/O error on dev loop3p5, logical block 2, async page read [ 1067.833956][ T177] Buffer I/O error on dev loop3p5, logical block 3, async page read [ 1067.847438][T22167] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 1067.850689][ T136] Buffer I/O error on dev loop3p5, logical block 0, async page read 14:49:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}, 0x40) 14:49:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x40) 14:49:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa000, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x400400, 0x103) setsockopt$IP_VS_SO_SET_DELDEST(r6, 0x0, 0x488, &(0x7f0000000180)={{0x89, @remote, 0x4e24, 0x3, 'sed\x00', 0x8, 0x5119, 0x61}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x0, 0x10000, 0x3, 0x1}}, 0x44) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1000f861"], 0x4) 14:49:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0x40) 14:49:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1067.930244][T22202] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 1068.067509][T22236] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1068.076117][T22236] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1068.094748][T22236] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1068.125288][T22236] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1068.149746][T22236] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:49:58 executing program 5: syz_read_part_table(0x80040, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15]}, 0x40) 14:49:58 executing program 3: syz_read_part_table(0xe201, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000140)=""/217, 0x0, 0xd9, 0x1}, 0x20) 14:49:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000280)) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f00000001c0)=@gcm_256={{0x303}, "bbce57bdbd36732b", "d7e109afc959d85f4d2c9853647ccb0b6b9f0108d098c77107e2aac4458100d8", "c5510489", "a6d7a1081f54c45c"}, 0x38) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockname$inet6(r10, &(0x7f0000000200)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000400)=0x1c) r11 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendmsg$AUDIT_TRIM(r11, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x3f6, 0x4, 0x70bd2c, 0x25dfdbfc, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) write$tun(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="0a218d703e98ccec183b5970810c982aa2141939557e99e5ff2f93b18ad069e119213282e702dcc9eb3852692deb7f21bf2c83d87dd3d8b12b05bfecc7a6a8b9610e82c3d506d91f203ce708907bc943c37e0377ae1d7b3b5beafccd15975a629e7833844c2f5266c1db86f523ad5d78e09a748bd5f8fd972948b80a3ad059debde448eee44232c7f3d57ecaf4a325e4d96adaa1080c008c68084c10828362cd2c6378eac265cadd4938afed8c"], 0x4) [ 1068.310560][T22236] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1068.316669][T22236] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1068.328306][T22236] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1068.339480][T22236] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1068.347024][T22236] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1068.474060][T22267] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1068.482499][T22267] loop3: partition table partially beyond EOD, truncated [ 1068.496720][T22267] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1068.508766][T22267] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1068.516458][T22267] loop3: p3 start 225 is beyond EOD, truncated [ 1068.523193][T22267] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1068.530684][T22267] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1068.542548][T22270] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1068.554086][T22270] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1068.563802][T22270] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1068.572244][T22270] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1068.579565][T22270] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1068.656123][T22270] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1068.666305][T22267] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1068.720932][T22270] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 14:49:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x30, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:49:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000140)=""/217, 0x0, 0xd9, 0x1}, 0x20) 14:49:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16]}, 0x40) 14:49:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000000)={@val={0x0, 0x8906}, @val={0x2, 0x1, 0x6, 0x7, 0x4, 0x3}, @mpls}, 0xe) 14:49:58 executing program 5: syz_read_part_table(0xfffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1068.791133][T22267] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1068.797221][T22267] loop3: partition table partially beyond EOD, truncated [ 1068.804778][T22267] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1068.813984][T22267] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1068.821993][T22267] loop3: p3 start 225 is beyond EOD, truncated 14:49:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000140)=""/217, 0x0, 0xd9, 0x1}, 0x20) 14:49:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17]}, 0x40) [ 1068.839910][T22267] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1068.857338][T22267] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:49:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x20, 0xd9, 0x1}, 0x20) 14:49:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="00000072217ff400", @ANYRESHEX, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x4000) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)={0xe8, r2, 0x10, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7fff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="a511978256dac2664dfd99db6d16fd0a"}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x80}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'macsec0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffc4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7fffffff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0xe8}}, 0x8000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:49:58 executing program 3: syz_read_part_table(0xff0f, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:49:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x40) [ 1068.882200][ T1920] __loop_clr_fd: partition scan of loop5 failed (rc=-16) 14:49:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x40) 14:49:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x40) 14:49:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x40) 14:49:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f0000000200)=0x1, 0x4) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000100)=r4) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="000089067892b66434b4fd6351ea0f713c838098bd033618c8562458b0a7fc81d01f0731f90f033cf9adef910f281f9a3addf600a5431a212ec2b2cdb56840018df8da22d0c2025a1b69190000000000000000"], 0x4) [ 1069.121607][T22351] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1069.128730][T22351] loop3: partition table partially beyond EOD, truncated [ 1069.136469][T22351] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1069.143881][T22351] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1069.151418][T22351] loop3: p3 start 225 is beyond EOD, truncated [ 1069.157840][T22351] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1069.165223][T22351] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1069.189125][T22353] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1069.197314][T22353] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1069.208282][T22353] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1069.223199][T22351] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1069.223265][T22353] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1069.238676][T22353] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1069.289925][T22351] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 1069.352676][T22353] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1069.415732][T22353] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 14:49:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x20, 0xd9, 0x1}, 0x20) 14:49:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x40) 14:49:59 executing program 5: syz_read_part_table(0x200000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) 14:49:59 executing program 3: syz_read_part_table(0x80040, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:59 executing program 4: r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setparam(r0, &(0x7f0000000040)=0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:49:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x20, 0xd9, 0x1}, 0x20) 14:49:59 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f00000056c0), &(0x7f0000005700)=0x30) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x480000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:49:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x40) 14:49:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x40) 14:49:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x40) 14:49:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x40) 14:49:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x40) 14:49:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x40) 14:49:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0x40) [ 1069.645516][T22385] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1069.653397][T22385] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1069.665422][T22385] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1069.674099][T22385] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1069.681940][T22424] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1069.684183][T22385] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1069.688437][T22424] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1069.701884][T22424] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1069.712508][T22424] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1069.729227][T22424] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1069.754242][T22385] __loop_clr_fd: partition scan of loop3 failed (rc=-16) 14:49:59 executing program 5: syz_read_part_table(0x900000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x40) 14:49:59 executing program 3: syz_read_part_table(0xa0000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:49:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r1) ptrace(0x420c, r1) clone3(&(0x7f0000000740)={0x100000, &(0x7f0000000480)=0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000500), {0x37}, &(0x7f0000000540)=""/233, 0xe9, &(0x7f0000000640)=""/185, &(0x7f0000000700)=[0xffffffffffffffff, r1], 0x2}, 0x50) fsetxattr$trusted_overlay_origin(r2, &(0x7f00000007c0)='trusted.overlay.origin\x00', &(0x7f0000000800)='y\x00', 0x2, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$int_in(r6, 0x5421, &(0x7f0000000000)=0x1f) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r10, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x8e0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x7, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x3, 0x6, 0x1000, 0x81}, &(0x7f0000000280)=0xebf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x3}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r8, 0x10, &(0x7f0000000400)={&(0x7f0000000040)=""/50, 0x32, r11}}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r12 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r12, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@val={0x0, 0x8906}, @void, @mpls}, 0x4) 14:49:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="8eeb011d1800190000160000008acca368bcab00e6ffecffefffffff000000bcf837efbdf0a802534d215a140d3f7ec8e65c3d7fba0000000039f0ffff57"], &(0x7f0000000140)=""/210, 0x3c, 0xfffffc56, 0x1}, 0x20) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000080)) 14:49:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x3, 0x3}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x3c, 0xd9, 0x1}, 0x20) 14:49:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x40) [ 1069.839924][T22385] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 14:49:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x3, 0x3}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x3c, 0xd9, 0x1}, 0x20) 14:49:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x40) 14:49:59 executing program 4: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r0) ptrace(0x420c, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_GET_CAPABILITIES(r2, 0x8004551a, &(0x7f0000000180)) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r3) ptrace(0x420c, r3) r4 = getpid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x200, 0x0) rt_tgsigqueueinfo(r4, r0, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r4) ptrace(0x420c, r4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYPTR64, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES64=r4], @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES16=r4, @ANYRESOCT]]], &(0x7f0000000040)=""/231, 0x8, 0xe7, 0x1}, 0x20) 14:49:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x40) 14:49:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}, 0x40) [ 1069.955922][T22444] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1069.967878][T22444] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1069.979255][T22444] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1070.007864][T22444] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1070.015519][T22444] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1070.049255][T22472] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1070.061604][T22472] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1070.075420][T22472] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1070.088551][T22444] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1070.094710][T22472] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1070.107958][T22472] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1070.150075][T22444] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 14:50:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x3, 0x3}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x3c, 0xd9, 0x1}, 0x20) 14:50:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000008000000000000000200000d000000000c000000000000000000000000005f250000000000000000"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r0) ptrace(0x420c, r0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='status\x00') ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f0000000280)={0x2, 0x0, "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"}) [ 1070.310758][T22472] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1070.316504][T22472] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1070.323985][T22472] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1070.332206][T22472] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1070.339427][T22472] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000040)=0x80) ioctl$sock_SIOCADDRT(r6, 0x890b, &(0x7f0000000280)={0x0, @llc={0x1a, 0x310, 0x67, 0x0, 0x6, 0x9a, @random="d2fda20ef7d7"}, @isdn={0x22, 0x3f, 0x9, 0x8}, @ethernet={0x6, @dev={[], 0x40}}, 0x1f, 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000100)='veth0_to_team\x00', 0x5, 0x6, 0x1f}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@val={0x0, 0x8906}, @void, @mpls}, 0x4) 14:50:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x40) 14:50:00 executing program 5: syz_read_part_table(0x1000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {0x3, 0x3}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x44, 0xd9, 0x1}, 0x20) 14:50:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="9fe9010018000000000000001c0000001c0000000800000b000000000200000d000000000500000000000000000000000300000000000000005f2500"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:50:00 executing program 3: syz_read_part_table(0xfffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {0x3, 0x3}, {}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x44, 0xd9, 0x1}, 0x20) 14:50:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0x40) 14:50:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000008000000000000000200000d000000cc89a557284d38ecfa17f18fc248ab31000500000000000000"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r0, 0x0) r1 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r0) r2 = request_key(&(0x7f0000000600)='trusted\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)='eth0systemGPL\x00', r0) request_key(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x0}, &(0x7f00000005c0)='-{\x00', r2) r3 = add_key(&(0x7f00000004c0)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="7661c3b72830746f52e86b3b69105b7d167a6971dfaee41c35431410199dccd13bad9516aa7969d33e8529aa81c5c2d4dbc294119d2dff183ecb56e8674774eac62671051f3c1a1526766b8e5aa9b50622973668d8e7463bd4cb6ec09b50ad", 0x5f, r1) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x180, 0x0) ioctl$USBDEVFS_DISCARDURB(r4, 0x550b, &(0x7f0000000500)=0x1) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={r3, 0xc0, 0x2c}, &(0x7f00000002c0)=ANY=[@ANYBLOB="656e633d706b63733120686173683d726d643136302d67656e657269630000000000000000000000000000000000000000000000000000000000001e00"/79], &(0x7f0000000340)="03aa4afa080d7740d58230875019db4e703b5b821cbe01759dc86606a3335789861a46f442551836cc9dcd440fdbc3c6e59b3df220e9df0bc7c97a055f978f1eb2014665ec2e03d48bc137e383e8f246b2d8b7de4cb865ae8bf2704e7af9e24f7645e4a9eff21dee51349f396eef5fef04743f2abe61f4f0e22bfdb4d372901be371915909e1144b3adcbffbd7c5bffbabd77a7310ee5b85f3111a84b3386713cd250c6ab6370a16f9d60065a8a0cda6b7fdc6c0750649ac106a6e4a4f9a5a1a", &(0x7f0000000400)=""/44) 14:50:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15]}, 0x40) 14:50:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16]}, 0x40) 14:50:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x2e, 0x5f, 0x25]}}, &(0x7f0000000040)=""/233, 0x3c, 0xe9, 0x1}, 0x20) 14:50:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r1) ptrace(0x420c, r1) clone3(&(0x7f0000000740)={0x100000, &(0x7f0000000480)=0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000500), {0x37}, &(0x7f0000000540)=""/233, 0xe9, &(0x7f0000000640)=""/185, &(0x7f0000000700)=[0xffffffffffffffff, r1], 0x2}, 0x50) fsetxattr$trusted_overlay_origin(r2, &(0x7f00000007c0)='trusted.overlay.origin\x00', &(0x7f0000000800)='y\x00', 0x2, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$int_in(r6, 0x5421, &(0x7f0000000000)=0x1f) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r10, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x8e0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x7, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x3, 0x6, 0x1000, 0x81}, &(0x7f0000000280)=0xebf, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x3}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r8, 0x10, &(0x7f0000000400)={&(0x7f0000000040)=""/50, 0x32, r11}}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) r12 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r12, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@val={0x0, 0x8906}, @void, @mpls}, 0x4) 14:50:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17]}, 0x40) [ 1070.539309][T22519] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1070.548488][T22519] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1070.573429][T22517] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1070.584028][T22519] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1070.589321][T22517] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1070.605055][T22517] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1070.614171][T22519] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1070.621688][T22517] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1070.622559][T22519] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1070.646387][T22517] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1070.813391][T22519] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1070.822722][T22519] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1070.831795][T22519] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1070.846717][T22519] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1070.855093][T22519] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1070.862851][T22517] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1070.872568][T22517] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1070.885497][T22517] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1070.897715][T22517] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1070.906541][T22517] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:00 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) bind$can_raw(r0, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSISO7816(r2, 0xc0285443, &(0x7f0000000300)={0x3f, 0x8, 0x1f, 0x39c, 0x61}) ioctl$TIOCL_GETKMSGREDIRECT(r0, 0x541c, &(0x7f0000000100)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000000080000000002000000000000001ea19479017b2d1b0d000000000500000000000000000800000300000000000000005f2500"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) lstat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000480)) 14:50:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x3c, 0xd9, 0x1}, 0x20) 14:50:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:00 executing program 1: syz_read_part_table(0x80040, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:00 executing program 3: syz_read_part_table(0x200000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:00 executing program 5: syz_read_part_table(0x2000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x40) 14:50:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x3c, 0xd9, 0x1}, 0x20) 14:50:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x40) 14:50:01 executing program 1: syz_read_part_table(0x80040, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) 14:50:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x40) 14:50:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x40) 14:50:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x40) 14:50:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x40) 14:50:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x40) [ 1071.141121][T22587] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1071.158386][T22596] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1071.158641][T22587] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1071.165919][T22596] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1071.182448][T22587] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1071.186809][T22596] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1071.190693][ T22] audit: type=1326 audit(1582555801.154:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=22619 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f26a code=0x0 [ 1071.206017][T22596] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1071.227247][T22587] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1071.236801][T22587] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1071.244175][T22596] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1071.421465][T22587] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1071.427422][T22587] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1071.434768][T22587] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1071.442821][T22587] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1071.450316][T22587] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:01 executing program 3: syz_read_part_table(0x900000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1071.471050][T22596] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1071.478583][T22596] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1071.487546][T22596] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1071.496262][T22596] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1071.503633][T22596] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:01 executing program 5: syz_read_part_table(0x3000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x40) 14:50:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x3c, 0xd9, 0x1}, 0x20) 14:50:01 executing program 1: syz_read_part_table(0x80040, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}, {}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x44, 0xd9, 0x1}, 0x20) [ 1071.550889][ T1921] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1071.710028][T22650] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1071.723515][T22650] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1071.732907][T22650] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1071.741389][T22650] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1071.748612][T22650] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1071.760851][T22655] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1071.773115][T22655] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1071.780627][T22655] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1071.788693][T22655] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1071.796898][T22655] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1071.920524][T22655] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1071.927678][T22650] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1071.934145][T22650] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1071.942119][T22650] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1071.950737][T22650] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1071.958004][T22650] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x1, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7, 0x1}, {0x4, 0x3}]}]}, {0x0, [0x61, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:50:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x40) 14:50:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}, {}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x44, 0xd9, 0x1}, 0x20) 14:50:01 executing program 1: syz_read_part_table(0x40000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}, {}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x44, 0xd9, 0x1}, 0x20) 14:50:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x40) [ 1071.982676][ T22] audit: type=1326 audit(1582555801.954:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=22619 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f26a code=0x0 14:50:02 executing program 3: syz_read_part_table(0x1000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 5: syz_read_part_table(0x4000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x40) 14:50:02 executing program 1: syz_read_part_table(0x40000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0x40) 14:50:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {0x3}, {}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x44, 0xd9, 0x1}, 0x20) 14:50:02 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockname$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000100)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) [ 1072.049207][T22655] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 14:50:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x40) 14:50:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x40) 14:50:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x40) 14:50:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x40) 14:50:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}, 0x40) [ 1072.312997][T22698] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1072.339588][T22698] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1072.355557][T22698] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1072.367051][T22698] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1072.376312][T22733] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1072.378461][T22698] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1072.386900][T22733] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1072.396401][T22733] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1072.404534][T22733] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1072.413565][T22733] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:02 executing program 3: syz_read_part_table(0x2000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1072.470452][T22698] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1072.476692][T22698] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1072.484304][T22698] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1072.492433][T22698] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1072.499651][T22698] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1072.670231][ T1921] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1072.677464][T22743] print_req_error: 6030 callbacks suppressed [ 1072.677473][T22743] blk_update_request: I/O error, dev loop3, sector 32522 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1072.687248][T22733] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1072.695572][ T177] blk_update_request: I/O error, dev loop3, sector 32522 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1072.701884][T22733] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1072.718973][T22733] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1072.727029][T22733] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1072.734344][T22733] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x40) 14:50:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x3c, 0xd9, 0x1}, 0x20) 14:50:02 executing program 5: syz_read_part_table(0x5000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000008000000000000000200000d000000000500000000000000000000000300000000000000005f25ee45ea8680ead4cdc3f7e78e6845a26eeec90a9061c15d253cf2bbefc1cd24bd6ec188bcfcd4ccd7d9ae08b91ac007d3a5b755e6a0cff02d0aa5c36a54326c2ced0aabbe186c8f062ed8d67c273931ef18b4e577a0ac442e0de71e0a8fab3889798c9d4bc6eb9dc28032cc873cc8d3593142ece4134ac4e25fb6c17064f67d24d7ff7bbc33691465a9086de0478c4c8825450799920ba32dba14b88b47f12dee5b7c4536634a0b6aa8"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:50:02 executing program 1: syz_read_part_table(0x40000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}}, &(0x7f0000000140)=""/217, 0x36, 0xd9, 0x1}, 0x20) 14:50:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x3c, 0xd9, 0x1}, 0x20) 14:50:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0x40) 14:50:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15]}, 0x40) [ 1072.790185][T22754] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 14:50:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16]}, 0x40) 14:50:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17]}, 0x40) 14:50:02 executing program 3: syz_read_part_table(0x2040000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\\'], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) open(0x0, 0x0, 0x0) 14:50:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1072.932849][T22770] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1072.939851][T22770] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1072.957674][T22770] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1072.967487][T22770] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1072.976054][T22770] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1072.996472][T22799] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1073.004655][T22799] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1073.012199][T22799] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1073.024491][T22799] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1073.031800][T22799] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:03 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x40) 14:50:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x3c, 0xd9, 0x1}, 0x20) 14:50:03 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r3) 14:50:03 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r1 = eventfd2(0xc1af, 0x1) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x8433a000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x454, r5, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_TX_RATES={0x80, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x7c, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xd9, 0x9, 0x4, 0x2, 0x3, 0x5, 0x5, 0x76]}}, @NL80211_TXRATE_HT={0x3e, 0x2, "62e8e686e30eeb76a678405a56cc7dc9f78cdb690c785506bf78f363f628bf926f5713e1573e54d04c7969aa4c9ecb1bc6ab9228547fdca7fa56"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0xcdae, 0x81, 0x5, 0x400, 0x3ff, 0x9, 0x1f]}}]}]}, @NL80211_ATTR_IE_ASSOC_RESP={0x388, 0x80, "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"}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0xf6a}, @NL80211_ATTR_AKM_SUITES={0x20, 0x4c, [0xfac0e, 0xfac0e, 0xfac11, 0xfac1a, 0xfac10, 0xd9e091116902baab, 0xfac06]}]}, 0x454}, 0x1, 0x0, 0x0, 0x4048807}, 0x6001) r6 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$FUSE_DIRENTPLUS(r6, &(0x7f0000000040)=ANY=[], 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r8) open(0x0, 0x0, 0x0) 14:50:03 executing program 5: syz_read_part_table(0x6000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 3: syz_read_part_table(0x3000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1073.092227][T22770] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1073.101208][T22770] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1073.109803][T22770] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1073.117831][T22770] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1073.128737][T22770] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:03 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x40) 14:50:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/217, 0x44, 0xd9, 0x1}, 0x20) 14:50:03 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x40) 14:50:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000000080000008d43840188c8b616240d38e5720a000000000200000d0000000005000000000000000000"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) readv(r1, &(0x7f00000018c0)=[{&(0x7f0000000600)=""/139, 0x8b}, {&(0x7f00000006c0)=""/138, 0x8a}, {&(0x7f0000000780)=""/44, 0x2c}, {&(0x7f00000007c0)=""/40, 0x28}, {&(0x7f0000000800)=""/174, 0xae}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x6) ptrace(0x420c, r0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f00000000c0)) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r3) ptrace(0x420c, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001940)={0x0}, &(0x7f0000001980)=0xc) ptrace(0x10, r4) ptrace(0x420c, r2) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r5) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x404880, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r6, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0xf, 0x6, 0xa02, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) ptrace(0x420c, r5) clone3(&(0x7f00000003c0)={0x100000, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0, {0x5}, &(0x7f0000000280)=""/198, 0xc6, &(0x7f0000000100)=""/63, &(0x7f0000000380)=[r0, 0x0, 0x0, 0x0, r2, 0xffffffffffffffff, 0x0, r5], 0x8}, 0x50) capset(&(0x7f0000000440)={0x20071026, r7}, &(0x7f0000000480)={0x3, 0x2, 0x1f, 0x3d, 0x100}) 14:50:03 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x40) 14:50:03 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x40) 14:50:03 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x40) [ 1073.230275][T22833] blk_update_request: I/O error, dev loop5, sector 163712 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1073.242477][T22826] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1073.247909][T22826] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1073.255157][ T1920] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1073.259245][ T136] blk_update_request: I/O error, dev loop5, sector 163712 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1073.274402][ T136] buffer_io_error: 5983 callbacks suppressed 14:50:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0, 0x5f]}}, &(0x7f0000000140)=""/217, 0x43, 0xd9, 0x1}, 0x20) [ 1073.274409][ T136] Buffer I/O error on dev loop5p6, logical block 20464, async page read [ 1073.288939][T22833] blk_update_request: I/O error, dev loop5, sector 163824 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1073.296181][T22826] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1073.308865][T22826] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1073.311723][ T177] blk_update_request: I/O error, dev loop5, sector 163824 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 14:50:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x30, 0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x42, 0xd9, 0x1}, 0x20) 14:50:03 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\\'], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$selinux_attr(r4, &(0x7f0000000040)='system_u:object_r:apm_bios_t:s0\x00', 0x20) open(0x0, 0x0, 0x0) [ 1073.325822][T22826] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1073.327187][ T177] Buffer I/O error on dev loop5p6, logical block 20478, async page read [ 1073.343140][T22833] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1073.389970][T22859] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 1073.543597][T22859] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1073.549071][T22859] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1073.558323][T22859] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1073.566389][T22859] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1073.573784][T22826] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1073.582946][T22826] loop3: p1 size 11290111 extends beyond EOD, truncated 14:50:03 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x40) 14:50:03 executing program 3: syz_read_part_table(0x4000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x30, 0x0]}}, &(0x7f0000000140)=""/217, 0x41, 0xd9, 0x1}, 0x20) 14:50:03 executing program 5: syz_read_part_table(0x7000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\\'], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(r1, r2) bind(r3, &(0x7f0000000040)=@x25={0x9, @null=' \x00'}, 0x80) open(0x0, 0x0, 0x0) [ 1073.583090][T22859] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1073.591456][T22826] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1073.607698][T22826] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1073.615143][T22826] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1073.820562][T22893] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1073.826065][T22893] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1073.834004][T22893] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1073.842234][T22893] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1073.849523][T22893] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1073.859682][T22897] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1073.870145][T22897] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1073.877873][T22897] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1073.886111][T22897] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1073.893435][T22897] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x40) 14:50:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1074.010441][T22893] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1074.016767][T22893] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1074.025359][T22893] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1074.035644][T22893] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1074.043639][T22893] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:04 executing program 1: syz_read_part_table(0x9, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 3: syz_read_part_table(0x5000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCEXCL(r2, 0x540c) r3 = fcntl$dupfd(r0, 0x0, r0) fgetxattr(r3, &(0x7f00000003c0)=@random={'btrfs.', '\'keyring!vmnet1cpuset{lo:}system&\x00'}, &(0x7f0000000700)=""/206, 0xce) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000140)=""/217, 0x3f, 0xd9, 0x1}, 0x20) 14:50:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x40) 14:50:04 executing program 5: syz_read_part_table(0x8000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="dfeb010018000000000000001c0000001c0000000800000000060000000000004b4eb300000000000300000000000000005f2500"/61], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:50:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x40) 14:50:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000140)=""/217, 0x3f, 0xd9, 0x1}, 0x20) 14:50:04 executing program 1: syz_read_part_table(0x9, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 5: syz_read_part_table(0x9000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1074.139152][T22931] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1074.145739][T22931] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1074.161333][T22931] loop3: p2 size 1073741824 extends beyond EOD, truncated 14:50:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x40) 14:50:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x6, [@union={0x8, 0x7, 0x0, 0x5, 0x1, 0xdb, [{0x4, 0x2}, {0x9, 0x5, 0x3f}, {0xa, 0x4, 0x2}, {0x10, 0x5, 0x3f}, {0x1, 0x2, 0xfff}, {0xd, 0x0, 0xce}, {0xf, 0x1, 0x661}]}]}, {0x0, [0x30, 0x5f, 0x61, 0x2e]}}, &(0x7f0000000280)=""/245, 0x7e, 0xf5, 0x1}, 0x20) [ 1074.212519][T22931] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1074.229429][T22931] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1074.400526][T22963] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1074.407383][T22963] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1074.415480][T22963] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1074.423854][T22963] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1074.431190][T22963] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1074.444876][T22931] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1074.450285][T22931] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1074.457681][T22931] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1074.465975][T22931] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1074.475213][T22931] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:04 executing program 3: syz_read_part_table(0x6000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000140)=""/217, 0x3f, 0xd9, 0x1}, 0x20) 14:50:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0x40) 14:50:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00b47708000000000000000200000d000000000500000000000000000000000300000000c08b4b00000000005f2500"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:50:04 executing program 1: syz_read_part_table(0x9, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x40) 14:50:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000008000000000000000200000d00000000050b000000000000000003007a00000000000000005f25006fa17147b12df6eedbe85e80815d2636989127dd6308e727eeebcf615d5957ba3fff52f2b6a37fbf7a7eec2226"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fstat(0xffffffffffffffff, &(0x7f0000000040)) 14:50:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x40) [ 1074.510295][T22963] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1074.515714][T22963] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1074.529222][T22963] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1074.538178][T22963] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1074.547799][T22963] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:04 executing program 5: syz_read_part_table(0xa000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x40) 14:50:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCEXCL(r2, 0x540c) r3 = fcntl$dupfd(r0, 0x0, r0) fgetxattr(r3, &(0x7f00000003c0)=@random={'btrfs.', '\'keyring!vmnet1cpuset{lo:}system&\x00'}, &(0x7f0000000700)=""/206, 0xce) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1074.823934][T23001] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1074.832834][T23001] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1074.850242][T23001] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1074.862010][T23001] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1074.869498][T23001] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1074.881900][T23012] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1074.887293][T23012] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1074.895106][T23012] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1074.903568][T23012] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1074.912281][T23012] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1074.970332][T23001] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1074.976083][T23001] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1074.983469][T23001] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1074.991495][T23001] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1074.998935][T23001] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:05 executing program 3: syz_read_part_table(0x6040000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000140)=""/217, 0x3f, 0xd9, 0x1}, 0x20) 14:50:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x2e, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:50:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x40) 14:50:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCEXCL(r2, 0x540c) r3 = fcntl$dupfd(r0, 0x0, r0) fgetxattr(r3, &(0x7f00000003c0)=@random={'btrfs.', '\'keyring!vmnet1cpuset{lo:}system&\x00'}, &(0x7f0000000700)=""/206, 0xce) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:05 executing program 5: syz_read_part_table(0xb000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000140)=""/217, 0x3f, 0xd9, 0x1}, 0x20) 14:50:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000009c0000001c00f1000800090500000000000000000000000300000000000000005f250000000000000000090000000000"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioprio_set$pid(0x0, 0x0, 0x5ff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_create1(0x80000) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000000040)={0x7, 0x6, 0x5, 0x4002}, 0x10) 14:50:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}, 0x40) 14:50:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCEXCL(r2, 0x540c) r3 = fcntl$dupfd(r0, 0x0, r0) fgetxattr(r3, &(0x7f00000003c0)=@random={'btrfs.', '\'keyring!vmnet1cpuset{lo:}system&\x00'}, &(0x7f0000000700)=""/206, 0xce) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x40) 14:50:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000140)=""/217, 0x3f, 0xd9, 0x1}, 0x20) [ 1075.237570][T23039] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1075.245766][T23039] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1075.255130][T23039] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1075.264504][T23039] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1075.272030][T23039] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1075.280949][T23068] loop3: p1 p2 p3 < > p4 < p5 p6 > 14:50:05 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ptrace$setopts(0x4206, r0, 0xfffffffffffffffb, 0x4) r1 = dup(0xffffffffffffffff) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x28, r2, 0x105, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x22, 0x6, 0x7fff, 0x7]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040014) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000380)=""/209) 14:50:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0x40) 14:50:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCEXCL(r2, 0x540c) fcntl$dupfd(r0, 0x0, r0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x40, 0x0, 0x1}, 0x20) 14:50:05 executing program 3: syz_read_part_table(0x7000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1075.286998][T23068] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1075.295419][T23068] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1075.303659][T23068] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1075.310988][T23068] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15]}, 0x40) 14:50:05 executing program 4: munlockall() bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x10, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:50:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x40, 0x0, 0x1}, 0x20) 14:50:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCEXCL(r1, 0x540c) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:05 executing program 5: syz_read_part_table(0xc000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1075.407278][T23039] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1075.414137][T23039] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1075.421763][T23039] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1075.429734][T23039] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1075.437064][T23039] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x40, 0x0, 0x1}, 0x20) 14:50:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x34, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x34}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="40020000", @ANYRES16=r1, @ANYBLOB="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"/565], 0x3}, 0x1, 0x0, 0x0, 0x800}, 0x8000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f00000004c0)) 14:50:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16]}, 0x40) 14:50:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17]}, 0x40) 14:50:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1075.570271][T23088] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1075.575627][T23088] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1075.585533][T23088] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1075.593793][T23088] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1075.601038][T23088] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1075.695509][T23088] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1075.730414][T23127] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1075.732872][T23125] blk_update_request: I/O error, dev loop3, sector 229248 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1075.738530][T23127] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1075.754638][T23127] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1075.762643][T23127] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1075.769937][T23127] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:05 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x40) 14:50:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000040)) 14:50:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9}, 0x20) [ 1075.799899][T23088] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 14:50:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9}, 0x20) 14:50:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') 14:50:05 executing program 5: syz_read_part_table(0xd000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x40) 14:50:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x40) 14:50:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9}, 0x20) [ 1076.081278][T23145] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1076.086631][T23145] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1076.094170][T23145] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1076.102153][T23145] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1076.109458][T23145] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1076.117212][T23153] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1076.122565][T23153] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1076.129812][T23153] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1076.137743][T23153] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1076.145263][T23153] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1076.260309][T23145] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1076.266331][T23145] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1076.286131][T23145] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1076.297628][T23145] loop3: p5 size 11290111 extends beyond EOD, truncated 14:50:06 executing program 3: syz_read_part_table(0x9000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:06 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x40) 14:50:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x20, 0xdc, 0x1}, 0x20) 14:50:06 executing program 2 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:06 executing program 5: syz_read_part_table(0xd260000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1076.307354][T23145] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x1c}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000080)="93a860bcb3c996cfea118aa93a7dd94dc6ac5874fa63db22ec2a8d084d63446d039a1717aa16d008c9f56d43", &(0x7f00000000c0)=""/53}, 0x20) syz_open_dev$rtc(&(0x7f0000000280)='/dev/rtc#\x00', 0x81, 0x42000) 14:50:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1076.365156][T23191] FAULT_INJECTION: forcing a failure. [ 1076.365156][T23191] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.381507][T23194] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1076.389058][T23191] CPU: 0 PID: 23191 Comm: syz-executor.2 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1076.396465][T23194] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1076.399231][T23191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.399234][T23191] Call Trace: [ 1076.399252][T23191] dump_stack+0x1b0/0x228 [ 1076.399268][T23191] ? devkmsg_release+0x127/0x127 [ 1076.428753][T23191] ? show_regs_print_info+0x18/0x18 [ 1076.433954][T23191] ? __rcu_read_lock+0x50/0x50 [ 1076.438721][T23191] should_fail+0x6fb/0x860 [ 1076.443137][T23191] ? setup_fault_attr+0x2b0/0x2b0 [ 1076.448161][T23191] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 1076.453536][T23191] __should_failslab+0x11a/0x160 [ 1076.458473][T23191] ? btf_new_fd+0x176/0x37b0 [ 1076.463171][T23191] should_failslab+0x9/0x20 [ 1076.467680][T23191] kmem_cache_alloc_trace+0x3a/0x2f0 [ 1076.472964][T23191] ? __read_once_size_nocheck+0x10/0x10 [ 1076.478504][T23191] ? unwind_next_frame+0x415/0x870 [ 1076.483616][T23191] btf_new_fd+0x176/0x37b0 [ 1076.488035][T23191] ? selinux_perf_event_write+0x100/0x100 [ 1076.493758][T23191] ? unwind_next_frame+0x415/0x870 [ 1076.498869][T23191] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 1076.504852][T23191] ? stack_trace_save+0x1e0/0x1e0 [ 1076.509879][T23191] ? bpf_btf_show_fdinfo+0x90/0x90 [ 1076.514989][T23191] ? selinux_capable+0x39/0x50 [ 1076.519753][T23191] ? security_capable+0xb2/0xd0 [ 1076.524602][T23191] __do_sys_bpf+0x12a0/0xbbc0 [ 1076.529260][T23191] ? kstrtoull+0x3c4/0x4e0 [ 1076.533650][T23191] ? kstrtouint_from_user+0x1cb/0x230 [ 1076.539085][T23191] ? kstrtol_from_user+0x180/0x180 [ 1076.544179][T23191] ? putname+0xe5/0x140 [ 1076.548307][T23191] ? __kasan_slab_free+0x1e2/0x220 [ 1076.553393][T23191] ? __bpf_prog_put_rcu+0x350/0x350 [ 1076.558576][T23191] ? putname+0xe5/0x140 [ 1076.562706][T23191] ? do_sys_open+0x60f/0x7a0 [ 1076.567270][T23191] ? __x64_sys_open+0x87/0x90 [ 1076.571924][T23191] ? do_syscall_64+0xc0/0x100 [ 1076.576591][T23191] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1076.582651][T23191] ? get_pid_task+0x8d/0xa0 [ 1076.587138][T23191] ? proc_fail_nth_write+0x166/0x200 [ 1076.592424][T23191] ? proc_fail_nth_read+0x1c0/0x1c0 [ 1076.597752][T23191] ? expand_files+0xd1/0x970 [ 1076.602330][T23191] ? memset+0x31/0x40 [ 1076.606289][T23191] ? fsnotify+0x1390/0x1450 [ 1076.610781][T23191] ? __kernel_write+0x350/0x350 [ 1076.615613][T23191] ? avc_policy_seqno+0x1b/0x70 [ 1076.620447][T23191] ? __fsnotify_parent+0x300/0x300 [ 1076.625531][T23191] ? security_file_permission+0x157/0x350 [ 1076.631234][T23191] ? rw_verify_area+0x1c2/0x360 [ 1076.636059][T23191] ? __sb_end_write+0xa8/0xf0 [ 1076.640710][T23191] ? __kasan_check_write+0x14/0x20 [ 1076.645791][T23191] ? fput_many+0x47/0x1a0 [ 1076.650108][T23191] ? __kasan_check_read+0x11/0x20 [ 1076.655115][T23191] ? __ia32_sys_clock_settime+0x230/0x230 [ 1076.660807][T23191] __x64_sys_bpf+0x7a/0x90 [ 1076.665199][T23191] do_syscall_64+0xc0/0x100 [ 1076.669675][T23191] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1076.675540][T23191] RIP: 0033:0x45c429 [ 1076.679409][T23191] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1076.698992][T23191] RSP: 002b:00007f38807afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1076.707381][T23191] RAX: ffffffffffffffda RBX: 00007f38807b06d4 RCX: 000000000045c429 14:50:06 executing program 3: syz_read_part_table(0x9260000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:06 executing program 3: syz_read_part_table(0xa000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:06 executing program 3: syz_read_part_table(0xb000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:06 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x40) 14:50:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb040000000000000000001c0000001c00040008000000000000000200000d000000000500000000000000000000000300000000000000005f25000dd6c8cdbdddc1b068d3f0973918612f00e5ea37ede7ea2f71d512e90e9e94917d4026083a73b982e13a5d1dfc30ee38c593706d5f2d12c7aac10444f0bd4f6d576dc8f8ab9f637d2940355634c888c2d15763d2e6b4688132bf890ae1a46120ae7384d55446aa9330168219384de5e4c147c285711e56875580971ac415fb3276651d37c4922ed57468e8bf7798f805df979db3fc36f7b3d634b0bb8acdc4e58f75046dd012d32c40c5c5f8902d31"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000000)=""/110) socket$vsock_stream(0x28, 0x1, 0x0) [ 1076.715329][T23191] RDX: 0000000000000020 RSI: 0000000020000240 RDI: 0000000000000012 [ 1076.723287][T23191] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1076.731234][T23191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1076.739184][T23191] R13: 000000000000004b R14: 00000000004c2a30 R15: 0000000000000000 [ 1076.748589][T23194] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1076.756655][T23194] loop5: p5 size 11290111 extends beyond EOD, truncated 14:50:06 executing program 2 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1076.766992][T23194] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1076.822475][T23223] FAULT_INJECTION: forcing a failure. [ 1076.822475][T23223] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.837554][T23223] CPU: 1 PID: 23223 Comm: syz-executor.2 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1076.847720][T23223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.857817][T23223] Call Trace: [ 1076.861087][T23223] dump_stack+0x1b0/0x228 [ 1076.865390][T23223] ? devkmsg_release+0x127/0x127 [ 1076.870301][T23223] ? show_regs_print_info+0x18/0x18 [ 1076.875472][T23223] ? __rcu_read_lock+0x50/0x50 [ 1076.880230][T23223] should_fail+0x6fb/0x860 [ 1076.884635][T23223] ? setup_fault_attr+0x2b0/0x2b0 [ 1076.889649][T23223] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 1076.894994][T23223] __should_failslab+0x11a/0x160 [ 1076.899904][T23223] ? btf_new_fd+0x325/0x37b0 [ 1076.904510][T23223] should_failslab+0x9/0x20 [ 1076.908987][T23223] kmem_cache_alloc_trace+0x3a/0x2f0 [ 1076.914250][T23223] ? unwind_next_frame+0x415/0x870 [ 1076.919354][T23223] btf_new_fd+0x325/0x37b0 [ 1076.923744][T23223] ? selinux_perf_event_write+0x100/0x100 [ 1076.929431][T23223] ? unwind_next_frame+0x415/0x870 [ 1076.934565][T23223] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 1076.940565][T23223] ? stack_trace_save+0x1e0/0x1e0 [ 1076.945565][T23223] ? bpf_btf_show_fdinfo+0x90/0x90 [ 1076.950650][T23223] ? selinux_capable+0x39/0x50 [ 1076.955445][T23223] ? security_capable+0xb2/0xd0 [ 1076.960268][T23223] __do_sys_bpf+0x12a0/0xbbc0 [ 1076.964918][T23223] ? kstrtoull+0x3c4/0x4e0 [ 1076.969322][T23223] ? kstrtouint_from_user+0x1cb/0x230 [ 1076.974669][T23223] ? kstrtol_from_user+0x180/0x180 [ 1076.979754][T23223] ? putname+0xe5/0x140 [ 1076.983910][T23223] ? __kasan_slab_free+0x1e2/0x220 [ 1076.989010][T23223] ? __bpf_prog_put_rcu+0x350/0x350 [ 1076.994176][T23223] ? putname+0xe5/0x140 [ 1076.998306][T23223] ? do_sys_open+0x60f/0x7a0 [ 1077.002868][T23223] ? __x64_sys_open+0x87/0x90 [ 1077.007528][T23223] ? do_syscall_64+0xc0/0x100 [ 1077.012177][T23223] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1077.018216][T23223] ? get_pid_task+0x8d/0xa0 [ 1077.022702][T23223] ? proc_fail_nth_write+0x166/0x200 [ 1077.027968][T23223] ? proc_fail_nth_read+0x1c0/0x1c0 [ 1077.033150][T23223] ? __kasan_check_write+0x14/0x20 [ 1077.038239][T23223] ? expand_files+0xd1/0x970 [ 1077.042808][T23223] ? memset+0x31/0x40 [ 1077.047251][T23223] ? fsnotify+0x1390/0x1450 [ 1077.051729][T23223] ? __kernel_write+0x350/0x350 [ 1077.056555][T23223] ? avc_policy_seqno+0x1b/0x70 [ 1077.061379][T23223] ? __fsnotify_parent+0x300/0x300 [ 1077.066462][T23223] ? security_file_permission+0x157/0x350 [ 1077.072203][T23223] ? rw_verify_area+0x1c2/0x360 [ 1077.077033][T23223] ? __sb_end_write+0xa8/0xf0 [ 1077.081705][T23223] ? __kasan_check_write+0x14/0x20 [ 1077.086786][T23223] ? fput_many+0x47/0x1a0 [ 1077.091092][T23223] ? __kasan_check_read+0x11/0x20 [ 1077.096103][T23223] ? __ia32_sys_clock_settime+0x230/0x230 [ 1077.101797][T23223] __x64_sys_bpf+0x7a/0x90 [ 1077.106184][T23223] do_syscall_64+0xc0/0x100 [ 1077.110661][T23223] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1077.116523][T23223] RIP: 0033:0x45c429 [ 1077.120393][T23223] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1077.139994][T23223] RSP: 002b:00007f38807afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1077.148401][T23223] RAX: ffffffffffffffda RBX: 00007f38807b06d4 RCX: 000000000045c429 [ 1077.156354][T23223] RDX: 0000000000000020 RSI: 0000000020000240 RDI: 0000000000000012 [ 1077.164305][T23223] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 14:50:07 executing program 5: syz_read_part_table(0xe000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:07 executing program 3: syz_read_part_table(0xc000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x40) 14:50:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@restrict={0xc, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x0, 0x0, 0x0, 0x30, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x2c, 0xdc, 0x1}, 0x20) 14:50:07 executing program 2 (fault-call:0 fault-nth:2): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1077.172324][T23223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1077.180282][T23223] R13: 000000000000004b R14: 00000000004c2a30 R15: 0000000000000001 14:50:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x40) 14:50:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x40) [ 1077.246071][T23245] FAULT_INJECTION: forcing a failure. [ 1077.246071][T23245] name failslab, interval 1, probability 0, space 0, times 0 [ 1077.259125][T23245] CPU: 0 PID: 23245 Comm: syz-executor.2 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1077.269278][T23245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1077.279329][T23245] Call Trace: [ 1077.282624][T23245] dump_stack+0x1b0/0x228 [ 1077.286955][T23245] ? devkmsg_release+0x127/0x127 14:50:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x40) 14:50:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x40) 14:50:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x40) [ 1077.291893][T23245] ? show_regs_print_info+0x18/0x18 [ 1077.297084][T23245] ? avc_has_perm+0x15f/0x260 [ 1077.301761][T23245] should_fail+0x6fb/0x860 [ 1077.306169][T23245] ? setup_fault_attr+0x2b0/0x2b0 [ 1077.311189][T23245] ? should_fail+0x182/0x860 [ 1077.315780][T23245] ? setup_fault_attr+0x2b0/0x2b0 [ 1077.320798][T23245] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 1077.326168][T23245] __should_failslab+0x11a/0x160 [ 1077.331102][T23245] ? kvmalloc_node+0xc6/0x120 [ 1077.335774][T23245] should_failslab+0x9/0x20 [ 1077.340385][T23245] __kmalloc+0x64/0x310 [ 1077.344529][T23245] ? kasan_kmalloc+0x9/0x10 [ 1077.349044][T23245] kvmalloc_node+0xc6/0x120 [ 1077.353532][T23245] btf_new_fd+0x373/0x37b0 [ 1077.358011][T23245] ? selinux_perf_event_write+0x100/0x100 [ 1077.363725][T23245] ? unwind_next_frame+0x415/0x870 [ 1077.368901][T23245] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 1077.374869][T23245] ? stack_trace_save+0x1e0/0x1e0 [ 1077.379888][T23245] ? bpf_btf_show_fdinfo+0x90/0x90 [ 1077.384979][T23245] ? selinux_capable+0x39/0x50 [ 1077.389727][T23245] ? security_capable+0xb2/0xd0 [ 1077.394561][T23245] __do_sys_bpf+0x12a0/0xbbc0 [ 1077.399210][T23245] ? kstrtoull+0x3c4/0x4e0 [ 1077.403606][T23245] ? kstrtouint_from_user+0x1cb/0x230 [ 1077.408963][T23245] ? kstrtol_from_user+0x180/0x180 [ 1077.414054][T23245] ? putname+0xe5/0x140 [ 1077.418185][T23245] ? __kasan_slab_free+0x1e2/0x220 [ 1077.423281][T23245] ? __bpf_prog_put_rcu+0x350/0x350 [ 1077.428452][T23245] ? putname+0xe5/0x140 [ 1077.432581][T23245] ? do_sys_open+0x60f/0x7a0 [ 1077.437152][T23245] ? __x64_sys_open+0x87/0x90 [ 1077.441914][T23245] ? do_syscall_64+0xc0/0x100 [ 1077.446564][T23245] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1077.452604][T23245] ? get_pid_task+0x8d/0xa0 [ 1077.457186][T23245] ? proc_fail_nth_write+0x166/0x200 [ 1077.462444][T23245] ? proc_fail_nth_read+0x1c0/0x1c0 [ 1077.467618][T23245] ? __kasan_check_write+0x14/0x20 [ 1077.472709][T23245] ? expand_files+0xd1/0x970 [ 1077.477273][T23245] ? memset+0x31/0x40 [ 1077.481232][T23245] ? fsnotify+0x1390/0x1450 [ 1077.485712][T23245] ? __kernel_write+0x350/0x350 [ 1077.490550][T23245] ? avc_policy_seqno+0x1b/0x70 [ 1077.495380][T23245] ? __fsnotify_parent+0x300/0x300 [ 1077.500469][T23245] ? security_file_permission+0x157/0x350 [ 1077.506175][T23245] ? rw_verify_area+0x1c2/0x360 [ 1077.511023][T23245] ? __sb_end_write+0xa8/0xf0 [ 1077.515679][T23245] ? __kasan_check_write+0x14/0x20 [ 1077.520763][T23245] ? fput_many+0x47/0x1a0 [ 1077.525206][T23245] ? __kasan_check_read+0x11/0x20 [ 1077.530221][T23245] ? __ia32_sys_clock_settime+0x230/0x230 [ 1077.535916][T23245] __x64_sys_bpf+0x7a/0x90 [ 1077.540305][T23245] do_syscall_64+0xc0/0x100 [ 1077.544807][T23245] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1077.550677][T23245] RIP: 0033:0x45c429 [ 1077.554545][T23245] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1077.574171][T23245] RSP: 002b:00007f38807afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1077.582557][T23245] RAX: ffffffffffffffda RBX: 00007f38807b06d4 RCX: 000000000045c429 [ 1077.590510][T23245] RDX: 0000000000000020 RSI: 0000000020000240 RDI: 0000000000000012 [ 1077.598461][T23245] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1077.606486][T23245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1077.614527][T23245] R13: 000000000000004b R14: 00000000004c2a30 R15: 0000000000000002 [ 1077.656417][T23242] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1077.667515][T23242] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1077.675144][T23242] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1077.683215][T23242] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1077.690546][T23242] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1077.710908][T23247] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1077.729745][T23247] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1077.737228][T23247] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1077.745511][T23247] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1077.752909][T23247] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1077.840808][T23242] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1077.847708][T23242] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1077.856204][T23242] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1077.870534][T23242] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1077.883136][T23242] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:07 executing program 2 (fault-call:0 fault-nth:3): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1077.910304][T23247] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1077.915637][T23247] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1077.923026][T23247] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1077.931298][T23247] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1077.940223][T23247] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:07 executing program 3: syz_read_part_table(0xd000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:07 executing program 4: r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r0, 0x0) r1 = add_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r2, 0x0) keyctl$negate(0xd, r1, 0x4, r2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:50:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0x40) 14:50:07 executing program 5: syz_read_part_table(0x10000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/230, 0x1a, 0xe6, 0x1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4084) [ 1077.977389][T23290] FAULT_INJECTION: forcing a failure. [ 1077.977389][T23290] name failslab, interval 1, probability 0, space 0, times 0 [ 1077.991258][T23290] CPU: 1 PID: 23290 Comm: syz-executor.2 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1078.001436][T23290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1078.011488][T23290] Call Trace: [ 1078.014785][T23290] dump_stack+0x1b0/0x228 [ 1078.019113][T23290] ? devkmsg_release+0x127/0x127 14:50:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1078.024050][T23290] ? show_regs_print_info+0x18/0x18 [ 1078.029247][T23290] ? btf_func_proto_log+0x51c/0x640 [ 1078.034440][T23290] should_fail+0x6fb/0x860 [ 1078.038868][T23290] ? setup_fault_attr+0x2b0/0x2b0 [ 1078.043866][T23290] __should_failslab+0x11a/0x160 [ 1078.048776][T23290] ? kvmalloc_node+0xc6/0x120 [ 1078.053425][T23290] should_failslab+0x9/0x20 [ 1078.057903][T23290] __kmalloc+0x64/0x310 [ 1078.062030][T23290] kvmalloc_node+0xc6/0x120 [ 1078.066508][T23290] btf_new_fd+0x198c/0x37b0 [ 1078.071032][T23290] ? stack_trace_save+0x1e0/0x1e0 [ 1078.076032][T23290] ? bpf_btf_show_fdinfo+0x90/0x90 [ 1078.081119][T23290] ? selinux_capable+0x39/0x50 [ 1078.085872][T23290] __do_sys_bpf+0x12a0/0xbbc0 [ 1078.090527][T23290] ? kstrtoull+0x3c4/0x4e0 [ 1078.094923][T23290] ? kstrtouint_from_user+0x1cb/0x230 [ 1078.100276][T23290] ? kstrtol_from_user+0x180/0x180 [ 1078.105366][T23290] ? putname+0xe5/0x140 [ 1078.109493][T23290] ? __kasan_slab_free+0x1e2/0x220 [ 1078.114580][T23290] ? __bpf_prog_put_rcu+0x350/0x350 [ 1078.119757][T23290] ? putname+0xe5/0x140 [ 1078.123892][T23290] ? do_sys_open+0x60f/0x7a0 [ 1078.128482][T23290] ? __x64_sys_open+0x87/0x90 [ 1078.133249][T23290] ? do_syscall_64+0xc0/0x100 [ 1078.138031][T23290] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1078.144123][T23290] ? get_pid_task+0x8d/0xa0 [ 1078.148633][T23290] ? proc_fail_nth_write+0x166/0x200 [ 1078.153890][T23290] ? proc_fail_nth_read+0x1c0/0x1c0 [ 1078.159068][T23290] ? __kasan_check_write+0x14/0x20 [ 1078.164169][T23290] ? expand_files+0xd1/0x970 [ 1078.168820][T23290] ? memset+0x31/0x40 [ 1078.172792][T23290] ? fsnotify+0x1390/0x1450 [ 1078.177284][T23290] ? __kernel_write+0x350/0x350 [ 1078.182163][T23290] ? avc_policy_seqno+0x1b/0x70 [ 1078.186989][T23290] ? __fsnotify_parent+0x300/0x300 [ 1078.192140][T23290] ? security_file_permission+0x157/0x350 [ 1078.197893][T23290] ? rw_verify_area+0x1c2/0x360 [ 1078.202734][T23290] ? __sb_end_write+0xa8/0xf0 [ 1078.207383][T23290] ? __kasan_check_write+0x14/0x20 [ 1078.212476][T23290] ? fput_many+0x47/0x1a0 [ 1078.216781][T23290] ? __kasan_check_read+0x11/0x20 [ 1078.221821][T23290] ? __ia32_sys_clock_settime+0x230/0x230 [ 1078.227515][T23290] __x64_sys_bpf+0x7a/0x90 [ 1078.231913][T23290] do_syscall_64+0xc0/0x100 [ 1078.236443][T23290] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1078.242757][T23290] RIP: 0033:0x45c429 [ 1078.246630][T23290] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1078.266215][T23290] RSP: 002b:00007f38807afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 14:50:08 executing program 2 (fault-call:0 fault-nth:4): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x40) [ 1078.274618][T23290] RAX: ffffffffffffffda RBX: 00007f38807b06d4 RCX: 000000000045c429 [ 1078.282569][T23290] RDX: 0000000000000020 RSI: 0000000020000240 RDI: 0000000000000012 [ 1078.290590][T23290] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1078.298588][T23290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1078.306539][T23290] R13: 000000000000004b R14: 00000000004c2a30 R15: 0000000000000003 14:50:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x40) 14:50:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x40) [ 1078.341521][T23308] FAULT_INJECTION: forcing a failure. [ 1078.341521][T23308] name failslab, interval 1, probability 0, space 0, times 0 [ 1078.365577][T23308] CPU: 1 PID: 23308 Comm: syz-executor.2 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1078.375763][T23308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1078.385812][T23308] Call Trace: 14:50:08 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1078.389107][T23308] dump_stack+0x1b0/0x228 [ 1078.393446][T23308] ? devkmsg_release+0x127/0x127 [ 1078.398397][T23308] ? show_regs_print_info+0x18/0x18 [ 1078.403593][T23308] should_fail+0x6fb/0x860 [ 1078.407999][T23308] ? setup_fault_attr+0x2b0/0x2b0 [ 1078.413208][T23308] ? ___slab_alloc+0xab/0x450 [ 1078.417862][T23308] __should_failslab+0x11a/0x160 [ 1078.422779][T23308] ? kvmalloc_node+0xc6/0x120 [ 1078.427440][T23308] should_failslab+0x9/0x20 [ 1078.431981][T23308] __kmalloc+0x64/0x310 [ 1078.436183][T23308] kvmalloc_node+0xc6/0x120 [ 1078.440679][T23308] btf_new_fd+0x1e5b/0x37b0 [ 1078.445206][T23308] ? stack_trace_save+0x1e0/0x1e0 [ 1078.450214][T23308] ? bpf_btf_show_fdinfo+0x90/0x90 [ 1078.455308][T23308] ? selinux_capable+0x39/0x50 [ 1078.460055][T23308] __do_sys_bpf+0x12a0/0xbbc0 [ 1078.464717][T23308] ? kstrtoull+0x3c4/0x4e0 [ 1078.469121][T23308] ? kstrtouint_from_user+0x1cb/0x230 [ 1078.474471][T23308] ? kstrtol_from_user+0x180/0x180 [ 1078.479556][T23308] ? putname+0xe5/0x140 [ 1078.483694][T23308] ? __kasan_slab_free+0x1e2/0x220 [ 1078.488824][T23308] ? __bpf_prog_put_rcu+0x350/0x350 [ 1078.493997][T23308] ? putname+0xe5/0x140 [ 1078.498124][T23308] ? do_sys_open+0x60f/0x7a0 [ 1078.502695][T23308] ? __x64_sys_open+0x87/0x90 [ 1078.507359][T23308] ? do_syscall_64+0xc0/0x100 [ 1078.512008][T23308] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1078.518053][T23308] ? get_pid_task+0x8d/0xa0 [ 1078.522539][T23308] ? proc_fail_nth_write+0x166/0x200 [ 1078.527804][T23308] ? proc_fail_nth_read+0x1c0/0x1c0 [ 1078.533110][T23308] ? expand_files+0xd1/0x970 [ 1078.537681][T23308] ? memset+0x31/0x40 [ 1078.541639][T23308] ? fsnotify+0x1390/0x1450 [ 1078.546120][T23308] ? __kernel_write+0x350/0x350 [ 1078.550947][T23308] ? avc_policy_seqno+0x1b/0x70 [ 1078.555773][T23308] ? __fsnotify_parent+0x300/0x300 [ 1078.560858][T23308] ? security_file_permission+0x157/0x350 [ 1078.566565][T23308] ? rw_verify_area+0x1c2/0x360 [ 1078.571392][T23308] ? __sb_end_write+0xa8/0xf0 [ 1078.576040][T23308] ? __kasan_check_write+0x14/0x20 [ 1078.581142][T23308] ? fput_many+0x47/0x1a0 [ 1078.585498][T23308] ? __kasan_check_read+0x11/0x20 [ 1078.590537][T23308] ? __ia32_sys_clock_settime+0x230/0x230 [ 1078.596243][T23308] __x64_sys_bpf+0x7a/0x90 [ 1078.600632][T23308] do_syscall_64+0xc0/0x100 [ 1078.605107][T23308] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1078.610970][T23308] RIP: 0033:0x45c429 [ 1078.614843][T23308] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1078.634431][T23308] RSP: 002b:00007f38807afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1078.642859][T23308] RAX: ffffffffffffffda RBX: 00007f38807b06d4 RCX: 000000000045c429 [ 1078.650813][T23308] RDX: 0000000000000020 RSI: 0000000020000240 RDI: 0000000000000012 [ 1078.658760][T23308] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1078.666707][T23308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1078.674659][T23308] R13: 000000000000004b R14: 00000000004c2a30 R15: 0000000000000004 [ 1078.742470][T23302] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1078.749169][T23302] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1078.766756][T23302] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1078.774947][T23302] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1078.782401][T23302] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1078.795519][T23294] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1078.807629][T23294] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1078.822929][T23294] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1078.831354][T23294] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1078.840563][T23294] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1078.861455][T23302] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1078.866853][T23302] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1078.879934][T23302] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1078.889257][T23302] loop5: p5 size 11290111 extends beyond EOD, truncated 14:50:08 executing program 3: syz_read_part_table(0xe000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x40) 14:50:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$USBDEVFS_RESETEP(r1, 0x80045503, &(0x7f0000000040)={0x6, 0x1}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) [ 1078.896653][T23302] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:08 executing program 5: syz_read_part_table(0x11000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:08 executing program 2 (fault-call:0 fault-nth:5): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:08 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}, 0x40) 14:50:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x4e23, @empty}, {0x306, @remote}, 0x40, {0x2, 0x4e21, @remote}, 'veth1_macvtap\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e22, @empty}, {0x2, 0x4e23, @multicast1}, 0x120, 0x0, 0x0, 0x0, 0x401, &(0x7f00000000c0)='vcan0\x00', 0x2, 0x3ff, 0x9}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) 14:50:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x40) 14:50:08 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0x40) [ 1078.978653][T23348] FAULT_INJECTION: forcing a failure. [ 1078.978653][T23348] name failslab, interval 1, probability 0, space 0, times 0 [ 1078.992920][T23348] CPU: 0 PID: 23348 Comm: syz-executor.2 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1079.003077][T23348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1079.013219][T23348] Call Trace: [ 1079.016513][T23348] dump_stack+0x1b0/0x228 [ 1079.021030][T23348] ? devkmsg_release+0x127/0x127 14:50:09 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15]}, 0x40) [ 1079.025958][T23348] ? show_regs_print_info+0x18/0x18 [ 1079.031142][T23348] ? btf_func_proto_log+0x51c/0x640 [ 1079.036342][T23348] should_fail+0x6fb/0x860 [ 1079.040755][T23348] ? setup_fault_attr+0x2b0/0x2b0 [ 1079.045763][T23348] __should_failslab+0x11a/0x160 [ 1079.050684][T23348] ? kvmalloc_node+0xc6/0x120 [ 1079.055347][T23348] should_failslab+0x9/0x20 [ 1079.059836][T23348] __kmalloc+0x64/0x310 [ 1079.063987][T23348] kvmalloc_node+0xc6/0x120 [ 1079.068485][T23348] btf_new_fd+0x1e79/0x37b0 [ 1079.072984][T23348] ? stack_trace_save+0x1e0/0x1e0 [ 1079.077985][T23348] ? bpf_btf_show_fdinfo+0x90/0x90 [ 1079.083070][T23348] ? selinux_capable+0x39/0x50 [ 1079.087807][T23348] __do_sys_bpf+0x12a0/0xbbc0 [ 1079.092456][T23348] ? kstrtoull+0x3c4/0x4e0 [ 1079.096844][T23348] ? kstrtouint_from_user+0x1cb/0x230 [ 1079.102301][T23348] ? kstrtol_from_user+0x180/0x180 [ 1079.107383][T23348] ? putname+0xe5/0x140 [ 1079.111509][T23348] ? __kasan_slab_free+0x1e2/0x220 [ 1079.116636][T23348] ? __bpf_prog_put_rcu+0x350/0x350 [ 1079.121819][T23348] ? putname+0xe5/0x140 [ 1079.125946][T23348] ? do_sys_open+0x60f/0x7a0 [ 1079.130552][T23348] ? __x64_sys_open+0x87/0x90 [ 1079.135209][T23348] ? do_syscall_64+0xc0/0x100 [ 1079.139866][T23348] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1079.145962][T23348] ? get_pid_task+0x8d/0xa0 [ 1079.150442][T23348] ? proc_fail_nth_write+0x166/0x200 [ 1079.155733][T23348] ? proc_fail_nth_read+0x1c0/0x1c0 [ 1079.160909][T23348] ? expand_files+0xd1/0x970 [ 1079.165474][T23348] ? memset+0x31/0x40 [ 1079.169436][T23348] ? fsnotify+0x1390/0x1450 [ 1079.173926][T23348] ? __kernel_write+0x350/0x350 [ 1079.178867][T23348] ? avc_policy_seqno+0x1b/0x70 [ 1079.183714][T23348] ? __fsnotify_parent+0x300/0x300 [ 1079.188857][T23348] ? security_file_permission+0x157/0x350 [ 1079.194551][T23348] ? rw_verify_area+0x1c2/0x360 [ 1079.199376][T23348] ? __sb_end_write+0xa8/0xf0 [ 1079.204081][T23348] ? __kasan_check_write+0x14/0x20 [ 1079.209215][T23348] ? fput_many+0x47/0x1a0 [ 1079.213560][T23348] ? __kasan_check_read+0x11/0x20 [ 1079.218554][T23348] ? __ia32_sys_clock_settime+0x230/0x230 [ 1079.224247][T23348] __x64_sys_bpf+0x7a/0x90 [ 1079.228691][T23348] do_syscall_64+0xc0/0x100 [ 1079.233169][T23348] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1079.239032][T23348] RIP: 0033:0x45c429 [ 1079.242897][T23348] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1079.262492][T23348] RSP: 002b:00007f38807afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1079.270876][T23348] RAX: ffffffffffffffda RBX: 00007f38807b06d4 RCX: 000000000045c429 [ 1079.278829][T23348] RDX: 0000000000000020 RSI: 0000000020000240 RDI: 0000000000000012 [ 1079.286787][T23348] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1079.294839][T23348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1079.302793][T23348] R13: 000000000000004b R14: 00000000004c2a30 R15: 0000000000000005 [ 1079.513208][T23345] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1079.518608][T23345] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1079.528121][T23345] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1079.542619][T23345] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1079.554271][T23345] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1079.561665][T23382] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1079.567810][T23382] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1079.575409][T23382] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1079.585953][T23382] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1079.597406][T23382] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1079.620359][T23391] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1079.633137][T23345] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1079.638500][T23345] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1079.645937][T23345] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1079.653947][T23345] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1079.661339][T23345] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1079.680164][ T136] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1079.691598][ T136] Buffer I/O error on dev loop5, logical block 33008, async page read 14:50:09 executing program 3: syz_read_part_table(0x10000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:09 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16]}, 0x40) 14:50:09 executing program 2 (fault-call:0 fault-nth:6): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1079.754802][T23397] FAULT_INJECTION: forcing a failure. [ 1079.754802][T23397] name failslab, interval 1, probability 0, space 0, times 0 [ 1079.767722][T23397] CPU: 1 PID: 23397 Comm: syz-executor.2 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1079.777865][T23397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1079.787902][T23397] Call Trace: [ 1079.791175][T23397] dump_stack+0x1b0/0x228 [ 1079.795488][T23397] ? devkmsg_release+0x127/0x127 [ 1079.800409][T23397] ? show_regs_print_info+0x18/0x18 [ 1079.805739][T23397] ? btf_func_proto_log+0x51c/0x640 [ 1079.810919][T23397] should_fail+0x6fb/0x860 [ 1079.815357][T23397] ? setup_fault_attr+0x2b0/0x2b0 [ 1079.820364][T23397] __should_failslab+0x11a/0x160 [ 1079.825287][T23397] ? kvmalloc_node+0xc6/0x120 [ 1079.829946][T23397] should_failslab+0x9/0x20 [ 1079.834441][T23397] __kmalloc+0x64/0x310 [ 1079.838589][T23397] kvmalloc_node+0xc6/0x120 [ 1079.843069][T23397] btf_new_fd+0x1e97/0x37b0 [ 1079.847608][T23397] ? stack_trace_save+0x1e0/0x1e0 [ 1079.852788][T23397] ? bpf_btf_show_fdinfo+0x90/0x90 [ 1079.857881][T23397] ? selinux_capable+0x39/0x50 [ 1079.862676][T23397] __do_sys_bpf+0x12a0/0xbbc0 [ 1079.867331][T23397] ? kstrtoull+0x3c4/0x4e0 [ 1079.871788][T23397] ? kstrtouint_from_user+0x1cb/0x230 [ 1079.877135][T23397] ? kstrtol_from_user+0x180/0x180 [ 1079.882221][T23397] ? putname+0xe5/0x140 [ 1079.886353][T23397] ? __kasan_slab_free+0x1e2/0x220 [ 1079.891448][T23397] ? __bpf_prog_put_rcu+0x350/0x350 [ 1079.896622][T23397] ? putname+0xe5/0x140 [ 1079.900753][T23397] ? do_sys_open+0x60f/0x7a0 [ 1079.905321][T23397] ? __x64_sys_open+0x87/0x90 [ 1079.909989][T23397] ? do_syscall_64+0xc0/0x100 [ 1079.914649][T23397] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1079.920694][T23397] ? get_pid_task+0x8d/0xa0 [ 1079.925174][T23397] ? proc_fail_nth_write+0x166/0x200 [ 1079.930538][T23397] ? proc_fail_nth_read+0x1c0/0x1c0 [ 1079.935713][T23397] ? expand_files+0xd1/0x970 [ 1079.940277][T23397] ? memset+0x31/0x40 [ 1079.944248][T23397] ? fsnotify+0x1390/0x1450 [ 1079.948733][T23397] ? __kernel_write+0x350/0x350 [ 1079.953561][T23397] ? avc_policy_seqno+0x1b/0x70 [ 1079.958383][T23397] ? __fsnotify_parent+0x300/0x300 [ 1079.963588][T23397] ? security_file_permission+0x157/0x350 [ 1079.969374][T23397] ? rw_verify_area+0x1c2/0x360 [ 1079.974197][T23397] ? __sb_end_write+0xa8/0xf0 [ 1079.978848][T23397] ? __kasan_check_write+0x14/0x20 [ 1079.983963][T23397] ? fput_many+0x47/0x1a0 [ 1079.988295][T23397] ? __kasan_check_read+0x11/0x20 [ 1079.993295][T23397] ? __ia32_sys_clock_settime+0x230/0x230 [ 1079.998999][T23397] __x64_sys_bpf+0x7a/0x90 [ 1080.003388][T23397] do_syscall_64+0xc0/0x100 [ 1080.007868][T23397] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1080.013737][T23397] RIP: 0033:0x45c429 [ 1080.017609][T23397] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1080.037335][T23397] RSP: 002b:00007f38807afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1080.045871][T23397] RAX: ffffffffffffffda RBX: 00007f38807b06d4 RCX: 000000000045c429 [ 1080.053828][T23397] RDX: 0000000000000020 RSI: 0000000020000240 RDI: 0000000000000012 [ 1080.061785][T23397] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1080.069743][T23397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1080.077703][T23397] R13: 000000000000004b R14: 00000000004c2a30 R15: 0000000000000006 14:50:10 executing program 5: syz_read_part_table(0x12000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r0) ptrace(0x420c, r0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/nf_conntrack_expect\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$NL80211_CMD_GET_MPATH(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r2}, @NL80211_ATTR_MAC={0xa, 0x6, @random="897230d69eb3"}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @local}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) 14:50:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17]}, 0x40) 14:50:10 executing program 2 (fault-call:0 fault-nth:7): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000a5498d3c00bee4210f1d51001c0000000800000000000000020000104b00000005000ac6847f73d55d79599721d20000000000faff000000"], &(0x7f0000000140)=""/220, 0x3c, 0xdc, 0x1}, 0x20) r0 = socket(0x2b, 0x32faa92b926fe5ea, 0xda) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 14:50:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1080.106721][T23382] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1080.112235][T23382] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1080.119449][T23382] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1080.127491][T23382] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1080.134843][T23382] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1080.309314][T23401] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1080.320160][T23401] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1080.333606][T23401] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1080.350672][T23401] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1080.358018][T23401] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1080.366416][T23435] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1080.378111][T23435] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1080.389978][T23435] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1080.397980][T23435] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1080.405913][T23438] blk_update_request: I/O error, dev loop3, sector 225 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1080.410119][T23435] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1080.417474][T23401] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1080.425565][T23437] blk_update_request: I/O error, dev loop3, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1080.431934][ T136] blk_update_request: I/O error, dev loop3, sector 225 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1080.454631][ T136] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1080.462656][ T136] blk_update_request: I/O error, dev loop3, sector 263946 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1080.473955][ T136] Buffer I/O error on dev loop3p5, logical block 131968, async page read [ 1080.482436][ T136] blk_update_request: I/O error, dev loop3, sector 263948 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1080.493788][ T136] Buffer I/O error on dev loop3p5, logical block 131969, async page read [ 1080.502235][ T136] blk_update_request: I/O error, dev loop3, sector 263950 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1080.513615][ T136] Buffer I/O error on dev loop3p5, logical block 131970, async page read [ 1080.522085][ T136] blk_update_request: I/O error, dev loop3, sector 263952 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1080.533382][ T136] Buffer I/O error on dev loop3p5, logical block 131971, async page read [ 1080.541840][ T136] blk_update_request: I/O error, dev loop3, sector 225 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1080.552884][ T136] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1080.560899][ T136] Buffer I/O error on dev loop3p5, logical block 132080, async page read [ 1080.569351][ T136] Buffer I/O error on dev loop3p5, logical block 132081, async page read [ 1080.577979][ T136] Buffer I/O error on dev loop3p5, logical block 132082, async page read [ 1080.640205][T23435] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1080.645618][T23435] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1080.654059][T23435] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1080.662042][T23435] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1080.669392][T23435] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1080.736350][T23401] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 14:50:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x40) 14:50:10 executing program 2: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:10 executing program 4: syz_read_part_table(0x11000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:10 executing program 5: syz_read_part_table(0x14000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:10 executing program 3: syz_read_part_table(0x11000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:10 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x40) 14:50:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x40) 14:50:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x40) 14:50:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x40) 14:50:10 executing program 2: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x40) 14:50:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1081.055177][T23454] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1081.064713][T23452] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1081.088778][T23454] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1081.096842][T23452] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1081.115140][T23454] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1081.124659][T23454] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1081.130211][T23452] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1081.132072][T23454] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1081.143569][T23452] loop4: p5 size 11290111 extends beyond EOD, truncated [ 1081.153424][T23452] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1081.162004][T23495] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1081.172184][T23495] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1081.180335][T23495] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1081.188577][T23495] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1081.196094][T23495] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1081.346498][T23452] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 1081.390530][T23495] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1081.397867][T23495] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1081.408369][T23495] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1081.417480][T23495] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1081.425196][T23454] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1081.430539][T23454] loop5: p1 size 11290111 extends beyond EOD, truncated 14:50:11 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1081.438082][T23495] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1081.446392][T23454] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1081.464232][T23454] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1081.472239][T23454] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:11 executing program 5: syz_read_part_table(0x1c000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x40) 14:50:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:11 executing program 2: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:11 executing program 3: syz_read_part_table(0x12000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x40) 14:50:11 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x40) 14:50:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x40) 14:50:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x40) [ 1081.733679][T23509] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1081.739091][T23509] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1081.746585][T23509] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1081.754687][T23509] loop4: p5 size 11290111 extends beyond EOD, truncated [ 1081.762350][T23509] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:11 executing program 4 (fault-call:0 fault-nth:0): syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1081.937018][T23543] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1081.946291][T23550] FAULT_INJECTION: forcing a failure. [ 1081.946291][T23550] name failslab, interval 1, probability 0, space 0, times 0 [ 1081.946441][T23543] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1081.964855][T23550] CPU: 1 PID: 23550 Comm: syz-executor.4 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1081.969874][T23543] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1081.976039][T23550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1081.976043][T23550] Call Trace: [ 1081.976062][T23550] dump_stack+0x1b0/0x228 [ 1081.976080][T23550] ? devkmsg_release+0x127/0x127 [ 1081.984092][T23543] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1081.993339][T23550] ? show_regs_print_info+0x18/0x18 [ 1081.993350][T23550] ? __fsnotify_parent+0x300/0x300 [ 1081.993360][T23550] should_fail+0x6fb/0x860 [ 1081.993377][T23550] ? setup_fault_attr+0x2b0/0x2b0 [ 1081.997045][T23543] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1082.000972][T23550] ? __kasan_check_write+0x14/0x20 [ 1082.000981][T23550] ? fput_many+0x47/0x1a0 [ 1082.000990][T23550] __should_failslab+0x11a/0x160 [ 1082.001005][T23550] ? __se_sys_memfd_create+0xfa/0x3e0 [ 1082.026943][T23542] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1082.027552][T23550] should_failslab+0x9/0x20 [ 1082.027566][T23550] __kmalloc+0x64/0x310 [ 1082.034078][T23542] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1082.039767][T23550] __se_sys_memfd_create+0xfa/0x3e0 [ 1082.039775][T23550] __x64_sys_memfd_create+0x5b/0x70 [ 1082.039782][T23550] do_syscall_64+0xc0/0x100 [ 1082.039791][T23550] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1082.039798][T23550] RIP: 0033:0x45c429 [ 1082.039805][T23550] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1082.039815][T23550] RSP: 002b:00007f898368d9d8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1082.046983][T23542] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1082.049241][T23550] RAX: ffffffffffffffda RBX: 00007f898368e6d4 RCX: 000000000045c429 [ 1082.049246][T23550] RDX: 0000000020000298 RSI: 0000000000000000 RDI: 00000000004c134b [ 1082.049250][T23550] RBP: 000000000076bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1082.049254][T23550] R10: 00000000000001c0 R11: 0000000000000246 R12: 0000000000000003 [ 1082.049258][T23550] R13: 0000000000000c1c R14: 00000000004c134b R15: 0000000000000000 [ 1082.181906][T23542] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1082.189234][T23542] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1082.202344][T23543] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1082.270259][T23542] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1082.275656][T23542] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1082.287090][T23542] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1082.299673][T23542] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1082.310137][T23542] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:12 executing program 5: syz_read_part_table(0x1f000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:12 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0x40) 14:50:12 executing program 2: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:12 executing program 4 (fault-call:0 fault-nth:1): syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:12 executing program 3: syz_read_part_table(0x14000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1082.390139][T23543] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 14:50:12 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:12 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x40) 14:50:12 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x40) 14:50:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1082.459353][T23579] FAULT_INJECTION: forcing a failure. [ 1082.459353][T23579] name failslab, interval 1, probability 0, space 0, times 0 [ 1082.472816][T23579] CPU: 0 PID: 23579 Comm: syz-executor.4 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1082.482970][T23579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1082.493031][T23579] Call Trace: [ 1082.496325][T23579] dump_stack+0x1b0/0x228 [ 1082.500654][T23579] ? devkmsg_release+0x127/0x127 14:50:12 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x40) 14:50:12 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x40) [ 1082.505594][T23579] ? show_regs_print_info+0x18/0x18 [ 1082.510928][T23579] ? get_pid_task+0x8d/0xa0 [ 1082.515436][T23579] ? proc_fail_nth_write+0x166/0x200 [ 1082.520724][T23579] should_fail+0x6fb/0x860 [ 1082.525145][T23579] ? setup_fault_attr+0x2b0/0x2b0 [ 1082.530167][T23579] ? __kasan_kmalloc+0x117/0x1b0 [ 1082.535100][T23579] ? kasan_kmalloc+0x9/0x10 [ 1082.539597][T23579] ? __kmalloc+0x102/0x310 [ 1082.544194][T23579] ? __se_sys_memfd_create+0xfa/0x3e0 [ 1082.549589][T23579] ? do_syscall_64+0xc0/0x100 [ 1082.554280][T23579] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1082.560444][T23579] ? fsnotify+0x1390/0x1450 [ 1082.564942][T23579] __should_failslab+0x11a/0x160 [ 1082.569854][T23579] ? shmem_alloc_inode+0x1b/0x40 [ 1082.574763][T23579] should_failslab+0x9/0x20 [ 1082.579247][T23579] kmem_cache_alloc+0x37/0x2b0 [ 1082.583987][T23579] ? shmem_match+0x180/0x180 [ 1082.588597][T23579] shmem_alloc_inode+0x1b/0x40 [ 1082.593343][T23579] ? shmem_match+0x180/0x180 [ 1082.597908][T23579] new_inode_pseudo+0x68/0x240 [ 1082.602776][T23579] new_inode+0x28/0x1c0 [ 1082.606910][T23579] shmem_get_inode+0x114/0x690 [ 1082.611677][T23579] __shmem_file_setup+0x129/0x280 [ 1082.616688][T23579] shmem_file_setup+0x2f/0x40 [ 1082.621346][T23579] __se_sys_memfd_create+0x215/0x3e0 [ 1082.626609][T23579] __x64_sys_memfd_create+0x5b/0x70 [ 1082.631842][T23579] do_syscall_64+0xc0/0x100 [ 1082.636324][T23579] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1082.642194][T23579] RIP: 0033:0x45c429 [ 1082.646106][T23579] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1082.665690][T23579] RSP: 002b:00007f898368d9d8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1082.674122][T23579] RAX: ffffffffffffffda RBX: 00007f898368e6d4 RCX: 000000000045c429 [ 1082.682119][T23579] RDX: 0000000020000298 RSI: 0000000000000000 RDI: 00000000004c134b [ 1082.690129][T23579] RBP: 000000000076bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1082.698086][T23579] R10: 00000000000001c0 R11: 0000000000000246 R12: 0000000000000003 [ 1082.706035][T23579] R13: 0000000000000c1c R14: 00000000004c134b R15: 0000000000000001 [ 1082.820644][T23580] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1082.826202][T23580] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1082.841382][T23580] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1082.849455][T23580] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1082.856992][T23580] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1082.873276][T23609] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1082.878775][T23609] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1082.886930][T23609] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1082.895656][T23609] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1082.905979][T23609] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1082.970232][T23580] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1082.976241][T23580] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1082.994650][T23580] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1083.008357][T23580] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1083.016002][T23580] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:13 executing program 5: syz_read_part_table(0x20000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}, 0x40) 14:50:13 executing program 4 (fault-call:0 fault-nth:2): syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:13 executing program 2: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1083.087300][T23629] FAULT_INJECTION: forcing a failure. [ 1083.087300][T23629] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.105837][T23629] CPU: 0 PID: 23629 Comm: syz-executor.4 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1083.115991][T23629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.126166][T23629] Call Trace: [ 1083.129456][T23629] dump_stack+0x1b0/0x228 [ 1083.133791][T23629] ? devkmsg_release+0x127/0x127 [ 1083.138726][T23629] ? __shmem_file_setup+0x129/0x280 [ 1083.143907][T23629] ? show_regs_print_info+0x18/0x18 [ 1083.149092][T23629] ? do_syscall_64+0xc0/0x100 [ 1083.153750][T23629] ? stack_trace_save+0x111/0x1e0 [ 1083.158864][T23629] should_fail+0x6fb/0x860 [ 1083.163279][T23629] ? setup_fault_attr+0x2b0/0x2b0 [ 1083.168280][T23629] ? should_fail+0x182/0x860 [ 1083.172857][T23629] ? __kasan_kmalloc+0x179/0x1b0 [ 1083.177793][T23629] __should_failslab+0x11a/0x160 [ 1083.182719][T23629] ? security_inode_alloc+0x36/0x1f0 [ 1083.187997][T23629] should_failslab+0x9/0x20 [ 1083.192492][T23629] kmem_cache_alloc+0x37/0x2b0 [ 1083.197237][T23629] ? from_kuid_munged+0x3b0/0x3b0 [ 1083.202240][T23629] security_inode_alloc+0x36/0x1f0 [ 1083.207341][T23629] inode_init_always+0x39b/0x840 [ 1083.212266][T23629] ? shmem_match+0x180/0x180 [ 1083.216857][T23629] new_inode_pseudo+0x7f/0x240 [ 1083.221619][T23629] new_inode+0x28/0x1c0 [ 1083.225778][T23629] shmem_get_inode+0x114/0x690 [ 1083.230520][T23629] __shmem_file_setup+0x129/0x280 [ 1083.236473][T23629] shmem_file_setup+0x2f/0x40 [ 1083.241148][T23629] __se_sys_memfd_create+0x215/0x3e0 [ 1083.246438][T23629] __x64_sys_memfd_create+0x5b/0x70 [ 1083.251620][T23629] do_syscall_64+0xc0/0x100 [ 1083.256104][T23629] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1083.261981][T23629] RIP: 0033:0x45c429 [ 1083.265858][T23629] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:50:13 executing program 3: syz_read_part_table(0x1f000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x40) 14:50:13 executing program 2: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:13 executing program 4 (fault-call:0 fault-nth:3): syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1083.285461][T23629] RSP: 002b:00007f898368d9d8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1083.293860][T23629] RAX: ffffffffffffffda RBX: 00007f898368e6d4 RCX: 000000000045c429 [ 1083.301996][T23629] RDX: 0000000020000298 RSI: 0000000000000000 RDI: 00000000004c134b [ 1083.309952][T23629] RBP: 000000000076bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1083.317909][T23629] R10: 00000000000001c0 R11: 0000000000000246 R12: 0000000000000003 [ 1083.325863][T23629] R13: 0000000000000c1c R14: 00000000004c134b R15: 0000000000000002 14:50:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0x40) 14:50:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1083.418249][T23658] FAULT_INJECTION: forcing a failure. [ 1083.418249][T23658] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.434090][T23658] CPU: 1 PID: 23658 Comm: syz-executor.4 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1083.444314][T23658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.454349][T23658] Call Trace: [ 1083.457638][T23658] dump_stack+0x1b0/0x228 [ 1083.461991][T23658] ? devkmsg_release+0x127/0x127 [ 1083.466905][T23658] ? __shmem_file_setup+0x129/0x280 [ 1083.472079][T23658] ? show_regs_print_info+0x18/0x18 [ 1083.477259][T23658] ? do_syscall_64+0xc0/0x100 [ 1083.481955][T23658] ? stack_trace_save+0x111/0x1e0 [ 1083.486954][T23658] should_fail+0x6fb/0x860 [ 1083.491432][T23658] ? setup_fault_attr+0x2b0/0x2b0 [ 1083.496431][T23658] ? should_fail+0x182/0x860 [ 1083.501038][T23658] ? __kasan_kmalloc+0x179/0x1b0 [ 1083.505961][T23658] __should_failslab+0x11a/0x160 [ 1083.510884][T23658] ? __d_alloc+0x2d/0x6d0 [ 1083.515299][T23658] should_failslab+0x9/0x20 [ 1083.519785][T23658] kmem_cache_alloc+0x37/0x2b0 [ 1083.524585][T23658] __d_alloc+0x2d/0x6d0 [ 1083.528728][T23658] ? ktime_get_coarse_real_ts64+0xf3/0x110 [ 1083.534626][T23658] d_alloc_pseudo+0x1d/0x70 [ 1083.539106][T23658] alloc_file_pseudo+0x128/0x310 [ 1083.544029][T23658] ? alloc_empty_file_noaccount+0x80/0x80 [ 1083.549740][T23658] ? __kasan_check_write+0x14/0x20 [ 1083.554833][T23658] ? clear_nlink+0x87/0xe0 [ 1083.559226][T23658] __shmem_file_setup+0x1a2/0x280 [ 1083.564226][T23658] shmem_file_setup+0x2f/0x40 [ 1083.568884][T23658] __se_sys_memfd_create+0x215/0x3e0 [ 1083.574149][T23658] __x64_sys_memfd_create+0x5b/0x70 [ 1083.579323][T23658] do_syscall_64+0xc0/0x100 [ 1083.583801][T23658] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1083.589665][T23658] RIP: 0033:0x45c429 [ 1083.593573][T23658] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1083.613161][T23658] RSP: 002b:00007f898368d9d8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1083.621557][T23658] RAX: ffffffffffffffda RBX: 00007f898368e6d4 RCX: 000000000045c429 [ 1083.629512][T23658] RDX: 0000000020000298 RSI: 0000000000000000 RDI: 00000000004c134b [ 1083.637507][T23658] RBP: 000000000076bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1083.645457][T23658] R10: 00000000000001c0 R11: 0000000000000246 R12: 0000000000000003 [ 1083.653522][T23658] R13: 0000000000000c1c R14: 00000000004c134b R15: 0000000000000003 [ 1083.688204][T23651] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1083.694579][T23651] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1083.705383][T23651] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1083.714406][T23651] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1083.721861][T23651] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1083.741527][T23662] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1083.748782][T23662] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1083.758102][T23662] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1083.767349][T23662] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1083.775154][T23662] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1083.840213][T23651] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1083.845603][T23651] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1083.861317][T23651] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1083.879841][T23651] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1083.889909][T23651] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:13 executing program 5: syz_read_part_table(0x23010000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:13 executing program 2: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15]}, 0x40) 14:50:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:13 executing program 4 (fault-call:0 fault-nth:4): syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:13 executing program 3: syz_read_part_table(0x20000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:13 executing program 2: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16]}, 0x40) 14:50:14 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17]}, 0x40) [ 1083.992783][T23697] FAULT_INJECTION: forcing a failure. [ 1083.992783][T23697] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.005551][T23697] CPU: 1 PID: 23697 Comm: syz-executor.4 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1084.015696][T23697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.025874][T23697] Call Trace: [ 1084.029162][T23697] dump_stack+0x1b0/0x228 [ 1084.033494][T23697] ? devkmsg_release+0x127/0x127 [ 1084.038427][T23697] ? new_inode+0x28/0x1c0 14:50:14 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:14 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x2}, 0x40) [ 1084.042756][T23697] ? show_regs_print_info+0x18/0x18 [ 1084.047951][T23697] ? path_openat+0x2287/0x42d0 [ 1084.052750][T23697] ? do_sys_open+0x36f/0x7a0 [ 1084.057342][T23697] ? __x64_sys_open+0x87/0x90 [ 1084.062144][T23697] should_fail+0x6fb/0x860 [ 1084.066560][T23697] ? setup_fault_attr+0x2b0/0x2b0 [ 1084.071582][T23697] __should_failslab+0x11a/0x160 [ 1084.076520][T23697] ? context_struct_to_string+0x3b5/0x7f0 [ 1084.082225][T23697] should_failslab+0x9/0x20 [ 1084.086701][T23697] __kmalloc+0x64/0x310 [ 1084.090994][T23697] context_struct_to_string+0x3b5/0x7f0 [ 1084.096531][T23697] ? security_bounded_transition+0x520/0x520 [ 1084.102485][T23697] ? mls_range_isvalid+0x3a8/0x4c0 [ 1084.107580][T23697] context_add_hash+0xf5/0x200 [ 1084.112375][T23697] ? security_sid_to_context_inval+0x50/0x50 [ 1084.118334][T23697] ? mls_context_isvalid+0x9e/0x390 [ 1084.123518][T23697] ? policydb_context_isvalid+0x1d5/0x430 [ 1084.129324][T23697] security_compute_sid+0x1147/0x1be0 [ 1084.134672][T23697] ? security_transition_sid+0x90/0x90 [ 1084.140163][T23697] ? stack_trace_save+0x111/0x1e0 [ 1084.145166][T23697] ? __kasan_kmalloc+0x179/0x1b0 [ 1084.150081][T23697] ? __kasan_kmalloc+0x117/0x1b0 [ 1084.155001][T23697] ? kasan_slab_alloc+0xe/0x10 [ 1084.159756][T23697] ? kmem_cache_alloc+0x120/0x2b0 [ 1084.164759][T23697] ? __d_alloc+0x2d/0x6d0 [ 1084.169059][T23697] ? d_alloc_pseudo+0x1d/0x70 [ 1084.173734][T23697] ? alloc_file_pseudo+0x128/0x310 [ 1084.178837][T23697] ? __shmem_file_setup+0x1a2/0x280 [ 1084.184059][T23697] ? shmem_file_setup+0x2f/0x40 [ 1084.188891][T23697] ? new_inode_pseudo+0x68/0x240 [ 1084.193809][T23697] ? new_inode+0x28/0x1c0 [ 1084.198113][T23697] ? shmem_get_inode+0x114/0x690 [ 1084.203206][T23697] ? __kasan_check_write+0x14/0x20 [ 1084.208315][T23697] ? _raw_spin_lock+0xa1/0x170 [ 1084.213060][T23697] ? _raw_spin_trylock_bh+0x190/0x190 [ 1084.218408][T23697] security_transition_sid+0x7d/0x90 [ 1084.223723][T23697] inode_doinit_with_dentry+0x5e0/0x10e0 [ 1084.229479][T23697] ? sb_finish_set_opts+0x800/0x800 [ 1084.234769][T23697] ? __d_alloc+0x2d/0x6d0 [ 1084.239085][T23697] ? kasan_slab_alloc+0xe/0x10 [ 1084.243823][T23697] ? d_set_d_op+0xfd/0x390 [ 1084.248223][T23697] selinux_d_instantiate+0x27/0x40 [ 1084.253310][T23697] security_d_instantiate+0xa0/0x100 [ 1084.258578][T23697] d_instantiate+0x55/0x90 [ 1084.262983][T23697] alloc_file_pseudo+0x24a/0x310 [ 1084.267960][T23697] ? alloc_empty_file_noaccount+0x80/0x80 [ 1084.273654][T23697] ? __kasan_check_write+0x14/0x20 [ 1084.278739][T23697] ? clear_nlink+0x87/0xe0 [ 1084.283206][T23697] __shmem_file_setup+0x1a2/0x280 [ 1084.288224][T23697] shmem_file_setup+0x2f/0x40 [ 1084.292932][T23697] __se_sys_memfd_create+0x215/0x3e0 [ 1084.298202][T23697] __x64_sys_memfd_create+0x5b/0x70 [ 1084.303380][T23697] do_syscall_64+0xc0/0x100 [ 1084.307864][T23697] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1084.313732][T23697] RIP: 0033:0x45c429 [ 1084.317712][T23697] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1084.337298][T23697] RSP: 002b:00007f898368d9d8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1084.345686][T23697] RAX: ffffffffffffffda RBX: 00007f898368e6d4 RCX: 000000000045c429 [ 1084.353639][T23697] RDX: 0000000020000298 RSI: 0000000000000000 RDI: 00000000004c134b [ 1084.361588][T23697] RBP: 000000000076bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1084.369540][T23697] R10: 00000000000001c0 R11: 0000000000000246 R12: 0000000000000003 [ 1084.377499][T23697] R13: 0000000000000c1c R14: 00000000004c134b R15: 0000000000000004 [ 1084.420236][T23697] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1084.425614][T23697] loop4: partition table partially beyond EOD, truncated [ 1084.440332][T23697] loop4: p1 start 10 is beyond EOD, truncated [ 1084.449567][T23697] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1084.457353][T23697] loop4: p3 start 225 is beyond EOD, truncated [ 1084.463738][T23697] loop4: p4 size 2 extends beyond EOD, truncated [ 1084.470463][T23697] loop4: p5 start 10 is beyond EOD, truncated [ 1084.476545][T23697] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1084.500416][T23701] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1084.505834][T23701] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1084.513352][T23701] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1084.522776][T23701] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1084.530204][T23701] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1084.561869][T23699] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1084.571111][T23699] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1084.579635][T23699] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1084.587869][T23699] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1084.595538][T23699] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1084.644563][T23732] print_req_error: 3070 callbacks suppressed [ 1084.644575][T23732] blk_update_request: I/O error, dev loop3, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1084.646011][T23730] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1084.651096][T23701] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1084.678000][ T136] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1084.696914][ T136] blk_update_request: I/O error, dev loop3, sector 263946 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1084.697591][T23730] blk_update_request: I/O error, dev loop3, sector 263948 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1084.708290][ T136] buffer_io_error: 3038 callbacks suppressed [ 1084.708303][ T136] Buffer I/O error on dev loop3p1, logical block 131968, async page read [ 1084.719669][T23730] Buffer I/O error on dev loop3p1, logical block 131969, async page read [ 1084.725655][ T136] blk_update_request: I/O error, dev loop3, sector 263950 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1084.734093][T23730] blk_update_request: I/O error, dev loop3, sector 263952 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1084.742492][ T136] Buffer I/O error on dev loop3p1, logical block 131970, async page read [ 1084.742514][ T136] blk_update_request: I/O error, dev loop3, sector 264176 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1084.753810][T23730] Buffer I/O error on dev loop3p1, logical block 131971, async page read [ 1084.797689][T23732] blk_update_request: I/O error, dev loop3, sector 264170 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1084.802534][ T136] blk_update_request: I/O error, dev loop3, sector 264176 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1084.820932][ T136] Buffer I/O error on dev loop3p2, logical block 33022, async page read [ 1084.825059][T23735] Buffer I/O error on dev loop3p1, logical block 132080, async page read [ 1084.829304][ T136] Buffer I/O error on dev loop3p1, logical block 132081, async page read 14:50:14 executing program 5: syz_read_part_table(0x24030000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:14 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x3}, 0x40) 14:50:14 executing program 2: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:14 executing program 4 (fault-call:0 fault-nth:5): syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:14 executing program 3: syz_read_part_table(0x23010000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1084.837783][T23735] Buffer I/O error on dev loop3p1, logical block 132082, async page read [ 1084.846221][ T136] Buffer I/O error on dev loop3p1, logical block 132083, async page read [ 1084.863244][ T136] Buffer I/O error on dev loop3p2, logical block 0, async page read 14:50:14 executing program 2: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:14 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x4}, 0x40) 14:50:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x4001, 0x0) [ 1084.896706][T23751] FAULT_INJECTION: forcing a failure. [ 1084.896706][T23751] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.930564][T23751] CPU: 1 PID: 23751 Comm: syz-executor.4 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 14:50:14 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x5}, 0x40) 14:50:14 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x6}, 0x40) 14:50:14 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x7}, 0x40) [ 1084.940752][T23751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.950800][T23751] Call Trace: [ 1084.954094][T23751] dump_stack+0x1b0/0x228 [ 1084.958435][T23751] ? devkmsg_release+0x127/0x127 [ 1084.963371][T23751] ? show_regs_print_info+0x18/0x18 [ 1084.968565][T23751] ? new_inode+0x28/0x1c0 [ 1084.972893][T23751] ? shmem_get_inode+0x114/0x690 [ 1084.977835][T23751] should_fail+0x6fb/0x860 [ 1084.982253][T23751] ? setup_fault_attr+0x2b0/0x2b0 [ 1084.987284][T23751] ? _raw_spin_unlock+0x9/0x20 [ 1084.992041][T23751] ? inode_doinit_with_dentry+0x782/0x10e0 [ 1084.997828][T23751] __should_failslab+0x11a/0x160 [ 1085.002741][T23751] ? __alloc_file+0x29/0x3b0 [ 1085.007311][T23751] should_failslab+0x9/0x20 [ 1085.011833][T23751] kmem_cache_alloc+0x37/0x2b0 [ 1085.016571][T23751] ? _raw_spin_trylock_bh+0x190/0x190 [ 1085.021929][T23751] __alloc_file+0x29/0x3b0 [ 1085.026331][T23751] ? alloc_empty_file+0x4c/0x1b0 [ 1085.031243][T23751] alloc_empty_file+0xac/0x1b0 [ 1085.035980][T23751] alloc_file+0x5b/0x4b0 [ 1085.040248][T23751] ? _raw_spin_unlock+0x9/0x20 [ 1085.044986][T23751] alloc_file_pseudo+0x25b/0x310 [ 1085.049942][T23751] ? alloc_empty_file_noaccount+0x80/0x80 [ 1085.055646][T23751] ? __kasan_check_write+0x14/0x20 [ 1085.060738][T23751] ? clear_nlink+0x87/0xe0 [ 1085.065181][T23751] __shmem_file_setup+0x1a2/0x280 [ 1085.070194][T23751] shmem_file_setup+0x2f/0x40 [ 1085.074879][T23751] __se_sys_memfd_create+0x215/0x3e0 [ 1085.080146][T23751] __x64_sys_memfd_create+0x5b/0x70 [ 1085.085325][T23751] do_syscall_64+0xc0/0x100 [ 1085.089816][T23751] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1085.095687][T23751] RIP: 0033:0x45c429 [ 1085.099623][T23751] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1085.119367][T23751] RSP: 002b:00007f898368d9d8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1085.129140][T23751] RAX: ffffffffffffffda RBX: 00007f898368e6d4 RCX: 000000000045c429 [ 1085.137095][T23751] RDX: 0000000020000298 RSI: 0000000000000000 RDI: 00000000004c134b [ 1085.146592][T23751] RBP: 000000000076bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1085.154652][T23751] R10: 00000000000001c0 R11: 0000000000000246 R12: 0000000000000003 [ 1085.162657][T23751] R13: 0000000000000c1c R14: 00000000004c134b R15: 0000000000000005 [ 1085.186768][T23746] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1085.208838][T23746] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1085.224350][T23746] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1085.242182][T23746] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1085.251950][T23746] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1085.262053][T23752] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1085.277291][T23752] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1085.285648][T23752] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1085.294876][T23752] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1085.304047][T23752] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1085.411386][T23746] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1085.416776][T23746] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1085.425042][T23746] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1085.439211][T23746] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1085.448788][T23746] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:15 executing program 5: syz_read_part_table(0x25000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:15 executing program 4 (fault-call:0 fault-nth:6): syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x4001, 0x0) 14:50:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x8}, 0x40) 14:50:15 executing program 2: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:15 executing program 3: syz_read_part_table(0x24030000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1085.490410][T23752] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1085.496895][T23752] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1085.506430][T23752] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1085.515477][T23752] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1085.522910][T23752] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:15 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x9}, 0x40) 14:50:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x4001, 0x0) 14:50:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xa}, 0x40) [ 1085.555915][T23796] FAULT_INJECTION: forcing a failure. [ 1085.555915][T23796] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.573709][T23796] CPU: 1 PID: 23796 Comm: syz-executor.4 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1085.583890][T23796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1085.593945][T23796] Call Trace: [ 1085.597234][T23796] dump_stack+0x1b0/0x228 14:50:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xb}, 0x40) 14:50:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xc}, 0x40) [ 1085.601566][T23796] ? devkmsg_release+0x127/0x127 [ 1085.606503][T23796] ? alloc_file_pseudo+0x128/0x310 [ 1085.611621][T23796] ? show_regs_print_info+0x18/0x18 [ 1085.616819][T23796] should_fail+0x6fb/0x860 [ 1085.621239][T23796] ? setup_fault_attr+0x2b0/0x2b0 [ 1085.626264][T23796] ? should_fail+0x182/0x860 [ 1085.630857][T23796] ? setup_fault_attr+0x2b0/0x2b0 [ 1085.635887][T23796] __should_failslab+0x11a/0x160 [ 1085.640806][T23796] ? security_file_alloc+0x36/0x210 [ 1085.645981][T23796] should_failslab+0x9/0x20 [ 1085.650518][T23796] kmem_cache_alloc+0x37/0x2b0 [ 1085.655348][T23796] security_file_alloc+0x36/0x210 [ 1085.660345][T23796] __alloc_file+0xd2/0x3b0 [ 1085.664738][T23796] alloc_empty_file+0xac/0x1b0 [ 1085.669549][T23796] alloc_file+0x5b/0x4b0 [ 1085.673779][T23796] ? _raw_spin_unlock+0x9/0x20 [ 1085.678611][T23796] alloc_file_pseudo+0x25b/0x310 [ 1085.683593][T23796] ? alloc_empty_file_noaccount+0x80/0x80 [ 1085.689319][T23796] ? __kasan_check_write+0x14/0x20 [ 1085.694411][T23796] ? clear_nlink+0x87/0xe0 [ 1085.698854][T23796] __shmem_file_setup+0x1a2/0x280 [ 1085.703852][T23796] shmem_file_setup+0x2f/0x40 [ 1085.708514][T23796] __se_sys_memfd_create+0x215/0x3e0 [ 1085.713876][T23796] __x64_sys_memfd_create+0x5b/0x70 [ 1085.719054][T23796] do_syscall_64+0xc0/0x100 [ 1085.723587][T23796] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1085.729483][T23796] RIP: 0033:0x45c429 [ 1085.733367][T23796] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1085.753039][T23796] RSP: 002b:00007f898368d9d8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1085.761446][T23796] RAX: ffffffffffffffda RBX: 00007f898368e6d4 RCX: 000000000045c429 [ 1085.769420][T23796] RDX: 0000000020000298 RSI: 0000000000000000 RDI: 00000000004c134b [ 1085.777375][T23796] RBP: 000000000076bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1085.785336][T23796] R10: 00000000000001c0 R11: 0000000000000246 R12: 0000000000000003 [ 1085.793336][T23796] R13: 0000000000000c1c R14: 00000000004c134b R15: 0000000000000006 [ 1085.961833][T23827] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1085.967204][T23827] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1085.974843][T23827] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1085.983136][T23827] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1085.990518][T23827] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1086.004824][T23805] loop5: p1 p2 p3 < > p4 < p5 p6 > 14:50:16 executing program 5: syz_read_part_table(0x28000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:16 executing program 4 (fault-call:0 fault-nth:7): syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:16 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xd}, 0x40) 14:50:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) 14:50:16 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1086.010421][T23805] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1086.020172][T23805] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1086.028170][T23805] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1086.035548][T23805] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1086.078472][T23845] FAULT_INJECTION: forcing a failure. [ 1086.078472][T23845] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1086.092159][T23845] CPU: 1 PID: 23845 Comm: syz-executor.4 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1086.102292][T23845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.112359][T23845] Call Trace: [ 1086.115640][T23845] dump_stack+0x1b0/0x228 [ 1086.119956][T23845] ? devkmsg_release+0x127/0x127 [ 1086.124931][T23845] ? show_regs_print_info+0x18/0x18 [ 1086.130208][T23845] ? __rcu_read_lock+0x50/0x50 [ 1086.134969][T23845] ? unwind_next_frame+0x415/0x870 [ 1086.140102][T23845] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 1086.146069][T23845] should_fail+0x6fb/0x860 [ 1086.150489][T23845] ? setup_fault_attr+0x2b0/0x2b0 [ 1086.155490][T23845] ? stack_trace_save+0x1e0/0x1e0 [ 1086.160499][T23845] ? __kernel_text_address+0x9a/0x110 [ 1086.165862][T23845] should_fail_alloc_page+0x4f/0x60 [ 1086.171089][T23845] __alloc_pages_nodemask+0x274/0x3010 [ 1086.176528][T23845] ? __rcu_read_lock+0x50/0x50 [ 1086.181386][T23845] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 1086.186745][T23845] ? avc_denied+0x1b0/0x1b0 [ 1086.191224][T23845] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1086.196791][T23845] ? find_get_entry+0x5da/0x670 [ 1086.201631][T23845] ? selinux_vm_enough_memory+0x100/0x160 [ 1086.207337][T23845] ? selinux_syslog+0x120/0x120 [ 1086.212167][T23845] ? percpu_counter_add_batch+0x136/0x160 [ 1086.217868][T23845] ? __kasan_check_read+0x11/0x20 [ 1086.222873][T23845] ? __vm_enough_memory+0x118/0x310 [ 1086.228053][T23845] shmem_getpage_gfp+0xe79/0x2400 [ 1086.233070][T23845] ? _raw_spin_lock+0xa1/0x170 [ 1086.237905][T23845] ? shmem_getpage+0xa0/0xa0 [ 1086.242471][T23845] ? iov_iter_fault_in_readable+0x2bd/0x5c0 [ 1086.248402][T23845] ? uuid_parse+0x400/0x400 [ 1086.252946][T23845] shmem_write_begin+0xc6/0x1b0 [ 1086.257774][T23845] generic_perform_write+0x271/0x530 [ 1086.263045][T23845] ? grab_cache_page_write_begin+0xa0/0xa0 [ 1086.268829][T23845] ? file_remove_privs+0x630/0x630 [ 1086.273913][T23845] ? __kasan_check_write+0x14/0x20 [ 1086.279009][T23845] ? down_write+0xd8/0x150 [ 1086.283403][T23845] __generic_file_write_iter+0x22c/0x470 [ 1086.289015][T23845] ? memset+0x31/0x40 [ 1086.292977][T23845] generic_file_write_iter+0x4b1/0x660 [ 1086.298411][T23845] __vfs_write+0x579/0x700 [ 1086.302814][T23845] ? __kernel_write+0x350/0x350 [ 1086.307641][T23845] ? security_file_permission+0x157/0x350 [ 1086.313334][T23845] ? rw_verify_area+0x1c2/0x360 [ 1086.318169][T23845] vfs_write+0x203/0x4e0 [ 1086.322391][T23845] __x64_sys_pwrite64+0x1af/0x240 [ 1086.327388][T23845] ? ksys_pwrite64+0x1d0/0x1d0 [ 1086.332149][T23845] ? syscall_return_slowpath+0x6f/0x500 [ 1086.337721][T23845] do_syscall_64+0xc0/0x100 [ 1086.342206][T23845] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1086.348107][T23845] RIP: 0033:0x416227 [ 1086.351982][T23845] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1086.371686][T23845] RSP: 002b:00007f898368d9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1086.380090][T23845] RAX: ffffffffffffffda RBX: 00007f898368e6d4 RCX: 0000000000416227 [ 1086.388062][T23845] RDX: 0000000000000040 RSI: 0000000020000000 RDI: 0000000000000004 [ 1086.396023][T23845] RBP: 000000000076bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1086.403975][T23845] R10: 00000000000001c0 R11: 0000000000000293 R12: 0000000000000003 [ 1086.412489][T23845] R13: 0000000000000c1c R14: 00000000004c134b R15: 0000000000000007 [ 1086.446525][T23827] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1086.456440][T23827] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1086.465426][T23827] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1086.473578][T23827] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1086.484719][ T1920] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1086.491992][T23827] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:16 executing program 3: syz_read_part_table(0x25000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:16 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xe}, 0x40) 14:50:16 executing program 2: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) 14:50:16 executing program 2: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:16 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xf}, 0x40) 14:50:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) [ 1086.762024][T23876] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1086.767338][T23876] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1086.781066][T23876] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1086.789521][T23876] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1086.797805][T23876] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1086.820746][T23878] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1086.826611][T23878] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1086.834173][T23878] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1086.842505][T23878] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1086.849813][T23878] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1086.970229][T23876] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1086.977443][T23876] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1086.993299][T23876] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1087.001785][T23876] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1087.009232][T23876] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:17 executing program 4 (fault-call:0 fault-nth:8): syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:17 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x10}, 0x40) 14:50:17 executing program 2: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:17 executing program 5: syz_read_part_table(0x3f000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:17 executing program 1: syz_read_part_table(0x20000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1087.024547][T23878] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1087.030015][T23878] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1087.037393][T23878] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1087.045624][T23878] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1087.057453][T23878] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1087.083713][T23904] FAULT_INJECTION: forcing a failure. [ 1087.083713][T23904] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.100344][T23904] CPU: 1 PID: 23904 Comm: syz-executor.4 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1087.110669][T23904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.120704][T23904] Call Trace: [ 1087.123980][T23904] dump_stack+0x1b0/0x228 [ 1087.128304][T23904] ? devkmsg_release+0x127/0x127 [ 1087.133226][T23904] ? show_regs_print_info+0x18/0x18 [ 1087.138429][T23904] ? memset+0x31/0x40 [ 1087.142461][T23904] should_fail+0x6fb/0x860 [ 1087.147018][T23904] ? setup_fault_attr+0x2b0/0x2b0 [ 1087.152101][T23904] ? memset+0x31/0x40 [ 1087.156070][T23904] __should_failslab+0x11a/0x160 [ 1087.160987][T23904] ? getname_flags+0xba/0x640 [ 1087.165762][T23904] should_failslab+0x9/0x20 [ 1087.170296][T23904] kmem_cache_alloc+0x37/0x2b0 [ 1087.175586][T23904] getname_flags+0xba/0x640 [ 1087.180063][T23904] getname+0x19/0x20 [ 1087.183954][T23904] do_sys_open+0x32a/0x7a0 [ 1087.188349][T23904] ? switch_fpu_return+0x10/0x10 [ 1087.193266][T23904] ? file_open_root+0x440/0x440 [ 1087.198163][T23904] ? __kasan_check_read+0x11/0x20 [ 1087.203169][T23904] ? ksys_pwrite64+0x1d0/0x1d0 [ 1087.208047][T23904] __x64_sys_open+0x87/0x90 [ 1087.212528][T23904] do_syscall_64+0xc0/0x100 [ 1087.217007][T23904] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1087.222873][T23904] RIP: 0033:0x4161c1 [ 1087.226863][T23904] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1087.246578][T23904] RSP: 002b:00007f898368d9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1087.254977][T23904] RAX: ffffffffffffffda RBX: 00007f898368e6d4 RCX: 00000000004161c1 [ 1087.262937][T23904] RDX: 00007f898368dbba RSI: 0000000000000002 RDI: 00007f898368dbb0 [ 1087.270996][T23904] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a 14:50:17 executing program 3: syz_read_part_table(0x28000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:17 executing program 2: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:17 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x11}, 0x40) 14:50:17 executing program 4 (fault-call:0 fault-nth:9): syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:17 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x12}, 0x40) 14:50:17 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x13}, 0x40) [ 1087.278946][T23904] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 1087.286900][T23904] R13: 0000000000000c1c R14: 00000000004c134b R15: 0000000000000008 14:50:17 executing program 1: syz_read_part_table(0x20000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:17 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x14}, 0x40) 14:50:17 executing program 2: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:17 executing program 1: syz_read_part_table(0x20000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1087.369396][T23929] FAULT_INJECTION: forcing a failure. [ 1087.369396][T23929] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.385497][ T1921] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1087.419006][T23929] CPU: 1 PID: 23929 Comm: syz-executor.4 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1087.429207][T23929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.439378][T23929] Call Trace: [ 1087.442664][T23929] dump_stack+0x1b0/0x228 [ 1087.446995][T23929] ? devkmsg_release+0x127/0x127 [ 1087.451929][T23929] ? show_regs_print_info+0x18/0x18 [ 1087.457108][T23929] should_fail+0x6fb/0x860 [ 1087.461554][T23929] ? setup_fault_attr+0x2b0/0x2b0 [ 1087.466561][T23929] ? __rcu_read_lock+0x50/0x50 [ 1087.471308][T23929] __should_failslab+0x11a/0x160 [ 1087.476250][T23929] ? __alloc_file+0x29/0x3b0 [ 1087.480838][T23929] should_failslab+0x9/0x20 [ 1087.485324][T23929] kmem_cache_alloc+0x37/0x2b0 [ 1087.490075][T23929] ? is_bpf_text_address+0x2c8/0x2e0 [ 1087.495353][T23929] __alloc_file+0x29/0x3b0 [ 1087.499862][T23929] ? alloc_empty_file+0x4c/0x1b0 [ 1087.504780][T23929] alloc_empty_file+0xac/0x1b0 [ 1087.509558][T23929] path_openat+0x124/0x42d0 [ 1087.514049][T23929] ? stack_trace_save+0x111/0x1e0 [ 1087.519163][T23929] ? stack_trace_snprint+0x150/0x150 [ 1087.524432][T23929] ? generic_perform_write+0x48d/0x530 [ 1087.529867][T23929] ? __kasan_kmalloc+0x179/0x1b0 [ 1087.534841][T23929] ? do_filp_open+0x430/0x430 [ 1087.539546][T23929] ? getname_flags+0xba/0x640 [ 1087.544242][T23929] ? getname+0x19/0x20 [ 1087.548305][T23929] ? do_sys_open+0x32a/0x7a0 [ 1087.552879][T23929] ? __x64_sys_open+0x87/0x90 [ 1087.557636][T23929] ? do_syscall_64+0xc0/0x100 [ 1087.562418][T23929] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1087.568470][T23929] ? __kasan_check_write+0x14/0x20 [ 1087.573595][T23929] ? up_write+0xa1/0x190 [ 1087.577830][T23929] ? __kasan_check_write+0x14/0x20 [ 1087.582923][T23929] ? down_write+0xd8/0x150 [ 1087.587316][T23929] ? up_read+0x10/0x10 [ 1087.591480][T23929] ? __generic_file_write_iter+0x247/0x470 [ 1087.597266][T23929] ? memset+0x31/0x40 [ 1087.601224][T23929] ? expand_files+0xd1/0x970 [ 1087.605832][T23929] do_filp_open+0x1f7/0x430 [ 1087.610323][T23929] ? vfs_tmpfile+0x230/0x230 [ 1087.614893][T23929] ? __kasan_check_write+0x14/0x20 [ 1087.619988][T23929] ? _raw_spin_lock+0xa1/0x170 [ 1087.624732][T23929] ? _raw_spin_trylock_bh+0x190/0x190 [ 1087.630085][T23929] ? __kasan_check_read+0x11/0x20 [ 1087.635108][T23929] ? __check_object_size+0x309/0x3d0 [ 1087.640373][T23929] ? _raw_spin_unlock+0x9/0x20 [ 1087.645166][T23929] ? get_unused_fd_flags+0x97/0xb0 [ 1087.650301][T23929] do_sys_open+0x36f/0x7a0 [ 1087.654788][T23929] ? file_open_root+0x440/0x440 [ 1087.659630][T23929] ? __kasan_check_read+0x11/0x20 [ 1087.664655][T23929] ? ksys_pwrite64+0x1d0/0x1d0 [ 1087.669403][T23929] __x64_sys_open+0x87/0x90 [ 1087.673899][T23929] do_syscall_64+0xc0/0x100 [ 1087.678415][T23929] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1087.684283][T23929] RIP: 0033:0x4161c1 [ 1087.688217][T23929] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1087.707803][T23929] RSP: 002b:00007f898368d9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1087.716192][T23929] RAX: ffffffffffffffda RBX: 00007f898368e6d4 RCX: 00000000004161c1 [ 1087.724202][T23929] RDX: 00007f898368dbba RSI: 0000000000000002 RDI: 00007f898368dbb0 [ 1087.732159][T23929] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 1087.740166][T23929] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 1087.748120][T23929] R13: 0000000000000c1c R14: 00000000004c134b R15: 0000000000000009 [ 1087.792836][T23902] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1087.806879][T23902] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1087.829876][T23902] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1087.838226][T23902] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1087.845534][T23902] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1087.878135][T23945] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1087.886299][T23945] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1087.893777][T23945] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1087.901848][T23945] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1087.909090][T23945] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:17 executing program 5: syz_read_part_table(0x40000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1088.063759][T23945] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1088.074166][T23945] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1088.081659][T23945] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1088.089606][T23945] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1088.097000][T23945] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:18 executing program 3: syz_read_part_table(0x2a000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:18 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x15}, 0x40) 14:50:18 executing program 4 (fault-call:0 fault-nth:10): syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:18 executing program 1 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1088.120316][T23958] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1088.125696][T23958] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1088.133869][T23958] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1088.142362][T23958] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1088.154543][T23970] FAULT_INJECTION: forcing a failure. [ 1088.154543][T23970] name failslab, interval 1, probability 0, space 0, times 0 14:50:18 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x16}, 0x40) [ 1088.158108][T23958] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1088.174640][T23970] CPU: 1 PID: 23970 Comm: syz-executor.4 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1088.177781][T23971] FAULT_INJECTION: forcing a failure. [ 1088.177781][T23971] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.184793][T23970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.184798][T23970] Call Trace: [ 1088.184817][T23970] dump_stack+0x1b0/0x228 [ 1088.184829][T23970] ? devkmsg_release+0x127/0x127 14:50:18 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x17}, 0x40) [ 1088.184837][T23970] ? show_regs_print_info+0x18/0x18 [ 1088.184854][T23970] should_fail+0x6fb/0x860 [ 1088.229690][T23970] ? setup_fault_attr+0x2b0/0x2b0 [ 1088.234799][T23970] ? should_fail+0x182/0x860 [ 1088.239398][T23970] ? __read_once_size_nocheck+0x10/0x10 [ 1088.244944][T23970] ? unwind_next_frame+0x415/0x870 [ 1088.250049][T23970] ? setup_fault_attr+0x2b0/0x2b0 [ 1088.255071][T23970] __should_failslab+0x11a/0x160 [ 1088.260028][T23970] ? security_file_alloc+0x36/0x210 [ 1088.265222][T23970] should_failslab+0x9/0x20 14:50:18 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x300}, 0x40) 14:50:18 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x500}, 0x40) [ 1088.269746][T23970] kmem_cache_alloc+0x37/0x2b0 [ 1088.274631][T23970] security_file_alloc+0x36/0x210 [ 1088.279650][T23970] __alloc_file+0xd2/0x3b0 [ 1088.284055][T23970] alloc_empty_file+0xac/0x1b0 [ 1088.288806][T23970] path_openat+0x124/0x42d0 [ 1088.293425][T23970] ? stack_trace_save+0x111/0x1e0 [ 1088.298446][T23970] ? stack_trace_snprint+0x150/0x150 [ 1088.303722][T23970] ? generic_perform_write+0x48d/0x530 [ 1088.309307][T23970] ? __kasan_kmalloc+0x179/0x1b0 [ 1088.314238][T23970] ? do_filp_open+0x430/0x430 14:50:18 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x600}, 0x40) [ 1088.318904][T23970] ? getname_flags+0xba/0x640 [ 1088.323594][T23970] ? getname+0x19/0x20 [ 1088.327668][T23970] ? do_sys_open+0x32a/0x7a0 [ 1088.332252][T23970] ? __x64_sys_open+0x87/0x90 [ 1088.337023][T23970] ? do_syscall_64+0xc0/0x100 [ 1088.341687][T23970] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1088.347749][T23970] ? __kasan_check_write+0x14/0x20 [ 1088.352972][T23970] ? up_write+0xa1/0x190 [ 1088.357198][T23970] ? __kasan_check_write+0x14/0x20 [ 1088.362319][T23970] ? down_write+0xd8/0x150 [ 1088.366725][T23970] ? up_read+0x10/0x10 [ 1088.370820][T23970] ? __generic_file_write_iter+0x247/0x470 [ 1088.376616][T23970] ? memset+0x31/0x40 [ 1088.380593][T23970] ? expand_files+0xd1/0x970 [ 1088.385273][T23970] do_filp_open+0x1f7/0x430 [ 1088.389785][T23970] ? vfs_tmpfile+0x230/0x230 [ 1088.394364][T23970] ? __kasan_check_write+0x14/0x20 [ 1088.399455][T23970] ? _raw_spin_lock+0xa1/0x170 [ 1088.404226][T23970] ? _raw_spin_trylock_bh+0x190/0x190 [ 1088.409583][T23970] ? __kasan_check_read+0x11/0x20 [ 1088.414614][T23970] ? __check_object_size+0x309/0x3d0 [ 1088.419887][T23970] ? _raw_spin_unlock+0x9/0x20 [ 1088.424636][T23970] ? get_unused_fd_flags+0x97/0xb0 [ 1088.429727][T23970] do_sys_open+0x36f/0x7a0 [ 1088.434126][T23970] ? file_open_root+0x440/0x440 [ 1088.438968][T23970] ? __kasan_check_read+0x11/0x20 [ 1088.443986][T23970] ? ksys_pwrite64+0x1d0/0x1d0 [ 1088.448732][T23970] __x64_sys_open+0x87/0x90 [ 1088.453228][T23970] do_syscall_64+0xc0/0x100 [ 1088.457715][T23970] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1088.463706][T23970] RIP: 0033:0x4161c1 [ 1088.467582][T23970] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1088.487303][T23970] RSP: 002b:00007f898368d9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1088.495704][T23970] RAX: ffffffffffffffda RBX: 00007f898368e6d4 RCX: 00000000004161c1 [ 1088.503661][T23970] RDX: 00007f898368dbba RSI: 0000000000000002 RDI: 00007f898368dbb0 [ 1088.511620][T23970] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 1088.519578][T23970] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 1088.527535][T23970] R13: 0000000000000c1c R14: 00000000004c134b R15: 000000000000000a [ 1088.535599][T23971] CPU: 0 PID: 23971 Comm: syz-executor.1 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1088.545754][T23971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.555856][T23971] Call Trace: [ 1088.559130][T23971] dump_stack+0x1b0/0x228 [ 1088.563494][T23971] ? devkmsg_release+0x127/0x127 [ 1088.568434][T23971] ? show_regs_print_info+0x18/0x18 [ 1088.573623][T23971] ? proc_fail_nth_write+0x166/0x200 [ 1088.578885][T23971] ? proc_fail_nth_read+0x1c0/0x1c0 [ 1088.584115][T23971] should_fail+0x6fb/0x860 [ 1088.588519][T23971] ? setup_fault_attr+0x2b0/0x2b0 [ 1088.593525][T23971] ? fsnotify+0x1390/0x1450 [ 1088.598007][T23971] ? __kernel_write+0x350/0x350 [ 1088.602831][T23971] __should_failslab+0x11a/0x160 [ 1088.607754][T23971] ? getname_flags+0xba/0x640 [ 1088.612415][T23971] should_failslab+0x9/0x20 [ 1088.616897][T23971] kmem_cache_alloc+0x37/0x2b0 [ 1088.621657][T23971] getname_flags+0xba/0x640 [ 1088.626237][T23971] getname+0x19/0x20 [ 1088.630107][T23971] do_sys_open+0x32a/0x7a0 [ 1088.634497][T23971] ? fput_many+0x47/0x1a0 [ 1088.638911][T23971] ? file_open_root+0x440/0x440 [ 1088.643756][T23971] ? __kasan_check_read+0x11/0x20 [ 1088.648823][T23971] ? __ia32_sys_clock_settime+0x230/0x230 [ 1088.654522][T23971] __x64_sys_openat+0xa2/0xb0 [ 1088.659177][T23971] do_syscall_64+0xc0/0x100 [ 1088.663661][T23971] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1088.669539][T23971] RIP: 0033:0x45c429 [ 1088.673418][T23971] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1088.693158][T23971] RSP: 002b:00007f113f87ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1088.701563][T23971] RAX: ffffffffffffffda RBX: 00007f113f87f6d4 RCX: 000000000045c429 [ 1088.709513][T23971] RDX: 0000000000004001 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1088.717467][T23971] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1088.725774][T23971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1088.733786][T23971] R13: 00000000000007f3 R14: 00000000004ca6bf R15: 0000000000000000 14:50:18 executing program 5: syz_read_part_table(0x40000800, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:18 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x700}, 0x40) [ 1088.900713][T23997] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1088.907427][T23997] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1088.914885][T23997] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1088.928249][T23997] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1088.935610][T23997] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1088.950507][T24004] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1088.956272][T24004] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1088.967549][T24004] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1088.976671][T24004] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1088.986105][T24004] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1089.142951][T23997] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1089.148371][T23997] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1089.163062][T23997] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1089.174300][T23997] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1089.181938][T23997] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:19 executing program 3: syz_read_part_table(0x2c000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:19 executing program 4 (fault-call:0 fault-nth:11): syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x5, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:19 executing program 1 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:19 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x900}, 0x40) 14:50:19 executing program 5: syz_read_part_table(0x44030000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1089.191827][T24004] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1089.197167][T24004] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1089.208500][T24004] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1089.220457][T24004] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1089.227673][T24004] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:19 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xa00}, 0x40) 14:50:19 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xb00}, 0x40) [ 1089.271738][T24038] FAULT_INJECTION: forcing a failure. [ 1089.271738][T24038] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.293296][T24038] CPU: 1 PID: 24038 Comm: syz-executor.1 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1089.303688][T24038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.313741][T24038] Call Trace: [ 1089.317064][T24038] dump_stack+0x1b0/0x228 14:50:19 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xc00}, 0x40) 14:50:19 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xd00}, 0x40) [ 1089.321400][T24038] ? devkmsg_release+0x127/0x127 [ 1089.326342][T24038] ? show_regs_print_info+0x18/0x18 [ 1089.331547][T24038] should_fail+0x6fb/0x860 [ 1089.335971][T24038] ? setup_fault_attr+0x2b0/0x2b0 [ 1089.341329][T24038] ? __rcu_read_lock+0x50/0x50 [ 1089.346140][T24038] __should_failslab+0x11a/0x160 [ 1089.351216][T24038] ? __alloc_file+0x29/0x3b0 [ 1089.356527][T24038] should_failslab+0x9/0x20 [ 1089.361044][T24038] kmem_cache_alloc+0x37/0x2b0 [ 1089.365821][T24038] ? is_bpf_text_address+0x2c8/0x2e0 14:50:19 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xe00}, 0x40) [ 1089.371107][T24038] __alloc_file+0x29/0x3b0 [ 1089.375527][T24038] ? alloc_empty_file+0x4c/0x1b0 [ 1089.380830][T24038] alloc_empty_file+0xac/0x1b0 [ 1089.385682][T24038] path_openat+0x124/0x42d0 [ 1089.390188][T24038] ? stack_trace_save+0x111/0x1e0 [ 1089.395231][T24038] ? stack_trace_snprint+0x150/0x150 [ 1089.400520][T24038] ? kstrtouint_from_user+0x1cb/0x230 [ 1089.405895][T24038] ? __kasan_kmalloc+0x179/0x1b0 [ 1089.410835][T24038] ? do_filp_open+0x430/0x430 [ 1089.416700][T24038] ? getname_flags+0xba/0x640 [ 1089.421377][T24038] ? getname+0x19/0x20 [ 1089.425430][T24038] ? do_sys_open+0x32a/0x7a0 [ 1089.430005][T24038] ? __x64_sys_openat+0xa2/0xb0 [ 1089.434843][T24038] ? do_syscall_64+0xc0/0x100 [ 1089.439508][T24038] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1089.445648][T24038] ? get_pid_task+0x8d/0xa0 [ 1089.450135][T24038] ? proc_fail_nth_write+0x166/0x200 [ 1089.458272][T24038] ? proc_fail_nth_read+0x1c0/0x1c0 [ 1089.463466][T24038] ? expand_files+0xd1/0x970 [ 1089.468049][T24038] do_filp_open+0x1f7/0x430 [ 1089.472541][T24038] ? vfs_tmpfile+0x230/0x230 [ 1089.477109][T24038] ? __kasan_check_write+0x14/0x20 [ 1089.482211][T24038] ? _raw_spin_lock+0xa1/0x170 [ 1089.487049][T24038] ? _raw_spin_trylock_bh+0x190/0x190 [ 1089.492529][T24038] ? __kasan_check_read+0x11/0x20 [ 1089.498450][T24038] ? __check_object_size+0x309/0x3d0 [ 1089.503718][T24038] ? _raw_spin_unlock+0x9/0x20 [ 1089.508469][T24038] ? get_unused_fd_flags+0x97/0xb0 [ 1089.513562][T24038] do_sys_open+0x36f/0x7a0 [ 1089.518165][T24038] ? fput_many+0x47/0x1a0 [ 1089.522477][T24038] ? file_open_root+0x440/0x440 [ 1089.527308][T24038] ? __kasan_check_read+0x11/0x20 [ 1089.532315][T24038] ? __ia32_sys_clock_settime+0x230/0x230 [ 1089.538127][T24038] __x64_sys_openat+0xa2/0xb0 [ 1089.542907][T24038] do_syscall_64+0xc0/0x100 [ 1089.547418][T24038] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1089.553350][T24038] RIP: 0033:0x45c429 [ 1089.557237][T24038] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1089.576949][T24038] RSP: 002b:00007f113f87ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1089.585582][T24038] RAX: ffffffffffffffda RBX: 00007f113f87f6d4 RCX: 000000000045c429 [ 1089.593538][T24038] RDX: 0000000000004001 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1089.601495][T24038] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1089.609577][T24038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1089.617539][T24038] R13: 00000000000007f3 R14: 00000000004ca6bf R15: 0000000000000001 [ 1089.629275][T24037] FAULT_INJECTION: forcing a failure. [ 1089.629275][T24037] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.645745][T24037] CPU: 1 PID: 24037 Comm: syz-executor.4 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1089.656067][T24037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.666133][T24037] Call Trace: [ 1089.669564][T24037] dump_stack+0x1b0/0x228 [ 1089.673929][T24037] ? devkmsg_release+0x127/0x127 [ 1089.678844][T24037] ? unwind_next_frame+0x415/0x870 [ 1089.683998][T24037] ? show_regs_print_info+0x18/0x18 [ 1089.689189][T24037] should_fail+0x6fb/0x860 [ 1089.693585][T24037] ? setup_fault_attr+0x2b0/0x2b0 [ 1089.698586][T24037] ? __kasan_check_write+0x14/0x20 [ 1089.703681][T24037] ? kobject_get_unless_zero+0x1c8/0x2a0 [ 1089.709457][T24037] __should_failslab+0x11a/0x160 [ 1089.714375][T24037] ? __kthread_create_on_node+0x142/0x470 [ 1089.720077][T24037] should_failslab+0x9/0x20 [ 1089.724628][T24037] kmem_cache_alloc_trace+0x3a/0x2f0 [ 1089.730059][T24037] ? __kasan_check_write+0x14/0x20 [ 1089.735169][T24037] ? loop_set_fd+0x1280/0x1280 [ 1089.739919][T24037] __kthread_create_on_node+0x142/0x470 [ 1089.745472][T24037] ? kthread_create_on_node+0x110/0x110 [ 1089.750998][T24037] ? _raw_spin_unlock+0x9/0x20 [ 1089.755736][T24037] ? bd_start_claiming+0x469/0x550 [ 1089.760827][T24037] ? loop_set_fd+0x1280/0x1280 [ 1089.765692][T24037] kthread_create_on_node+0xc6/0x110 [ 1089.770971][T24037] ? tsk_fork_get_node+0x10/0x10 [ 1089.775939][T24037] ? mutex_lock_killable+0x10a/0x120 [ 1089.781225][T24037] ? _raw_spin_lock+0xa1/0x170 [ 1089.785970][T24037] ? memset+0x31/0x40 [ 1089.790559][T24037] loop_set_fd+0x69d/0x1280 [ 1089.795118][T24037] lo_ioctl+0x17a/0x2340 [ 1089.799347][T24037] ? update_cfs_group+0x25a/0x270 [ 1089.804353][T24037] ? lo_release+0x1f0/0x1f0 [ 1089.808971][T24037] ? enqueue_task_fair+0x2255/0x24a0 [ 1089.814653][T24037] ? check_preempt_wakeup+0x56a/0xba0 [ 1089.820194][T24037] ? __kasan_check_read+0x11/0x20 [ 1089.825225][T24037] ? ttwu_do_wakeup+0x1dc/0x5d0 [ 1089.830164][T24037] ? __kasan_check_read+0x11/0x20 [ 1089.835170][T24037] ? try_to_wake_up+0x1615/0x2190 [ 1089.840220][T24037] ? schedule+0x14b/0x1d0 [ 1089.844668][T24037] ? cpus_share_cache+0xd0/0xd0 [ 1089.849495][T24037] ? __kasan_check_write+0x14/0x20 [ 1089.854589][T24037] ? _raw_spin_lock+0xa1/0x170 [ 1089.859339][T24037] ? _raw_spin_trylock_bh+0x190/0x190 [ 1089.864686][T24037] ? mutex_lock+0xa6/0x110 [ 1089.869698][T24037] ? wake_up_q+0x84/0xb0 [ 1089.873920][T24037] ? __kasan_check_write+0x14/0x20 [ 1089.879538][T24037] ? up_write+0xa1/0x190 [ 1089.883824][T24037] ? __kasan_check_write+0x14/0x20 [ 1089.888973][T24037] ? down_write+0xd8/0x150 [ 1089.895451][T24037] ? up_read+0x10/0x10 [ 1089.902636][T24037] ? __kasan_check_write+0x14/0x20 [ 1089.907744][T24037] ? disk_unblock_events+0x51/0x60 [ 1089.912835][T24037] ? __blkdev_get+0x125b/0x1b40 [ 1089.918886][T24037] ? __read_once_size_nocheck+0x10/0x10 [ 1089.924587][T24037] ? unwind_next_frame+0x415/0x870 [ 1089.929796][T24037] ? __rcu_read_lock+0x50/0x50 [ 1089.934541][T24037] ? unwind_next_frame+0x415/0x870 [ 1089.939639][T24037] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 1089.945730][T24037] ? is_bpf_text_address+0x2c8/0x2e0 [ 1089.951025][T24037] ? lo_release+0x1f0/0x1f0 [ 1089.955726][T24037] blkdev_ioctl+0x89a/0x2c30 [ 1089.960299][T24037] ? __kernel_text_address+0x9a/0x110 [ 1089.965706][T24037] ? unwind_get_return_address+0x4c/0x90 [ 1089.971318][T24037] ? arch_stack_walk+0x98/0xe0 [ 1089.976110][T24037] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 1089.981376][T24037] ? __rcu_read_lock+0x50/0x50 [ 1089.986547][T24037] ? stack_trace_save+0x111/0x1e0 [ 1089.991548][T24037] ? avc_has_extended_perms+0xb25/0x10c0 [ 1089.997274][T24037] ? __kasan_slab_free+0x1e2/0x220 [ 1090.004793][T24037] ? __kasan_slab_free+0x168/0x220 [ 1090.009890][T24037] ? kasan_slab_free+0xe/0x10 [ 1090.014551][T24037] ? kmem_cache_free+0x181/0x7a0 [ 1090.019520][T24037] ? avc_ss_reset+0x3e0/0x3e0 [ 1090.024221][T24037] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1090.030274][T24037] ? up_write+0xa1/0x190 [ 1090.034531][T24037] ? __kasan_check_write+0x14/0x20 [ 1090.039670][T24037] ? down_write+0xd8/0x150 [ 1090.044075][T24037] ? up_read+0x10/0x10 [ 1090.048167][T24037] ? __generic_file_write_iter+0x247/0x470 [ 1090.053964][T24037] ? memset+0x31/0x40 [ 1090.057925][T24037] ? expand_files+0xd1/0x970 [ 1090.062551][T24037] ? do_filp_open+0x2e1/0x430 [ 1090.067286][T24037] ? memset+0x31/0x40 [ 1090.071337][T24037] block_ioctl+0xbd/0x100 [ 1090.075662][T24037] ? blkdev_iopoll+0x100/0x100 [ 1090.080411][T24037] do_vfs_ioctl+0x747/0x1700 [ 1090.084981][T24037] ? selinux_file_ioctl+0x6e4/0x920 [ 1090.090158][T24037] ? ioctl_preallocate+0x240/0x240 [ 1090.095260][T24037] ? __fget+0x37c/0x3c0 [ 1090.099406][T24037] ? __kasan_check_write+0x14/0x20 [ 1090.104502][T24037] ? fget_many+0x30/0x30 [ 1090.108740][T24037] ? security_file_ioctl+0xae/0xd0 [ 1090.113841][T24037] __x64_sys_ioctl+0xe3/0x120 [ 1090.118507][T24037] do_syscall_64+0xc0/0x100 [ 1090.122992][T24037] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1090.128998][T24037] RIP: 0033:0x45c297 [ 1090.132875][T24037] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1090.153781][T24037] RSP: 002b:00007f898368d9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1090.162182][T24037] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c297 [ 1090.170143][T24037] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1090.178215][T24037] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 1090.186194][T24037] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1090.194144][T24037] R13: 0000000000000c1c R14: 00000000004c134b R15: 000000000000000b [ 1090.315644][T24064] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1090.329742][T24064] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1090.342443][T24064] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1090.353145][T24064] loop3: p5 size 11290111 extends beyond EOD, truncated 14:50:20 executing program 3: syz_read_part_table(0x3f000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:20 executing program 1 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:20 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xf00}, 0x40) [ 1090.360813][T24064] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1090.380863][T24075] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1090.387436][T24075] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1090.395879][T24075] loop5: p2 size 1073741824 extends beyond EOD, truncated 14:50:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x2b, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:20 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1090.410690][T24075] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1090.423440][T24075] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1090.425631][T24082] FAULT_INJECTION: forcing a failure. [ 1090.425631][T24082] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.446181][T24082] CPU: 0 PID: 24082 Comm: syz-executor.1 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1090.456353][T24082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.466414][T24082] Call Trace: [ 1090.469720][T24082] dump_stack+0x1b0/0x228 [ 1090.474059][T24082] ? devkmsg_release+0x127/0x127 [ 1090.478999][T24082] ? show_regs_print_info+0x18/0x18 [ 1090.484229][T24082] should_fail+0x6fb/0x860 [ 1090.488647][T24082] ? setup_fault_attr+0x2b0/0x2b0 [ 1090.493677][T24082] ? should_fail+0x182/0x860 [ 1090.498267][T24082] ? __read_once_size_nocheck+0x10/0x10 [ 1090.503812][T24082] ? unwind_next_frame+0x415/0x870 [ 1090.508933][T24082] ? setup_fault_attr+0x2b0/0x2b0 [ 1090.513961][T24082] __should_failslab+0x11a/0x160 [ 1090.518905][T24082] ? security_file_alloc+0x36/0x210 [ 1090.524101][T24082] should_failslab+0x9/0x20 [ 1090.528693][T24082] kmem_cache_alloc+0x37/0x2b0 [ 1090.533457][T24082] security_file_alloc+0x36/0x210 [ 1090.538474][T24082] __alloc_file+0xd2/0x3b0 [ 1090.542872][T24082] alloc_empty_file+0xac/0x1b0 [ 1090.547624][T24082] path_openat+0x124/0x42d0 [ 1090.552204][T24082] ? stack_trace_save+0x111/0x1e0 [ 1090.557226][T24082] ? stack_trace_snprint+0x150/0x150 [ 1090.562490][T24082] ? kstrtouint_from_user+0x1cb/0x230 [ 1090.567962][T24082] ? __kasan_kmalloc+0x179/0x1b0 [ 1090.573168][T24082] ? do_filp_open+0x430/0x430 [ 1090.578346][T24082] ? getname_flags+0xba/0x640 [ 1090.583254][T24082] ? getname+0x19/0x20 [ 1090.587306][T24082] ? do_sys_open+0x32a/0x7a0 [ 1090.592019][T24082] ? __x64_sys_openat+0xa2/0xb0 [ 1090.596991][T24082] ? do_syscall_64+0xc0/0x100 [ 1090.601647][T24082] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1090.607705][T24082] ? get_pid_task+0x8d/0xa0 [ 1090.612239][T24082] ? proc_fail_nth_write+0x166/0x200 [ 1090.617511][T24082] ? proc_fail_nth_read+0x1c0/0x1c0 [ 1090.622760][T24082] ? expand_files+0xd1/0x970 [ 1090.627394][T24082] do_filp_open+0x1f7/0x430 [ 1090.631876][T24082] ? vfs_tmpfile+0x230/0x230 [ 1090.636461][T24082] ? __kasan_check_write+0x14/0x20 [ 1090.641665][T24082] ? _raw_spin_lock+0xa1/0x170 [ 1090.646408][T24082] ? _raw_spin_trylock_bh+0x190/0x190 [ 1090.651755][T24082] ? __kasan_check_read+0x11/0x20 [ 1090.656764][T24082] ? __check_object_size+0x309/0x3d0 [ 1090.662032][T24082] ? _raw_spin_unlock+0x9/0x20 [ 1090.666820][T24082] ? get_unused_fd_flags+0x97/0xb0 [ 1090.672081][T24082] do_sys_open+0x36f/0x7a0 [ 1090.676629][T24082] ? fput_many+0x47/0x1a0 [ 1090.680971][T24082] ? file_open_root+0x440/0x440 [ 1090.685815][T24082] ? __kasan_check_read+0x11/0x20 [ 1090.690821][T24082] ? __ia32_sys_clock_settime+0x230/0x230 [ 1090.696525][T24082] __x64_sys_openat+0xa2/0xb0 [ 1090.701219][T24082] do_syscall_64+0xc0/0x100 [ 1090.705709][T24082] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1090.711594][T24082] RIP: 0033:0x45c429 [ 1090.715572][T24082] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1090.735245][T24082] RSP: 002b:00007f113f87ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1090.743688][T24082] RAX: ffffffffffffffda RBX: 00007f113f87f6d4 RCX: 000000000045c429 [ 1090.751654][T24082] RDX: 0000000000004001 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1090.759641][T24082] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1090.767592][T24082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1090.775597][T24082] R13: 00000000000007f3 R14: 00000000004ca6bf R15: 0000000000000002 [ 1090.850996][T24094] print_req_error: 2578 callbacks suppressed [ 1090.851005][T24094] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1090.870378][ T136] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1090.881268][ T136] buffer_io_error: 2552 callbacks suppressed [ 1090.881275][ T136] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 1090.897871][T24095] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1090.903007][T24087] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1090.909816][T24096] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1090.917291][ T177] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1090.937622][ T177] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 1090.944322][T24087] loop4: partition table partially beyond EOD, truncated [ 1090.946196][ T177] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1090.956471][T24075] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1090.964248][ T177] Buffer I/O error on dev loop5p5, logical block 131968, async page read [ 1090.972567][T24087] loop4: p1 start 10 is beyond EOD, truncated [ 1090.980295][ T177] blk_update_request: I/O error, dev loop5, sector 263948 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1090.986515][T24087] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1090.997915][ T177] Buffer I/O error on dev loop5p5, logical block 131969, async page read [ 1091.006364][T24087] loop4: p3 start 225 is beyond EOD, truncated [ 1091.013759][ T177] blk_update_request: I/O error, dev loop5, sector 263950 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1091.025961][T24087] loop4: p4 size 2 extends beyond EOD, truncated [ 1091.031201][ T177] Buffer I/O error on dev loop5p5, logical block 131970, async page read [ 1091.031233][ T177] blk_update_request: I/O error, dev loop5, sector 263952 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1091.038970][T24087] loop4: p5 start 10 is beyond EOD, truncated [ 1091.046149][ T177] Buffer I/O error on dev loop5p5, logical block 131971, async page read [ 1091.057735][T24087] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1091.063889][ T177] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1091.072392][T24095] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 1091.080341][ T177] Buffer I/O error on dev loop5p6, logical block 33008, async page read [ 1091.108054][ T177] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 1091.108130][T24096] Buffer I/O error on dev loop5p5, logical block 132080, async page read [ 1091.140920][T24101] loop3: p1 p2 p3 < > p4 < p5 p6 > 14:50:21 executing program 5: syz_read_part_table(0x48000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x2c, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x1100}, 0x40) 14:50:21 executing program 1 (fault-call:3 fault-nth:3): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1091.146361][T24101] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1091.153830][T24101] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1091.162047][T24101] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1091.169309][T24101] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1091.216694][T24115] FAULT_INJECTION: forcing a failure. [ 1091.216694][T24115] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.232178][T24115] CPU: 0 PID: 24115 Comm: syz-executor.1 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1091.243098][T24115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.253220][T24115] Call Trace: [ 1091.256497][T24115] dump_stack+0x1b0/0x228 [ 1091.260839][T24115] ? devkmsg_release+0x127/0x127 [ 1091.265935][T24115] ? show_regs_print_info+0x18/0x18 [ 1091.271144][T24115] should_fail+0x6fb/0x860 [ 1091.275564][T24115] ? setup_fault_attr+0x2b0/0x2b0 [ 1091.280589][T24115] __should_failslab+0x11a/0x160 [ 1091.285526][T24115] ? tty_open+0x10d/0x1270 [ 1091.289936][T24115] should_failslab+0x9/0x20 [ 1091.294427][T24115] kmem_cache_alloc_trace+0x3a/0x2f0 [ 1091.299700][T24115] tty_open+0x10d/0x1270 [ 1091.303929][T24115] ? memset+0x31/0x40 [ 1091.307932][T24115] ? __kasan_check_write+0x14/0x20 [ 1091.313017][T24115] ? kobject_get_unless_zero+0x1c8/0x2a0 [ 1091.318960][T24115] ? tty_compat_ioctl+0xc90/0xc90 [ 1091.324033][T24115] chrdev_open+0x60a/0x670 [ 1091.328435][T24115] ? cd_forget+0x160/0x160 [ 1091.332886][T24115] ? security_file_open+0x23b/0x2f0 [ 1091.338103][T24115] ? cd_forget+0x160/0x160 [ 1091.342506][T24115] do_dentry_open+0x8f7/0x1070 [ 1091.347264][T24115] ? finish_open+0xe0/0xe0 [ 1091.351663][T24115] ? inode_permission2+0xe6/0x600 [ 1091.356667][T24115] ? vfs_open+0x2f/0x80 [ 1091.360922][T24115] vfs_open+0x73/0x80 [ 1091.364900][T24115] path_openat+0x1681/0x42d0 [ 1091.369604][T24115] ? kstrtouint_from_user+0x1cb/0x230 [ 1091.377832][T24115] ? do_filp_open+0x430/0x430 [ 1091.382864][T24115] ? getname_flags+0xba/0x640 [ 1091.387588][T24115] ? getname+0x19/0x20 [ 1091.391787][T24115] ? do_sys_open+0x32a/0x7a0 [ 1091.396352][T24115] ? __x64_sys_openat+0xa2/0xb0 [ 1091.401185][T24115] ? do_syscall_64+0xc0/0x100 [ 1091.405951][T24115] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1091.412034][T24115] ? get_pid_task+0x8d/0xa0 [ 1091.416528][T24115] ? proc_fail_nth_write+0x166/0x200 [ 1091.421839][T24115] ? proc_fail_nth_read+0x1c0/0x1c0 [ 1091.427014][T24115] ? expand_files+0xd1/0x970 [ 1091.431707][T24115] do_filp_open+0x1f7/0x430 [ 1091.436191][T24115] ? vfs_tmpfile+0x230/0x230 [ 1091.440766][T24115] ? __kasan_check_read+0x11/0x20 [ 1091.445764][T24115] ? __check_object_size+0x309/0x3d0 [ 1091.451087][T24115] ? _raw_spin_unlock+0x9/0x20 [ 1091.455837][T24115] ? get_unused_fd_flags+0x97/0xb0 [ 1091.460970][T24115] do_sys_open+0x36f/0x7a0 [ 1091.465363][T24115] ? fput_many+0x47/0x1a0 [ 1091.469674][T24115] ? file_open_root+0x440/0x440 [ 1091.474503][T24115] ? __kasan_check_read+0x11/0x20 [ 1091.479556][T24115] ? __ia32_sys_clock_settime+0x230/0x230 [ 1091.485302][T24115] __x64_sys_openat+0xa2/0xb0 [ 1091.489961][T24115] do_syscall_64+0xc0/0x100 [ 1091.494448][T24115] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1091.500317][T24115] RIP: 0033:0x45c429 [ 1091.504379][T24115] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1091.528179][T24115] RSP: 002b:00007f113f87ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1091.536569][T24115] RAX: ffffffffffffffda RBX: 00007f113f87f6d4 RCX: 000000000045c429 [ 1091.544575][T24115] RDX: 0000000000004001 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1091.552550][T24115] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 14:50:21 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x1200}, 0x40) 14:50:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:21 executing program 1 (fault-call:3 fault-nth:4): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1091.564504][T24115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1091.572502][T24115] R13: 00000000000007f3 R14: 00000000004ca6bf R15: 0000000000000003 [ 1091.620106][T24101] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1091.639835][T24119] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 1091.664954][T24130] FAULT_INJECTION: forcing a failure. [ 1091.664954][T24130] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.678306][T24130] CPU: 0 PID: 24130 Comm: syz-executor.1 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1091.688479][T24130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.698541][T24130] Call Trace: [ 1091.701841][T24130] dump_stack+0x1b0/0x228 [ 1091.706154][T24130] ? devkmsg_release+0x127/0x127 [ 1091.711074][T24130] ? show_regs_print_info+0x18/0x18 [ 1091.716253][T24130] ? __kasan_kmalloc+0x179/0x1b0 [ 1091.721259][T24130] should_fail+0x6fb/0x860 [ 1091.725668][T24130] ? setup_fault_attr+0x2b0/0x2b0 [ 1091.730678][T24130] ? __kernel_text_address+0x9a/0x110 [ 1091.736049][T24130] ? __rcu_read_lock+0x50/0x50 [ 1091.740804][T24130] __should_failslab+0x11a/0x160 [ 1091.745743][T24130] ? alloc_tty_struct+0xa6/0x7b0 [ 1091.750681][T24130] should_failslab+0x9/0x20 [ 1091.755163][T24130] kmem_cache_alloc_trace+0x3a/0x2f0 [ 1091.760446][T24130] ? should_fail+0x182/0x860 [ 1091.765053][T24130] alloc_tty_struct+0xa6/0x7b0 [ 1091.769805][T24130] ? tty_init_dev+0x800/0x800 [ 1091.774462][T24130] ? __kasan_check_write+0x14/0x20 [ 1091.779580][T24130] ? mutex_lock+0xa6/0x110 [ 1091.783979][T24130] ? mutex_trylock+0xb0/0xb0 [ 1091.788562][T24130] tty_init_dev+0x5d/0x800 [ 1091.792972][T24130] tty_open+0xc34/0x1270 [ 1091.801661][T24130] ? memset+0x31/0x40 [ 1091.805663][T24130] ? tty_compat_ioctl+0xc90/0xc90 [ 1091.811055][T24130] chrdev_open+0x60a/0x670 [ 1091.815467][T24130] ? cd_forget+0x160/0x160 [ 1091.819893][T24130] ? security_file_open+0x23b/0x2f0 [ 1091.825098][T24130] ? cd_forget+0x160/0x160 [ 1091.829497][T24130] do_dentry_open+0x8f7/0x1070 [ 1091.834258][T24130] ? finish_open+0xe0/0xe0 [ 1091.838668][T24130] ? inode_permission2+0xe6/0x600 [ 1091.843851][T24130] ? vfs_open+0x2f/0x80 [ 1091.848161][T24130] vfs_open+0x73/0x80 [ 1091.852148][T24130] path_openat+0x1681/0x42d0 [ 1091.856821][T24130] ? kstrtouint_from_user+0x1cb/0x230 [ 1091.862175][T24130] ? do_filp_open+0x430/0x430 [ 1091.866845][T24130] ? getname_flags+0xba/0x640 [ 1091.871945][T24130] ? getname+0x19/0x20 [ 1091.876192][T24130] ? do_sys_open+0x32a/0x7a0 [ 1091.880767][T24130] ? __x64_sys_openat+0xa2/0xb0 [ 1091.885616][T24130] ? do_syscall_64+0xc0/0x100 [ 1091.890276][T24130] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1091.896437][T24130] ? get_pid_task+0x8d/0xa0 [ 1091.901534][T24130] ? proc_fail_nth_write+0x166/0x200 [ 1091.906815][T24130] ? proc_fail_nth_read+0x1c0/0x1c0 [ 1091.912017][T24130] ? expand_files+0xd1/0x970 [ 1091.916603][T24130] do_filp_open+0x1f7/0x430 [ 1091.921127][T24130] ? vfs_tmpfile+0x230/0x230 [ 1091.925702][T24130] ? __kasan_check_read+0x11/0x20 [ 1091.930819][T24130] ? __check_object_size+0x309/0x3d0 [ 1091.937622][T24130] ? _raw_spin_unlock+0x9/0x20 [ 1091.942549][T24130] ? get_unused_fd_flags+0x97/0xb0 [ 1091.947642][T24130] do_sys_open+0x36f/0x7a0 [ 1091.952053][T24130] ? fput_many+0x47/0x1a0 [ 1091.956377][T24130] ? file_open_root+0x440/0x440 [ 1091.961209][T24130] ? __kasan_check_read+0x11/0x20 [ 1091.966212][T24130] ? __ia32_sys_clock_settime+0x230/0x230 [ 1091.971938][T24130] __x64_sys_openat+0xa2/0xb0 [ 1091.976702][T24130] do_syscall_64+0xc0/0x100 [ 1091.981209][T24130] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1091.987095][T24130] RIP: 0033:0x45c429 [ 1091.991332][T24130] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1092.011056][T24130] RSP: 002b:00007f113f87ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1092.019448][T24130] RAX: ffffffffffffffda RBX: 00007f113f87f6d4 RCX: 000000000045c429 [ 1092.027605][T24130] RDX: 0000000000004001 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1092.035756][T24130] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1092.043834][T24130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1092.051790][T24130] R13: 00000000000007f3 R14: 00000000004ca6bf R15: 0000000000000004 [ 1092.074961][T24101] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1092.080465][T24101] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1092.087715][T24101] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1092.109959][T24101] loop3: p5 size 11290111 extends beyond EOD, truncated 14:50:22 executing program 3: syz_read_part_table(0x40000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:22 executing program 4: syz_read_part_table(0x2, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x1300}, 0x40) 14:50:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:22 executing program 5: syz_read_part_table(0x4c000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:22 executing program 1 (fault-call:3 fault-nth:5): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1092.120165][T24101] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x1400}, 0x40) 14:50:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x1500}, 0x40) [ 1092.158281][T24146] FAULT_INJECTION: forcing a failure. [ 1092.158281][T24146] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.172664][T24146] CPU: 0 PID: 24146 Comm: syz-executor.1 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1092.182844][T24146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.192904][T24146] Call Trace: [ 1092.196193][T24146] dump_stack+0x1b0/0x228 [ 1092.200528][T24146] ? devkmsg_release+0x127/0x127 14:50:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x1600}, 0x40) 14:50:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x1700}, 0x40) 14:50:22 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x1000000}, 0x40) [ 1092.205591][T24146] ? show_regs_print_info+0x18/0x18 [ 1092.210796][T24146] ? pointer+0xad0/0xad0 [ 1092.215047][T24146] ? vsnprintf+0x1c50/0x1c50 [ 1092.219646][T24146] should_fail+0x6fb/0x860 [ 1092.224075][T24146] ? setup_fault_attr+0x2b0/0x2b0 [ 1092.229113][T24146] ? __kasan_check_write+0x14/0x20 [ 1092.234232][T24146] ? _raw_spin_lock+0xa1/0x170 [ 1092.239810][T24146] __should_failslab+0x11a/0x160 [ 1092.244767][T24146] ? __get_vm_area_node+0x1ac/0x380 [ 1092.249969][T24146] should_failslab+0x9/0x20 [ 1092.254509][T24146] kmem_cache_alloc_trace+0x3a/0x2f0 [ 1092.259800][T24146] ? _raw_spin_unlock+0x9/0x20 [ 1092.264678][T24146] __get_vm_area_node+0x1ac/0x380 [ 1092.269684][T24146] __vmalloc_node_range+0xe4/0x760 [ 1092.274779][T24146] ? n_tty_open+0x1d/0x150 [ 1092.279174][T24146] ? __wake_up+0x153/0x210 [ 1092.283698][T24146] ? remove_wait_queue+0x130/0x130 [ 1092.288846][T24146] vzalloc+0x73/0x80 [ 1092.292730][T24146] ? n_tty_open+0x1d/0x150 [ 1092.297135][T24146] n_tty_open+0x1d/0x150 [ 1092.301358][T24146] tty_ldisc_setup+0xd7/0x350 [ 1092.306020][T24146] ? __kasan_check_write+0x14/0x20 [ 1092.311128][T24146] tty_init_dev+0x5ab/0x800 [ 1092.315611][T24146] tty_open+0xc34/0x1270 [ 1092.319839][T24146] ? memset+0x31/0x40 [ 1092.323815][T24146] ? tty_compat_ioctl+0xc90/0xc90 [ 1092.329196][T24146] chrdev_open+0x60a/0x670 [ 1092.333598][T24146] ? cd_forget+0x160/0x160 [ 1092.338080][T24146] ? security_file_open+0x23b/0x2f0 [ 1092.343700][T24146] ? cd_forget+0x160/0x160 [ 1092.348635][T24146] do_dentry_open+0x8f7/0x1070 [ 1092.353402][T24146] ? finish_open+0xe0/0xe0 [ 1092.357791][T24146] ? inode_permission2+0xe6/0x600 [ 1092.362789][T24146] ? vfs_open+0x2f/0x80 [ 1092.366918][T24146] vfs_open+0x73/0x80 [ 1092.370966][T24146] path_openat+0x1681/0x42d0 [ 1092.375544][T24146] ? kstrtouint_from_user+0x1cb/0x230 [ 1092.380993][T24146] ? do_filp_open+0x430/0x430 [ 1092.385664][T24146] ? getname_flags+0xba/0x640 [ 1092.390325][T24146] ? getname+0x19/0x20 [ 1092.394469][T24146] ? do_sys_open+0x32a/0x7a0 [ 1092.399041][T24146] ? __x64_sys_openat+0xa2/0xb0 [ 1092.403879][T24146] ? do_syscall_64+0xc0/0x100 [ 1092.409059][T24146] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1092.415371][T24146] ? get_pid_task+0x8d/0xa0 [ 1092.419903][T24146] ? proc_fail_nth_write+0x166/0x200 [ 1092.425401][T24146] ? proc_fail_nth_read+0x1c0/0x1c0 [ 1092.430642][T24146] ? expand_files+0xd1/0x970 [ 1092.435276][T24146] do_filp_open+0x1f7/0x430 [ 1092.439778][T24146] ? vfs_tmpfile+0x230/0x230 [ 1092.444401][T24146] ? __kasan_check_read+0x11/0x20 [ 1092.449494][T24146] ? __check_object_size+0x309/0x3d0 [ 1092.454824][T24146] ? _raw_spin_unlock+0x9/0x20 [ 1092.459574][T24146] ? get_unused_fd_flags+0x97/0xb0 [ 1092.464720][T24146] do_sys_open+0x36f/0x7a0 [ 1092.469145][T24146] ? fput_many+0x47/0x1a0 [ 1092.473458][T24146] ? file_open_root+0x440/0x440 [ 1092.478501][T24146] ? __kasan_check_read+0x11/0x20 [ 1092.483516][T24146] ? __ia32_sys_clock_settime+0x230/0x230 [ 1092.489229][T24146] __x64_sys_openat+0xa2/0xb0 [ 1092.494415][T24146] do_syscall_64+0xc0/0x100 [ 1092.498903][T24146] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1092.504923][T24146] RIP: 0033:0x45c429 [ 1092.508812][T24146] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1092.528415][T24146] RSP: 002b:00007f113f87ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1092.538038][T24146] RAX: ffffffffffffffda RBX: 00007f113f87f6d4 RCX: 000000000045c429 [ 1092.545992][T24146] RDX: 0000000000004001 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1092.554087][T24146] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1092.562049][T24146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1092.570221][T24146] R13: 00000000000007f3 R14: 00000000004ca6bf R15: 0000000000000005 [ 1092.579654][T24146] syz-executor.1: vmalloc: allocation failure: 8896 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 1092.593634][T24146] CPU: 0 PID: 24146 Comm: syz-executor.1 Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1092.603802][T24146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.613861][T24146] Call Trace: [ 1092.617138][T24146] dump_stack+0x1b0/0x228 [ 1092.622186][T24146] ? devkmsg_release+0x127/0x127 [ 1092.627151][T24146] ? show_regs_print_info+0x18/0x18 [ 1092.632332][T24146] warn_alloc+0x1ee/0x340 [ 1092.636817][T24146] ? __get_vm_area_node+0x1bc/0x380 [ 1092.642069][T24146] ? zone_watermark_ok_safe+0x420/0x420 [ 1092.647668][T24146] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 1092.653344][T24146] ? _raw_spin_unlock+0x9/0x20 [ 1092.658113][T24146] __vmalloc_node_range+0x294/0x760 [ 1092.663388][T24146] ? __wake_up+0x153/0x210 [ 1092.667847][T24146] ? remove_wait_queue+0x130/0x130 [ 1092.673025][T24146] vzalloc+0x73/0x80 [ 1092.676916][T24146] ? n_tty_open+0x1d/0x150 [ 1092.681503][T24146] n_tty_open+0x1d/0x150 [ 1092.685750][T24146] tty_ldisc_setup+0xd7/0x350 [ 1092.690408][T24146] ? __kasan_check_write+0x14/0x20 [ 1092.695558][T24146] tty_init_dev+0x5ab/0x800 [ 1092.700082][T24146] tty_open+0xc34/0x1270 [ 1092.704384][T24146] ? memset+0x31/0x40 [ 1092.708354][T24146] ? tty_compat_ioctl+0xc90/0xc90 [ 1092.713657][T24146] chrdev_open+0x60a/0x670 [ 1092.718079][T24146] ? cd_forget+0x160/0x160 [ 1092.722534][T24146] ? security_file_open+0x23b/0x2f0 [ 1092.727943][T24146] ? cd_forget+0x160/0x160 [ 1092.732390][T24146] do_dentry_open+0x8f7/0x1070 [ 1092.737143][T24146] ? finish_open+0xe0/0xe0 [ 1092.741894][T24146] ? inode_permission2+0xe6/0x600 [ 1092.746895][T24146] ? vfs_open+0x2f/0x80 [ 1092.751075][T24146] vfs_open+0x73/0x80 [ 1092.755048][T24146] path_openat+0x1681/0x42d0 [ 1092.759785][T24146] ? kstrtouint_from_user+0x1cb/0x230 [ 1092.765481][T24146] ? do_filp_open+0x430/0x430 [ 1092.770143][T24146] ? getname_flags+0xba/0x640 [ 1092.774820][T24146] ? getname+0x19/0x20 [ 1092.778870][T24146] ? do_sys_open+0x32a/0x7a0 [ 1092.783451][T24146] ? __x64_sys_openat+0xa2/0xb0 [ 1092.788285][T24146] ? do_syscall_64+0xc0/0x100 [ 1092.792946][T24146] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1092.799068][T24146] ? get_pid_task+0x8d/0xa0 [ 1092.803672][T24146] ? proc_fail_nth_write+0x166/0x200 [ 1092.809059][T24146] ? proc_fail_nth_read+0x1c0/0x1c0 [ 1092.814330][T24146] ? expand_files+0xd1/0x970 [ 1092.818970][T24146] do_filp_open+0x1f7/0x430 [ 1092.823452][T24146] ? vfs_tmpfile+0x230/0x230 [ 1092.828023][T24146] ? __kasan_check_read+0x11/0x20 [ 1092.833042][T24146] ? __check_object_size+0x309/0x3d0 [ 1092.838311][T24146] ? _raw_spin_unlock+0x9/0x20 [ 1092.843063][T24146] ? get_unused_fd_flags+0x97/0xb0 [ 1092.852329][T24146] do_sys_open+0x36f/0x7a0 [ 1092.857272][T24146] ? fput_many+0x47/0x1a0 [ 1092.861932][T24146] ? file_open_root+0x440/0x440 [ 1092.866785][T24146] ? __kasan_check_read+0x11/0x20 [ 1092.871786][T24146] ? __ia32_sys_clock_settime+0x230/0x230 [ 1092.877516][T24146] __x64_sys_openat+0xa2/0xb0 [ 1092.882408][T24146] do_syscall_64+0xc0/0x100 [ 1092.886893][T24146] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1092.892764][T24146] RIP: 0033:0x45c429 [ 1092.896870][T24146] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1092.918489][T24146] RSP: 002b:00007f113f87ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1092.927431][T24146] RAX: ffffffffffffffda RBX: 00007f113f87f6d4 RCX: 000000000045c429 [ 1092.935592][T24146] RDX: 0000000000004001 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1092.944511][T24146] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1092.952476][T24146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1092.960487][T24146] R13: 00000000000007f3 R14: 00000000004ca6bf R15: 0000000000000005 [ 1092.969437][T24146] Mem-Info: [ 1092.972712][T24146] active_anon:164972 inactive_anon:2488 isolated_anon:0 [ 1092.972712][T24146] active_file:35411 inactive_file:15478 isolated_file:0 [ 1092.972712][T24146] unevictable:0 dirty:260 writeback:0 unstable:0 [ 1092.972712][T24146] slab_reclaimable:7411 slab_unreclaimable:63182 [ 1092.972712][T24146] mapped:60775 shmem:6570 pagetables:6136 bounce:0 [ 1092.972712][T24146] free:1226960 free_pcp:691 free_cma:0 [ 1093.013295][T24146] Node 0 active_anon:659908kB inactive_anon:9960kB active_file:141592kB inactive_file:61928kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:243000kB dirty:1100kB writeback:0kB shmem:26308kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 14:50:23 executing program 3: syz_read_part_table(0x40000800, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1093.039544][T24146] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1093.052957][T24149] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1093.079728][T24149] loop4: partition table partially beyond EOD, truncated [ 1093.088138][T24145] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1093.101789][T24145] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1093.116823][T24146] lowmem_reserve[]: 0 2926 6432 6432 [ 1093.121036][T24149] loop4: p1 start 10 is beyond EOD, truncated [ 1093.122563][T24145] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1093.128221][T24149] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1093.147725][T24149] loop4: p3 start 225 is beyond EOD, truncated [ 1093.154704][T24146] DMA32 free:2996688kB min:4660kB low:7656kB high:10652kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1396kB local_pcp:1396kB free_cma:0kB [ 1093.162515][T24149] loop4: p4 size 2 extends beyond EOD, truncated [ 1093.185270][T24146] lowmem_reserve[]: 0 0 3506 3506 [ 1093.194648][T24146] Normal free:1894872kB min:5588kB low:9176kB high:12764kB active_anon:659908kB inactive_anon:10160kB active_file:141592kB inactive_file:62228kB unevictable:0kB writepending:1100kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:10496kB pagetables:24648kB bounce:0kB free_pcp:1116kB local_pcp:596kB free_cma:0kB [ 1093.203119][T24149] loop4: p5 start 10 is beyond EOD, truncated [ 1093.225664][T24146] lowmem_reserve[]: 0 0 0 0 [ 1093.232339][T24149] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1093.236278][T24145] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1093.250089][T24146] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1093.250634][T24145] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1093.271776][T24146] DMA32: 4*4kB (M) 2*8kB (M) 1*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 2*512kB (M) 2*1024kB (M) 1*2048kB (M) 730*4096kB (M) = 2996688kB [ 1093.272945][T24185] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1093.288326][T24146] Normal: 30*4kB (ME) 104*8kB (UME) 748*16kB (UME) 487*32kB (UME) 247*64kB (UME) 147*128kB (UME) 101*256kB (UME) 53*512kB (UME) 23*1024kB (UME) 9*2048kB (UM) 424*4096kB (UM) = 1894808kB 14:50:23 executing program 4: syz_read_part_table(0x3, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x2000000}, 0x40) 14:50:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1093.310965][T24185] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1093.313152][T24146] 57570 total pagecache pages [ 1093.322048][T24185] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1093.329108][T24146] 0 pages in swap cache [ 1093.332541][T24185] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1093.342243][T24146] Swap cache stats: add 0, delete 0, find 0/0 [ 1093.342337][T24185] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1093.351760][T24146] Free swap = 0kB [ 1093.360778][T24146] Total swap = 0kB 14:50:23 executing program 5: syz_read_part_table(0x60000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x3000000}, 0x40) 14:50:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1093.368416][T24146] 1965979 pages RAM [ 1093.372475][T24146] 0 pages HighMem/MovableOnly [ 1093.378014][T24146] 314802 pages reserved [ 1093.383039][T24146] 0 pages cma reserved [ 1093.387201][T24146] ttyS ttyS3: ldisc open failed (-12), clearing slot 3 14:50:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x4000000}, 0x40) 14:50:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x5000000}, 0x40) 14:50:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x6000000}, 0x40) [ 1093.610300][T24221] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1093.611830][ T1920] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1093.615845][T24221] loop4: partition table partially beyond EOD, truncated [ 1093.629845][T24221] loop4: p1 start 10 is beyond EOD, truncated [ 1093.635908][T24221] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1093.643517][T24221] loop4: p3 start 225 is beyond EOD, truncated [ 1093.649679][T24221] loop4: p4 size 2 extends beyond EOD, truncated [ 1093.656354][T24221] loop4: p5 start 10 is beyond EOD, truncated [ 1093.660162][T24185] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1093.668517][T24221] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1093.669103][T24185] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1093.706200][T24185] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1093.716236][T24185] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1093.724189][T24185] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:23 executing program 3: syz_read_part_table(0x48000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1093.834299][T24230] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1093.839656][T24230] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1093.847051][T24230] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1093.855319][T24230] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1093.863063][T24230] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:23 executing program 4: syz_read_part_table(0x4, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x7000000}, 0x40) 14:50:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4, 0x0) [ 1093.981688][T24235] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1093.987178][T24235] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1093.994895][T24235] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1094.003853][T24235] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1094.011190][T24235] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:24 executing program 5: syz_read_part_table(0x68000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x8000000}, 0x40) 14:50:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4002, 0x0) 14:50:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x9000000}, 0x40) 14:50:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4003, 0x0) [ 1094.141408][T24246] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1094.154754][T24246] loop4: partition table partially beyond EOD, truncated [ 1094.164966][T24246] loop4: p1 start 10 is beyond EOD, truncated [ 1094.172156][T24246] loop4: p2 size 1073741824 extends beyond EOD, truncated 14:50:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xa000000}, 0x40) 14:50:24 executing program 3: syz_read_part_table(0x4c000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1094.186215][T24246] loop4: p3 start 225 is beyond EOD, truncated [ 1094.195838][T24246] loop4: p4 size 2 extends beyond EOD, truncated [ 1094.208981][T24246] loop4: p5 start 10 is beyond EOD, truncated [ 1094.239844][T24246] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1094.290363][T24271] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1094.295780][T24271] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1094.303766][T24271] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1094.312150][T24271] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1094.319389][T24271] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:24 executing program 4: syz_read_part_table(0x5, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4005, 0x0) 14:50:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1094.478572][T24276] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1094.484391][T24276] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1094.485334][T24271] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1094.500067][T24276] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1094.514758][T24276] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1094.521296][T24271] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1094.522621][T24276] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1094.538978][T24271] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1094.547353][T24271] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1094.554824][T24271] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1094.562461][T24295] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1094.567730][T24295] loop4: partition table partially beyond EOD, truncated 14:50:24 executing program 5: syz_read_part_table(0x6c000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xb000000}, 0x40) 14:50:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4008, 0x0) 14:50:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xc000000}, 0x40) 14:50:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4009, 0x0) 14:50:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xd000000}, 0x40) [ 1094.582511][T24295] loop4: p1 start 10 is beyond EOD, truncated [ 1094.592377][T24295] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1094.599967][T24295] loop4: p3 start 225 is beyond EOD, truncated [ 1094.606164][T24295] loop4: p4 size 2 extends beyond EOD, truncated [ 1094.613035][T24295] loop4: p5 start 10 is beyond EOD, truncated [ 1094.619186][T24295] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:24 executing program 3: syz_read_part_table(0x50000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1094.846222][T24325] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1094.854954][T24325] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1094.862579][T24325] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1094.870646][T24325] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1094.877896][T24325] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1094.930805][T24295] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1094.936427][T24295] loop4: partition table partially beyond EOD, truncated [ 1094.945467][T24295] loop4: p1 start 10 is beyond EOD, truncated [ 1094.951995][T24295] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1094.959406][T24295] loop4: p3 start 225 is beyond EOD, truncated [ 1094.966297][T24295] loop4: p4 size 2 extends beyond EOD, truncated [ 1094.976607][T24295] loop4: p5 start 10 is beyond EOD, truncated [ 1094.982660][T24338] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1094.983061][T24295] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1094.988958][T24338] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1095.007223][T24338] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1095.017628][T24338] loop3: p5 size 11290111 extends beyond EOD, truncated 14:50:25 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xe000000}, 0x40) 14:50:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x400b, 0x0) 14:50:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1095.025750][T24338] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:25 executing program 5: syz_read_part_table(0x72000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:25 executing program 4: syz_read_part_table(0x6, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:25 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0xf000000}, 0x40) 14:50:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x40e0, 0x0) 14:50:25 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x10000000}, 0x40) 14:50:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x2) 14:50:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1095.210268][ T1923] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 1095.265843][T24338] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1095.348039][T24338] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1095.358439][T24338] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1095.365912][T24338] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1095.376450][T24384] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1095.380680][T24338] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1095.382063][T24384] loop4: partition table partially beyond EOD, truncated [ 1095.389916][T24338] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1095.396129][T24384] loop4: p1 start 10 is beyond EOD, truncated [ 1095.408918][T24384] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1095.416439][T24384] loop4: p3 start 225 is beyond EOD, truncated [ 1095.422634][T24384] loop4: p4 size 2 extends beyond EOD, truncated [ 1095.429240][T24384] loop4: p5 start 10 is beyond EOD, truncated [ 1095.445577][T24384] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1095.449838][T24385] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1095.458282][T24385] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1095.466323][T24385] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1095.474536][T24385] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1095.481907][T24385] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:25 executing program 3: syz_read_part_table(0x54000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:25 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x11000000}, 0x40) 14:50:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x3) [ 1095.660225][T24384] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1095.665666][T24384] loop4: partition table partially beyond EOD, truncated [ 1095.672849][T24384] loop4: p1 start 10 is beyond EOD, truncated [ 1095.678912][T24384] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1095.686405][T24384] loop4: p3 start 225 is beyond EOD, truncated [ 1095.692590][T24384] loop4: p4 size 2 extends beyond EOD, truncated [ 1095.699206][T24384] loop4: p5 start 10 is beyond EOD, truncated [ 1095.705322][T24384] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1095.730338][T24385] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1095.738426][T24385] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1095.745837][T24385] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1095.753972][T24385] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1095.761659][T24385] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1095.784966][ T1921] __loop_clr_fd: partition scan of loop3 failed (rc=-16) 14:50:25 executing program 5: syz_read_part_table(0x74000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:25 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x12000000}, 0x40) 14:50:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:25 executing program 4: syz_read_part_table(0x7, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x4) 14:50:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:25 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x13000000}, 0x40) 14:50:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x6) [ 1096.030321][T24419] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1096.035651][T24419] loop4: partition table partially beyond EOD, truncated [ 1096.037443][T24426] print_req_error: 4484 callbacks suppressed [ 1096.037454][T24426] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1096.046533][T24419] loop4: p1 start 10 is beyond EOD, truncated [ 1096.051496][T24428] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1096.060958][T24419] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1096.072042][ T177] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1096.092288][T24419] loop4: p3 start 225 is beyond EOD, truncated [ 1096.098562][ T177] buffer_io_error: 4442 callbacks suppressed [ 1096.098569][ T177] Buffer I/O error on dev loop3p6, logical block 33008, async page read [ 1096.107239][T24419] loop4: p4 size 2 extends beyond EOD, truncated [ 1096.110828][T24429] blk_update_request: I/O error, dev loop5, sector 225 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1096.118993][ T1920] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1096.141275][ T177] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1096.146954][T24419] loop4: p5 start 10 is beyond EOD, truncated [ 1096.158884][ T177] Buffer I/O error on dev loop5p1, logical block 131968, async page read [ 1096.165138][T24419] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1096.174534][ T177] blk_update_request: I/O error, dev loop5, sector 263948 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1096.192939][ T177] Buffer I/O error on dev loop5p1, logical block 131969, async page read [ 1096.201410][ T177] blk_update_request: I/O error, dev loop5, sector 225 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1096.212554][ T177] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 1096.220922][ T177] blk_update_request: I/O error, dev loop5, sector 263950 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1096.232273][ T177] Buffer I/O error on dev loop5p1, logical block 131970, async page read [ 1096.240722][ T177] blk_update_request: I/O error, dev loop5, sector 263952 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1096.252020][ T177] Buffer I/O error on dev loop5p1, logical block 131971, async page read [ 1096.260469][ T177] blk_update_request: I/O error, dev loop5, sector 225 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1096.271523][ T177] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 1096.279631][ T177] Buffer I/O error on dev loop5p1, logical block 132080, async page read [ 1096.288198][ T177] Buffer I/O error on dev loop5p1, logical block 132081, async page read [ 1096.296725][ T177] Buffer I/O error on dev loop5p1, logical block 132082, async page read [ 1096.329883][T24434] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 1096.432151][T24419] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1096.437425][T24419] loop4: partition table partially beyond EOD, truncated [ 1096.449367][T24419] loop4: p1 start 10 is beyond EOD, truncated [ 1096.456856][T24419] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1096.464696][T24419] loop4: p3 start 225 is beyond EOD, truncated [ 1096.471135][T24419] loop4: p4 size 2 extends beyond EOD, truncated [ 1096.478060][T24419] loop4: p5 start 10 is beyond EOD, truncated [ 1096.484326][T24419] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:26 executing program 3: syz_read_part_table(0x60000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x14000000}, 0x40) 14:50:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x7) [ 1096.542943][T24446] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1096.548329][T24446] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1096.559975][T24446] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1096.570994][T24446] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1096.578549][T24446] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1096.714319][T24458] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1096.719828][T24458] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1096.727249][T24458] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1096.735335][T24458] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1096.742604][T24458] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1096.750383][T24446] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1096.757369][T24446] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1096.764772][T24446] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1096.772724][T24446] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1096.780107][T24446] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:26 executing program 5: syz_read_part_table(0x7a000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:26 executing program 3: syz_read_part_table(0x68000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:26 executing program 4: syz_read_part_table(0x8, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x28, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x8) 14:50:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x15000000}, 0x40) 14:50:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x10) 14:50:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x43, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x16000000}, 0x40) 14:50:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x17000000}, 0x40) 14:50:26 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1096.929852][T24468] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1096.946503][T24468] loop4: partition table partially beyond EOD, truncated [ 1096.958044][T24468] loop4: p1 start 10 is beyond EOD, truncated [ 1096.964780][T24468] loop4: p2 size 1073741824 extends beyond EOD, truncated 14:50:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1096.976894][T24481] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1096.983354][T24481] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1096.991267][T24468] loop4: p3 start 225 is beyond EOD, truncated [ 1096.997876][T24481] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1096.999528][T24468] loop4: p4 size 2 extends beyond EOD, truncated [ 1097.009674][T24481] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1097.021955][T24468] loop4: p5 start 10 is beyond EOD, truncated [ 1097.022180][T24491] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1097.028752][T24468] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1097.054687][T24481] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1097.055672][T24491] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1097.069653][T24491] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1097.079927][T24491] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1097.087523][T24491] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1097.293708][T24491] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1097.299386][T24491] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1097.307054][T24491] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1097.315291][T24491] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1097.322826][T24491] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1097.322863][T24481] loop3: p1 p2 p3 < > p4 < p5 p6 > 14:50:27 executing program 5: syz_read_part_table(0x80040000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:27 executing program 3: syz_read_part_table(0x6c000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) 14:50:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x1d) 14:50:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:27 executing program 4: syz_read_part_table(0x9, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 14:50:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x48) 14:50:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) [ 1097.340764][T24481] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1097.348074][T24481] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1097.356205][T24481] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1097.363915][T24481] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 14:50:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) [ 1097.556442][T24527] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1097.563327][T24527] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1097.572219][T24527] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1097.585557][T24524] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1097.591095][T24524] loop4: partition table partially beyond EOD, truncated [ 1097.603990][T24527] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1097.609837][T24524] loop4: p1 start 10 is beyond EOD, truncated [ 1097.614134][T24527] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1097.617086][T24524] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1097.636014][T24524] loop4: p3 start 225 is beyond EOD, truncated [ 1097.642339][T24524] loop4: p4 size 2 extends beyond EOD, truncated [ 1097.649059][T24524] loop4: p5 start 10 is beyond EOD, truncated [ 1097.655228][T24524] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1097.700651][T24561] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1097.706116][T24561] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1097.713666][T24561] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1097.721253][T24524] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 1097.739487][T24561] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1097.748113][T24561] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:27 executing program 5: syz_read_part_table(0x80ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1097.773888][T24527] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1097.782152][T24527] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1097.789447][T24527] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1097.797580][T24527] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1097.804861][T24527] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1097.831951][T24524] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1097.837201][T24524] loop4: partition table partially beyond EOD, truncated [ 1097.857437][T24524] loop4: p1 start 10 is beyond EOD, truncated [ 1097.863816][T24524] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1097.871394][T24524] loop4: p3 start 225 is beyond EOD, truncated 14:50:27 executing program 3: syz_read_part_table(0x74000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x7}, 0x40) 14:50:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x4c) [ 1097.877766][T24524] loop4: p4 size 2 extends beyond EOD, truncated [ 1097.889056][T24524] loop4: p5 start 10 is beyond EOD, truncated [ 1097.895762][T24524] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x68) 14:50:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:27 executing program 4: syz_read_part_table(0xa, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x8}, 0x40) 14:50:27 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x9}, 0x40) 14:50:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x6c) [ 1098.110360][T24591] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1098.116001][T24591] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1098.123981][T24591] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1098.131977][T24591] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1098.139374][T24591] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1098.143996][T24593] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1098.161488][T24593] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1098.170177][T24593] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1098.179062][T24593] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1098.186826][T24593] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1098.263018][T24591] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1098.268917][T24591] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1098.276512][T24591] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1098.284946][T24591] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1098.292378][T24591] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:28 executing program 5: syz_read_part_table(0x8cffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1098.320181][T24620] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1098.325479][T24620] loop4: partition table partially beyond EOD, truncated [ 1098.332729][T24620] loop4: p1 start 10 is beyond EOD, truncated [ 1098.338846][T24620] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1098.347506][T24620] loop4: p3 start 225 is beyond EOD, truncated [ 1098.353711][T24620] loop4: p4 size 2 extends beyond EOD, truncated [ 1098.360567][T24620] loop4: p5 start 10 is beyond EOD, truncated [ 1098.366940][T24620] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:28 executing program 3: syz_read_part_table(0x7a000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xa}, 0x40) 14:50:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x74) 14:50:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0xd8, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xb}, 0x40) [ 1098.514763][ T1920] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1098.580057][T24620] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1098.592679][T24620] loop4: partition table partially beyond EOD, truncated [ 1098.606599][T24620] loop4: p1 start 10 is beyond EOD, truncated [ 1098.627316][T24620] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1098.639991][T24620] loop4: p3 start 225 is beyond EOD, truncated [ 1098.647488][T24620] loop4: p4 size 2 extends beyond EOD, truncated [ 1098.656481][T24620] loop4: p5 start 10 is beyond EOD, truncated [ 1098.662973][T24620] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:28 executing program 4: syz_read_part_table(0xb, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x7a) 14:50:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:28 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xc}, 0x40) [ 1098.693644][T24647] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 1098.712568][T24657] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1098.730896][T24657] loop3: p1 size 11290111 extends beyond EOD, truncated 14:50:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1098.746603][T24657] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1098.765056][T24657] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1098.780176][T24657] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1098.930344][T24647] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1098.935742][T24647] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1098.943139][T24647] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1098.951718][T24647] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1098.958946][T24647] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:29 executing program 5: syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xc0) 14:50:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xd}, 0x40) [ 1099.000190][T24678] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1099.005515][T24678] loop4: partition table partially beyond EOD, truncated [ 1099.014122][T24678] loop4: p1 start 10 is beyond EOD, truncated [ 1099.022230][T24678] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1099.029708][T24678] loop4: p3 start 225 is beyond EOD, truncated [ 1099.036206][T24678] loop4: p4 size 2 extends beyond EOD, truncated 14:50:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:29 executing program 3: syz_read_part_table(0x80040000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xe}, 0x40) [ 1099.047381][T24678] loop4: p5 start 10 is beyond EOD, truncated [ 1099.056146][T24678] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1099.170353][T24678] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1099.178294][T24678] loop4: partition table partially beyond EOD, truncated [ 1099.185696][T24678] loop4: p1 start 10 is beyond EOD, truncated [ 1099.192157][T24678] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1099.199605][T24678] loop4: p3 start 225 is beyond EOD, truncated [ 1099.205849][T24678] loop4: p4 size 2 extends beyond EOD, truncated [ 1099.212474][T24678] loop4: p5 start 10 is beyond EOD, truncated [ 1099.218540][T24678] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1099.240158][T24715] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1099.241089][T24710] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1099.247108][T24715] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1099.254051][T24710] loop3: p1 size 11290111 extends beyond EOD, truncated 14:50:29 executing program 4: syz_read_part_table(0xc, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xe0) 14:50:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xf}, 0x40) 14:50:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1099.258126][T24715] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1099.268057][T24710] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1099.281885][T24710] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1099.285543][T24715] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1099.302470][T24710] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1099.312024][T24715] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1099.440290][T24710] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1099.445659][T24710] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1099.453092][T24710] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1099.461196][T24710] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1099.468723][T24710] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1099.479060][T24715] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1099.510111][T24732] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1099.517020][T24732] loop4: partition table partially beyond EOD, truncated [ 1099.524505][T24732] loop4: p1 start 10 is beyond EOD, truncated [ 1099.530599][T24732] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1099.538092][T24732] loop4: p3 start 225 is beyond EOD, truncated [ 1099.544334][T24732] loop4: p4 size 2 extends beyond EOD, truncated [ 1099.554869][T24732] loop4: p5 start 10 is beyond EOD, truncated [ 1099.561105][T24732] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:29 executing program 5: syz_read_part_table(0xa1ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x10}, 0x40) 14:50:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x126) 14:50:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:29 executing program 3: syz_read_part_table(0x80ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x11}, 0x40) [ 1099.740516][T24732] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1099.749444][T24732] loop4: partition table partially beyond EOD, truncated [ 1099.767968][T24732] loop4: p1 start 10 is beyond EOD, truncated [ 1099.780353][T24732] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1099.787984][T24732] loop4: p3 start 225 is beyond EOD, truncated [ 1099.808962][T24764] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1099.817236][T24764] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1099.824810][T24732] loop4: p4 size 2 extends beyond EOD, truncated [ 1099.832424][T24732] loop4: p5 start 10 is beyond EOD, truncated 14:50:29 executing program 4: syz_read_part_table(0xd, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x12}, 0x40) 14:50:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x132) 14:50:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:29 executing program 5: syz_read_part_table(0xb4000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x13}, 0x40) 14:50:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1099.837903][T24764] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1099.838587][T24732] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1099.851757][T24764] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1099.860893][T24764] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x300) 14:50:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x14}, 0x40) 14:50:29 executing program 3: syz_read_part_table(0x8cffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x15}, 0x40) 14:50:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x16}, 0x40) [ 1100.102476][T24787] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1100.112658][T24787] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1100.120231][T24787] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1100.128459][T24787] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1100.135854][T24787] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1100.150987][T24809] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1100.156594][T24809] loop4: partition table partially beyond EOD, truncated [ 1100.163928][T24809] loop4: p1 start 10 is beyond EOD, truncated [ 1100.170140][T24809] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1100.177551][T24809] loop4: p3 start 225 is beyond EOD, truncated [ 1100.183902][T24809] loop4: p4 size 2 extends beyond EOD, truncated [ 1100.190650][T24809] loop4: p5 start 10 is beyond EOD, truncated [ 1100.196813][T24809] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1100.205272][T24812] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1100.213448][T24812] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1100.220952][T24812] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1100.228967][T24812] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1100.236493][T24812] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1100.410195][T24809] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1100.417741][T24809] loop4: partition table partially beyond EOD, truncated [ 1100.427068][T24809] loop4: p1 start 10 is beyond EOD, truncated [ 1100.433310][T24809] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1100.440924][T24809] loop4: p3 start 225 is beyond EOD, truncated [ 1100.447083][T24809] loop4: p4 size 2 extends beyond EOD, truncated [ 1100.453763][T24809] loop4: p5 start 10 is beyond EOD, truncated [ 1100.459966][T24809] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1100.478394][T24812] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1100.492638][T24787] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1100.499313][T24787] loop5: p1 size 11290111 extends beyond EOD, truncated 14:50:30 executing program 4: syz_read_part_table(0xe, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:30 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x17}, 0x40) 14:50:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x600) [ 1100.510954][T24787] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1100.522532][T24787] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1100.543069][T24787] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:30 executing program 5: syz_read_part_table(0xc9ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:30 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x300}, 0x40) 14:50:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x700) 14:50:30 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x500}, 0x40) 14:50:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:30 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x600}, 0x40) 14:50:30 executing program 3: syz_read_part_table(0x94000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1100.732967][T24854] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1100.739589][T24854] loop4: partition table partially beyond EOD, truncated [ 1100.756075][T24854] loop4: p1 start 10 is beyond EOD, truncated [ 1100.763993][T24854] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1100.774834][T24854] loop4: p3 start 225 is beyond EOD, truncated [ 1100.784568][T24854] loop4: p4 size 2 extends beyond EOD, truncated [ 1100.798037][T24854] loop4: p5 start 10 is beyond EOD, truncated [ 1100.805223][T24854] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1100.819982][T24866] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 1100.870201][T24867] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1100.875558][T24867] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1100.882915][T24867] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1100.890920][T24867] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1100.898144][T24867] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1100.980512][T24854] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1100.985797][T24854] loop4: partition table partially beyond EOD, truncated [ 1100.993179][T24854] loop4: p1 start 10 is beyond EOD, truncated [ 1100.999253][T24854] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1101.006883][T24854] loop4: p3 start 225 is beyond EOD, truncated [ 1101.015799][T24854] loop4: p4 size 2 extends beyond EOD, truncated [ 1101.022495][T24854] loop4: p5 start 10 is beyond EOD, truncated [ 1101.028566][T24854] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:31 executing program 4: syz_read_part_table(0x10, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x700}, 0x40) 14:50:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x1010) 14:50:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1101.200211][ T1923] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 1101.200349][T24885] print_req_error: 3136 callbacks suppressed [ 1101.200359][T24885] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1101.207492][T24882] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1101.219921][ T177] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1101.246806][ T177] buffer_io_error: 3105 callbacks suppressed [ 1101.246813][ T177] Buffer I/O error on dev loop4p2, logical block 0, async page read 14:50:31 executing program 5: syz_read_part_table(0xe2010000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x900}, 0x40) 14:50:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x1d00) 14:50:31 executing program 3: syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x2000) 14:50:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xa00}, 0x40) [ 1101.300003][T24895] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) [ 1101.500080][T24895] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1101.505420][T24895] loop4: partition table partially beyond EOD, truncated [ 1101.512841][T24895] loop4: p1 start 10 is beyond EOD, truncated [ 1101.519509][T24895] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1101.527022][T24895] loop4: p3 start 225 is beyond EOD, truncated [ 1101.534466][T24915] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1101.541150][T24895] loop4: p4 size 2 extends beyond EOD, truncated [ 1101.550140][T24915] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1101.552520][T24905] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1101.562806][T24915] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1101.567679][T24905] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1101.577291][T24895] loop4: p5 start 10 is beyond EOD, truncated [ 1101.583515][T24915] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1101.583717][T24895] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:31 executing program 4: syz_read_part_table(0x11, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x2601) 14:50:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xb00}, 0x40) [ 1101.592355][T24905] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1101.605219][T24915] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1101.616009][T24905] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1101.623437][T24905] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:31 executing program 5: syz_read_part_table(0xe4ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xf, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x3201) 14:50:31 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xc00}, 0x40) [ 1101.920569][T24915] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1101.925906][T24915] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1101.946547][T24915] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1101.960388][T24954] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1101.965677][T24954] loop4: partition table partially beyond EOD, truncated [ 1101.965833][T24915] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1101.973266][T24954] loop4: p1 start 10 is beyond EOD, truncated [ 1101.983895][T24915] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1101.986116][T24954] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1102.000594][T24954] loop4: p3 start 225 is beyond EOD, truncated [ 1102.006746][T24954] loop4: p4 size 2 extends beyond EOD, truncated [ 1102.013600][T24954] loop4: p5 start 10 is beyond EOD, truncated 14:50:32 executing program 3: syz_read_part_table(0xa1ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:32 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xd00}, 0x40) 14:50:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x4000) [ 1102.019986][T24954] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1102.033653][T24957] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1102.046904][T24957] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1102.055469][T24957] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1102.073041][T24957] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1102.080842][T24957] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:32 executing program 4: syz_read_part_table(0x12, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x4800) 14:50:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:32 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xe00}, 0x40) [ 1102.283919][T24957] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1102.294039][T24957] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1102.303047][T24957] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1102.312415][T24957] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1102.319712][T24957] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1102.340130][T24995] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1102.346148][T24995] loop4: partition table partially beyond EOD, truncated [ 1102.354988][T24995] loop4: p1 start 10 is beyond EOD, truncated [ 1102.361092][T24995] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1102.368537][T24995] loop4: p3 start 225 is beyond EOD, truncated [ 1102.377280][T24995] loop4: p4 size 2 extends beyond EOD, truncated [ 1102.385272][T24992] loop3: p1 p2 p3 < > p4 < p5 p6 > 14:50:32 executing program 5: syz_read_part_table(0xf6ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:32 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xf00}, 0x40) 14:50:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x4c00) [ 1102.387087][T24995] loop4: p5 start 10 is beyond EOD, truncated [ 1102.396944][T24995] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1102.399329][T24992] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1102.416225][T24992] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1102.428432][T24992] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1102.442430][T24992] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1102.670575][T25005] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1102.684346][T25005] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1102.691734][T25005] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1102.699715][T25005] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1102.707066][T25005] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1102.716781][T24992] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1102.725387][T24992] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1102.733000][T24992] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1102.743482][T24992] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1102.753616][T24992] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:32 executing program 3: syz_read_part_table(0xc9ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:32 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x1100}, 0x40) 14:50:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x6800) 14:50:32 executing program 4: syz_read_part_table(0x14, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:32 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x1200}, 0x40) 14:50:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x28, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x6c00) 14:50:32 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x1300}, 0x40) 14:50:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x43, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x7400) 14:50:32 executing program 5: syz_read_part_table(0xfdfdffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1102.940192][T25039] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1102.953450][T25039] loop4: partition table partially beyond EOD, truncated [ 1102.976209][T25039] loop4: p1 start 10 is beyond EOD, truncated [ 1102.993298][T25054] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1103.011718][T25054] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1103.014840][T25039] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1103.036158][T25039] loop4: p3 start 225 is beyond EOD, truncated [ 1103.044522][T25039] loop4: p4 size 2 extends beyond EOD, truncated [ 1103.051918][T25074] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1103.057809][T25054] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1103.058934][T25074] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1103.074014][T25039] loop4: p5 start 10 is beyond EOD, truncated [ 1103.080428][T25039] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1103.089260][T25074] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1103.091943][T25054] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1103.103785][T25054] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1103.103808][T25074] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1103.121692][T25074] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1103.310592][T25054] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1103.321329][T25054] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1103.330578][T25054] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1103.338799][T25054] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1103.346242][T25054] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x7a00) 14:50:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x1400}, 0x40) 14:50:33 executing program 4: syz_read_part_table(0x25, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:33 executing program 3: syz_read_part_table(0xe2010000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:33 executing program 5: syz_read_part_table(0xfdffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xc000) 14:50:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x1500}, 0x40) 14:50:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x1600}, 0x40) 14:50:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x1700}, 0x40) 14:50:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xe0ff) 14:50:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x1000000}, 0x40) [ 1103.511526][T25098] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1103.523360][T25098] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1103.534283][T25098] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1103.542669][T25098] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1103.550125][T25098] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x2000000}, 0x40) [ 1103.564610][T25096] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1103.570143][T25096] loop4: partition table partially beyond EOD, truncated [ 1103.581586][T25096] loop4: p1 start 10 is beyond EOD, truncated [ 1103.587735][T25096] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1103.597722][T25096] loop4: p3 start 225 is beyond EOD, truncated [ 1103.604710][T25096] loop4: p4 size 2 extends beyond EOD, truncated [ 1103.611850][T25096] loop4: p5 start 10 is beyond EOD, truncated [ 1103.618112][T25096] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1103.618722][T25099] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1103.630866][T25099] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1103.638308][T25099] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1103.668237][T25099] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1103.675541][T25099] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:33 executing program 4: syz_read_part_table(0x28, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1103.850503][T25099] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1103.856040][T25099] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1103.864271][T25099] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1103.874070][T25099] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1103.880043][T25151] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1103.881447][T25099] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:33 executing program 3: syz_read_part_table(0xe4ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x3000000}, 0x40) 14:50:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xffe0) 14:50:33 executing program 5: syz_read_part_table(0xfeffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x4000000}, 0x40) 14:50:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1103.887649][T25151] loop4: partition table partially beyond EOD, truncated [ 1103.908573][T25151] loop4: p1 start 10 is beyond EOD, truncated [ 1103.926286][T25151] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1103.942357][T25151] loop4: p3 start 225 is beyond EOD, truncated 14:50:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x5000000}, 0x40) 14:50:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x20000) 14:50:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x6000000}, 0x40) 14:50:33 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x7000000}, 0x40) [ 1103.948702][T25151] loop4: p4 size 2 extends beyond EOD, truncated [ 1103.959266][T25151] loop4: p5 start 10 is beyond EOD, truncated [ 1103.965571][T25151] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1104.090640][T25181] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1104.096913][T25179] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1104.102272][ T136] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1104.124120][ T136] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 1104.132250][ T136] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1104.143576][ T136] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 1104.151708][ T136] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1104.164283][ T136] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 1104.172537][ T136] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1104.183545][ T136] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 1104.191577][ T136] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1104.202579][ T136] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 1104.210841][ T136] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 1104.218854][ T136] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 1104.226931][ T136] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 1104.235251][ T136] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 1104.270436][T25170] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1104.275848][T25170] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1104.283326][T25170] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1104.291322][T25170] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1104.298698][T25170] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1104.310260][T25195] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1104.315570][T25151] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 1104.322788][T25195] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1104.331692][T25195] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1104.349161][T25195] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1104.360264][T25195] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1104.435928][T25151] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1104.441685][T25170] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1104.445871][T25151] loop4: partition table partially beyond EOD, truncated [ 1104.457293][T25151] loop4: p1 start 10 is beyond EOD, truncated [ 1104.464139][T25151] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1104.471933][T25151] loop4: p3 start 225 is beyond EOD, truncated [ 1104.478182][T25151] loop4: p4 size 2 extends beyond EOD, truncated [ 1104.485380][T25151] loop4: p5 start 10 is beyond EOD, truncated [ 1104.502822][T25151] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:34 executing program 3: syz_read_part_table(0xf6ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:34 executing program 5: syz_read_part_table(0xff0f0000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:34 executing program 4: syz_read_part_table(0x2e, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x3ffff) 14:50:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x40) 14:50:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xd8, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1104.596081][T25195] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1104.605713][T25195] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1104.613326][T25195] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1104.627902][T25195] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1104.635611][T25195] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x40000) 14:50:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x9000000}, 0x40) 14:50:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xa000000}, 0x40) 14:50:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xb000000}, 0x40) 14:50:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xc000000}, 0x40) [ 1104.850156][T25219] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1104.855534][T25219] loop4: partition table partially beyond EOD, truncated [ 1104.862746][T25219] loop4: p1 start 10 is beyond EOD, truncated [ 1104.868917][T25219] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1104.876445][T25219] loop4: p3 start 225 is beyond EOD, truncated [ 1104.882672][T25219] loop4: p4 size 2 extends beyond EOD, truncated [ 1104.889333][T25219] loop4: p5 start 10 is beyond EOD, truncated [ 1104.896249][T25219] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1104.908801][T25215] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 1105.072911][T25255] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1105.083553][T25255] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1105.091740][T25255] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1105.100035][T25255] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1105.107402][T25255] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1105.132618][T25219] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1105.142774][T25219] loop4: partition table partially beyond EOD, truncated [ 1105.150150][T25219] loop4: p1 start 10 is beyond EOD, truncated [ 1105.157890][T25219] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1105.167915][T25219] loop4: p3 start 225 is beyond EOD, truncated [ 1105.174190][T25219] loop4: p4 size 2 extends beyond EOD, truncated [ 1105.180817][T25219] loop4: p5 start 10 is beyond EOD, truncated [ 1105.186877][T25219] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:35 executing program 3: syz_read_part_table(0xfdfdffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xd000000}, 0x40) 14:50:35 executing program 4: syz_read_part_table(0x38, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x44000) 14:50:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:35 executing program 5: syz_read_part_table(0xffff0f00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xe000000}, 0x40) 14:50:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x80000) 14:50:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xf000000}, 0x40) 14:50:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x10000000}, 0x40) 14:50:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x11000000}, 0x40) [ 1105.341552][T25270] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1105.354162][T25270] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1105.362750][T25270] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1105.371560][T25270] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1105.378912][T25270] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1105.440499][T25296] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1105.445870][T25296] loop4: partition table partially beyond EOD, truncated [ 1105.454649][T25296] loop4: p1 start 10 is beyond EOD, truncated [ 1105.460755][T25296] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1105.468230][T25296] loop4: p3 start 225 is beyond EOD, truncated [ 1105.474516][T25296] loop4: p4 size 2 extends beyond EOD, truncated [ 1105.481307][T25296] loop4: p5 start 10 is beyond EOD, truncated [ 1105.487469][T25296] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1105.504656][T25279] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1105.512588][T25279] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1105.522034][T25279] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1105.531005][T25279] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1105.538375][T25279] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1105.660106][T25296] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1105.665416][T25296] loop4: partition table partially beyond EOD, truncated [ 1105.681623][T25296] loop4: p1 start 10 is beyond EOD, truncated [ 1105.694673][T25296] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1105.702993][T25296] loop4: p3 start 225 is beyond EOD, truncated [ 1105.709235][T25296] loop4: p4 size 2 extends beyond EOD, truncated [ 1105.710641][T25270] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1105.718883][T25296] loop4: p5 start 10 is beyond EOD, truncated [ 1105.724162][T25270] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1105.727470][T25296] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1105.736588][T25270] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1105.755304][T25270] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1105.762872][T25270] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:35 executing program 3: syz_read_part_table(0xfdffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x12000000}, 0x40) 14:50:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x8b000) 14:50:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:35 executing program 4: syz_read_part_table(0x48, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:35 executing program 5: syz_read_part_table(0xfffffdfd, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x13000000}, 0x40) 14:50:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x100000) 14:50:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x14000000}, 0x40) 14:50:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x15000000}, 0x40) [ 1106.050119][T25344] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1106.055406][T25344] loop4: partition table partially beyond EOD, truncated [ 1106.075655][T25344] loop4: p1 start 10 is beyond EOD, truncated [ 1106.081956][T25344] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1106.097638][T25344] loop4: p3 start 225 is beyond EOD, truncated [ 1106.106384][T25344] loop4: p4 size 2 extends beyond EOD, truncated [ 1106.114343][T25344] loop4: p5 start 10 is beyond EOD, truncated [ 1106.120485][T25358] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1106.121460][T25344] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1106.125790][T25358] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1106.142404][T25358] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1106.151008][T25358] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1106.158670][T25358] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1106.244256][T25363] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1106.251141][T25363] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1106.260479][T25363] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1106.268574][T25363] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1106.276061][T25363] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1106.290314][T25344] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1106.299861][T25344] loop4: partition table partially beyond EOD, truncated [ 1106.315950][T25344] loop4: p1 start 10 is beyond EOD, truncated [ 1106.324459][T25344] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1106.333078][T25344] loop4: p3 start 225 is beyond EOD, truncated [ 1106.339312][T25344] loop4: p4 size 2 extends beyond EOD, truncated [ 1106.346245][T25344] loop4: p5 start 10 is beyond EOD, truncated [ 1106.352583][T25344] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1106.361220][T25377] print_req_error: 1388 callbacks suppressed [ 1106.361228][T25377] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1106.361235][T25378] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 14:50:36 executing program 3: syz_read_part_table(0xfeffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:36 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x16000000}, 0x40) 14:50:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x400000) 14:50:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1106.361489][T25379] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1106.367359][ T177] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.414511][ T177] buffer_io_error: 1369 callbacks suppressed [ 1106.414518][ T177] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 1106.428723][ T177] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.431007][T25363] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1106.440271][ T177] Buffer I/O error on dev loop5p5, logical block 131968, async page read [ 1106.455606][ T177] blk_update_request: I/O error, dev loop5, sector 263948 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.466914][ T177] Buffer I/O error on dev loop5p5, logical block 131969, async page read [ 1106.475415][ T177] blk_update_request: I/O error, dev loop5, sector 263950 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.486975][ T177] Buffer I/O error on dev loop5p5, logical block 131970, async page read [ 1106.495440][ T177] blk_update_request: I/O error, dev loop5, sector 263952 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.506751][ T177] Buffer I/O error on dev loop5p5, logical block 131971, async page read [ 1106.515232][ T177] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1106.515284][T25378] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 14:50:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1106.527403][ T177] Buffer I/O error on dev loop5p6, logical block 33008, async page read [ 1106.540546][ T177] Buffer I/O error on dev loop5p6, logical block 33022, async page read [ 1106.546937][T25378] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 1106.563443][ T177] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 1106.563523][T25379] Buffer I/O error on dev loop5p5, logical block 132080, async page read 14:50:36 executing program 5: syz_read_part_table(0xffffff7f, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x400400) 14:50:36 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x17000000}, 0x40) 14:50:36 executing program 4: syz_read_part_table(0x4c, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:36 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1106.710355][T25395] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1106.715720][T25395] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1106.725718][T25395] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1106.746551][T25395] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1106.777795][T25395] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1106.820891][T25408] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1106.826253][T25408] loop4: partition table partially beyond EOD, truncated [ 1106.833436][T25408] loop4: p1 start 10 is beyond EOD, truncated [ 1106.839556][T25408] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1106.847357][T25408] loop4: p3 start 225 is beyond EOD, truncated [ 1106.853885][T25408] loop4: p4 size 2 extends beyond EOD, truncated [ 1106.866355][T25408] loop4: p5 start 10 is beyond EOD, truncated [ 1106.867392][T25414] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1106.874108][T25408] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1106.890019][T25414] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1106.898455][T25414] loop5: p2 size 1073741824 extends beyond EOD, truncated 14:50:36 executing program 3: syz_read_part_table(0xff0f0000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xb00800) 14:50:36 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 14:50:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1106.922428][T25414] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1106.929896][T25414] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:36 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) [ 1106.988229][T25408] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1106.998073][T25408] loop4: partition table partially beyond EOD, truncated 14:50:37 executing program 5: syz_read_part_table(0xffffff80, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x1000000) 14:50:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1107.032043][T25408] loop4: p1 start 10 is beyond EOD, truncated [ 1107.041785][T25408] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1107.055761][T25408] loop4: p3 start 225 is beyond EOD, truncated [ 1107.062273][T25408] loop4: p4 size 2 extends beyond EOD, truncated [ 1107.068958][T25408] loop4: p5 start 10 is beyond EOD, truncated [ 1107.075177][T25408] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:37 executing program 4: syz_read_part_table(0x50, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:37 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) 14:50:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:37 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) [ 1107.164625][T25439] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1107.184167][T25439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1107.217733][T25439] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1107.220342][T25455] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1107.239038][T25439] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1107.249014][T25455] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1107.252124][T25439] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1107.259921][T25455] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1107.270152][T25470] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1107.277022][T25470] loop4: partition table partially beyond EOD, truncated [ 1107.284421][T25455] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1107.287717][T25470] loop4: p1 start 10 is beyond EOD, truncated [ 1107.296896][T25455] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1107.298034][T25470] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1107.312881][T25470] loop4: p3 start 225 is beyond EOD, truncated [ 1107.319076][T25470] loop4: p4 size 2 extends beyond EOD, truncated [ 1107.326123][T25470] loop4: p5 start 10 is beyond EOD, truncated [ 1107.332347][T25470] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:37 executing program 3: syz_read_part_table(0xffefffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x2000000) 14:50:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x2800, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:37 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6}, 0x40) 14:50:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1107.500353][T25470] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1107.505947][T25470] loop4: partition table partially beyond EOD, truncated [ 1107.513742][T25470] loop4: p1 start 10 is beyond EOD, truncated [ 1107.519864][T25470] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1107.528517][T25470] loop4: p3 start 225 is beyond EOD, truncated [ 1107.535126][T25470] loop4: p4 size 2 extends beyond EOD, truncated [ 1107.542309][T25470] loop4: p5 start 10 is beyond EOD, truncated [ 1107.548399][T25470] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1107.610504][T25455] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1107.616423][T25497] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1107.617995][T25455] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1107.621813][T25497] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1107.632472][T25455] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1107.636196][T25497] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1107.649342][T25455] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1107.659613][T25497] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1107.665812][T25455] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1107.672671][T25497] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:37 executing program 5: syz_read_part_table(0xffffff8c, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:37 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x40) 14:50:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x3000000) 14:50:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x4300, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:37 executing program 4: syz_read_part_table(0x60, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x4000000) [ 1107.880664][T25497] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1107.940158][T25511] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1107.943255][ T1920] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1107.952469][T25511] loop4: partition table partially beyond EOD, truncated [ 1107.970030][T25511] loop4: p1 start 10 is beyond EOD, truncated [ 1107.982479][T25511] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1107.990451][T25511] loop4: p3 start 225 is beyond EOD, truncated [ 1107.997895][T25511] loop4: p4 size 2 extends beyond EOD, truncated [ 1108.008990][T25511] loop4: p5 start 10 is beyond EOD, truncated [ 1108.011001][T25533] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 1108.023782][T25511] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:38 executing program 3: syz_read_part_table(0xffff0f00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:38 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8}, 0x40) 14:50:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x6000000) [ 1108.160306][T25511] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1108.169823][T25511] loop4: partition table partially beyond EOD, truncated [ 1108.185749][T25533] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1108.203940][T25511] loop4: p1 start 10 is beyond EOD, truncated 14:50:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1108.222299][T25511] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1108.247055][T25511] loop4: p3 start 225 is beyond EOD, truncated [ 1108.247973][T25533] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1108.259067][T25511] loop4: p4 size 2 extends beyond EOD, truncated [ 1108.260840][T25533] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1108.273356][T25511] loop4: p5 start 10 is beyond EOD, truncated [ 1108.277259][T25533] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1108.283617][T25511] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1108.307466][T25533] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1108.320177][T25549] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1108.325666][T25549] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1108.332972][T25533] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1108.340750][T25549] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1108.359910][T25549] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1108.375069][T25549] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:38 executing program 5: syz_read_part_table(0xffffff97, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:38 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x40) 14:50:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x7000000) 14:50:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:38 executing program 4: syz_read_part_table(0x68, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x8000000) [ 1108.504872][ T1923] __loop_clr_fd: partition scan of loop4 failed (rc=-16) 14:50:38 executing program 3: syz_read_part_table(0xffffefff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:38 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa}, 0x40) 14:50:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xfffffff) 14:50:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xd800, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1108.710636][T25600] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1108.716014][T25585] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1108.716628][T25600] loop4: partition table partially beyond EOD, truncated [ 1108.724507][T25585] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1108.728948][T25600] loop4: p1 start 10 is beyond EOD, truncated [ 1108.741755][T25600] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1108.744873][T25585] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1108.749382][T25600] loop4: p3 start 225 is beyond EOD, truncated [ 1108.762661][T25600] loop4: p4 size 2 extends beyond EOD, truncated [ 1108.764577][T25585] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1108.769308][T25600] loop4: p5 start 10 is beyond EOD, truncated [ 1108.783840][T25600] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1108.795712][T25585] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1108.806643][T25594] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1108.813170][T25594] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1108.830490][T25594] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1108.839227][T25594] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1108.846843][T25594] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:38 executing program 5: syz_read_part_table(0xffffffa1, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:38 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xb}, 0x40) 14:50:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x10000000) 14:50:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:38 executing program 4: syz_read_part_table(0x6c, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:38 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xc}, 0x40) 14:50:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1109.094484][T25629] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1109.100115][T25629] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1109.107912][T25629] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1109.116827][T25629] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1109.124421][T25629] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:39 executing program 3: syz_read_part_table(0xfffffdfd, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x10100000) 14:50:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xd}, 0x40) 14:50:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1109.150171][T25641] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1109.158696][T25641] loop4: partition table partially beyond EOD, truncated [ 1109.182583][T25641] loop4: p1 start 10 is beyond EOD, truncated [ 1109.202655][T25641] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1109.211613][T25641] loop4: p3 start 225 is beyond EOD, truncated [ 1109.217857][T25641] loop4: p4 size 2 extends beyond EOD, truncated [ 1109.224614][T25641] loop4: p5 start 10 is beyond EOD, truncated [ 1109.230747][T25641] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:39 executing program 5: syz_read_part_table(0xffffffc9, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x1d000000) 14:50:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xe}, 0x40) 14:50:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1109.271927][T25629] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1109.407526][T25653] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1109.420826][T25653] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1109.435448][T25653] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1109.443810][T25653] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1109.451229][T25653] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1109.460543][T25641] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1109.465756][T25641] loop4: partition table partially beyond EOD, truncated [ 1109.474318][T25641] loop4: p1 start 10 is beyond EOD, truncated [ 1109.480448][T25641] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1109.487947][T25641] loop4: p3 start 225 is beyond EOD, truncated [ 1109.494166][T25641] loop4: p4 size 2 extends beyond EOD, truncated [ 1109.500803][T25641] loop4: p5 start 10 is beyond EOD, truncated [ 1109.507151][T25641] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:39 executing program 4: syz_read_part_table(0x74, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x20000000) 14:50:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xf}, 0x40) 14:50:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1109.581478][T25678] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1109.586893][T25678] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1109.594434][T25678] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1109.602476][T25678] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1109.609703][T25678] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:39 executing program 3: syz_read_part_table(0xffffff7f, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:39 executing program 5: syz_read_part_table(0xffffffe4, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x10}, 0x40) 14:50:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x26010000) 14:50:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x11}, 0x40) 14:50:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12}, 0x40) [ 1109.816919][T25693] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1109.828069][T25693] loop4: partition table partially beyond EOD, truncated [ 1109.835430][T25696] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1109.837057][T25693] loop4: p1 start 10 is beyond EOD, truncated [ 1109.841434][T25696] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1109.849266][T25693] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1109.859524][T25696] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1109.870538][T25693] loop4: p3 start 225 is beyond EOD, truncated [ 1109.876886][T25693] loop4: p4 size 2 extends beyond EOD, truncated [ 1109.885986][T25696] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1109.894072][T25714] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1109.900834][T25714] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1109.908237][T25696] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1109.910359][T25693] loop4: p5 start 10 is beyond EOD, truncated [ 1109.916101][T25714] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1109.927745][T25693] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1109.942389][T25714] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1109.950638][T25714] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1110.130531][T25696] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1110.144635][T25696] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1110.158605][T25696] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1110.172647][T25696] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1110.183366][T25696] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1110.191120][T25693] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1110.196785][T25693] loop4: partition table partially beyond EOD, truncated [ 1110.204302][T25693] loop4: p1 start 10 is beyond EOD, truncated [ 1110.214753][T25693] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1110.224649][T25693] loop4: p3 start 225 is beyond EOD, truncated [ 1110.231390][T25693] loop4: p4 size 2 extends beyond EOD, truncated [ 1110.238365][T25693] loop4: p5 start 10 is beyond EOD, truncated [ 1110.244498][T25693] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:40 executing program 4: syz_read_part_table(0x7a, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:40 executing program 5: syz_read_part_table(0xfffffff6, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x32010000) 14:50:40 executing program 3: syz_read_part_table(0xffffff80, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:40 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x13}, 0x40) 14:50:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x40000000) 14:50:40 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x14}, 0x40) 14:50:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1110.337930][T25747] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1110.344147][T25747] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1110.369033][T25747] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1110.377153][T25747] loop5: p5 size 11290111 extends beyond EOD, truncated 14:50:40 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x15}, 0x40) 14:50:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:40 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x16}, 0x40) [ 1110.384791][T25747] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1110.466619][T25754] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1110.472451][T25754] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1110.480590][T25754] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1110.496335][T25754] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1110.504625][T25754] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1110.560323][T25780] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1110.565653][T25780] loop4: partition table partially beyond EOD, truncated [ 1110.579277][T25780] loop4: p1 start 10 is beyond EOD, truncated [ 1110.589922][T25780] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1110.607198][T25780] loop4: p3 start 225 is beyond EOD, truncated [ 1110.615329][T25780] loop4: p4 size 2 extends beyond EOD, truncated [ 1110.626499][T25780] loop4: p5 start 10 is beyond EOD, truncated [ 1110.630581][T25754] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1110.633061][T25780] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1110.638047][T25754] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1110.656691][T25754] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1110.667885][T25754] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1110.675274][T25754] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1110.880587][ T1921] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1110.896376][T25780] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1110.906190][T25780] loop4: partition table partially beyond EOD, truncated [ 1110.922340][T25780] loop4: p1 start 10 is beyond EOD, truncated [ 1110.933889][T25780] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1110.948181][T25780] loop4: p3 start 225 is beyond EOD, truncated [ 1110.959850][T25780] loop4: p4 size 2 extends beyond EOD, truncated [ 1110.973200][T25780] loop4: p5 start 10 is beyond EOD, truncated 14:50:40 executing program 4: syz_read_part_table(0x90, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:40 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x17}, 0x40) 14:50:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x48000000) 14:50:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:40 executing program 5: syz_read_part_table(0xfffffffd, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:40 executing program 3: syz_read_part_table(0xffffff8c, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1110.979566][T25780] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x4c000000) 14:50:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x300}, 0x40) 14:50:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x500}, 0x40) 14:50:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x600}, 0x40) 14:50:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x68000000) [ 1111.130421][T25818] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1111.139414][T25818] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1111.151356][T25818] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1111.161696][T25818] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1111.169117][T25818] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1111.205637][T25836] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1111.225791][T25836] loop4: partition table partially beyond EOD, truncated [ 1111.238827][T25825] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 1111.256146][T25836] loop4: p1 start 10 is beyond EOD, truncated [ 1111.262600][T25836] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1111.270221][T25836] loop4: p3 start 225 is beyond EOD, truncated [ 1111.276377][T25836] loop4: p4 size 2 extends beyond EOD, truncated [ 1111.283109][T25836] loop4: p5 start 10 is beyond EOD, truncated [ 1111.289356][T25836] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:41 executing program 4: syz_read_part_table(0x94, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x700}, 0x40) 14:50:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x6c000000) 14:50:41 executing program 5: syz_read_part_table(0xfffffffe, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:41 executing program 3: syz_read_part_table(0xffffff97, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x74000000) 14:50:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x900}, 0x40) 14:50:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x7a000000) 14:50:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa00}, 0x40) 14:50:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xf000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1111.529175][T25882] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1111.536728][T25874] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1111.543143][T25882] loop4: partition table partially beyond EOD, truncated [ 1111.552379][T25874] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1111.573003][T25882] loop4: p1 start 10 is beyond EOD, truncated [ 1111.586773][T25874] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1111.598475][T25882] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1111.607272][T25874] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1111.611053][T25910] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1111.620558][T25874] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1111.624967][T25882] loop4: p3 start 225 is beyond EOD, truncated [ 1111.631311][T25910] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1111.635975][T25882] loop4: p4 size 2 extends beyond EOD, truncated [ 1111.648855][T25910] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1111.659344][T25910] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1111.663985][T25882] loop4: p5 start 10 is beyond EOD, truncated [ 1111.667028][T25910] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1111.675400][T25882] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1111.850471][T25910] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1111.856078][T25910] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1111.863858][T25910] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1111.870130][T25882] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1111.872269][T25910] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1111.879555][T25882] loop4: partition table partially beyond EOD, truncated [ 1111.885013][T25910] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1111.894157][T25882] loop4: p1 start 10 is beyond EOD, truncated [ 1111.912332][T25882] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1111.920733][T25882] loop4: p3 start 225 is beyond EOD, truncated [ 1111.926994][T25882] loop4: p4 size 2 extends beyond EOD, truncated [ 1111.933812][T25882] loop4: p5 start 10 is beyond EOD, truncated [ 1111.940799][T25882] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:41 executing program 4: syz_read_part_table(0xb4, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:41 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xb00}, 0x40) 14:50:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xc0000000) 14:50:41 executing program 5: syz_read_part_table(0x800000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:41 executing program 3: syz_read_part_table(0xffffffa1, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xe0ffffff) 14:50:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xc00}, 0x40) 14:50:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xd00}, 0x40) 14:50:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xe00}, 0x40) 14:50:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xf00}, 0x40) [ 1112.210168][T25944] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1112.215592][T25937] print_req_error: 5338 callbacks suppressed [ 1112.215603][T25937] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1112.216127][T25936] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1112.225435][T25944] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1112.232993][ T1923] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 1112.250606][ T177] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1112.253997][T25933] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1112.260801][ T177] buffer_io_error: 5276 callbacks suppressed [ 1112.260808][ T177] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 1112.291754][T25939] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1112.298836][ T177] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1112.308898][T25939] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1112.313403][ T177] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 1112.328087][T25939] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1112.328505][ T177] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1112.337051][T25944] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1112.346881][ T177] Buffer I/O error on dev loop4p6, logical block 0, async page read [ 1112.360166][T25939] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1112.363917][T25944] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1112.372660][T25939] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1112.377198][T25944] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1112.436267][T25971] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1112.444881][T25971] loop4: partition table partially beyond EOD, truncated [ 1112.452164][T25971] loop4: p1 start 10 is beyond EOD, truncated [ 1112.458253][T25971] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1112.466119][T25971] loop4: p3 start 225 is beyond EOD, truncated [ 1112.473014][T25971] loop4: p4 size 2 extends beyond EOD, truncated [ 1112.479927][T25971] loop4: p5 start 10 is beyond EOD, truncated [ 1112.486010][T25971] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1112.705369][T25944] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1112.711247][T25939] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1112.711872][T25944] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1112.720455][T25939] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1112.727910][T25944] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1112.731499][T25939] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1112.740312][T25944] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1112.750875][T25939] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1112.752536][T25944] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1112.761660][T25939] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1112.782354][T25971] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1112.791206][T25971] loop4: partition table partially beyond EOD, truncated [ 1112.798591][T25971] loop4: p1 start 10 is beyond EOD, truncated [ 1112.804850][T25971] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1112.812319][T25971] loop4: p3 start 225 is beyond EOD, truncated [ 1112.818583][T25971] loop4: p4 size 2 extends beyond EOD, truncated [ 1112.825512][T25971] loop4: p5 start 10 is beyond EOD, truncated [ 1112.831678][T25971] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:42 executing program 4: syz_read_part_table(0x114, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1100}, 0x40) 14:50:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xf6ffffff) 14:50:42 executing program 5: syz_read_part_table(0x1000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:42 executing program 3: syz_read_part_table(0xffffffc9, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1200}, 0x40) 14:50:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xfeffffff) 14:50:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1300}, 0x40) 14:50:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1400}, 0x40) 14:50:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1500}, 0x40) [ 1113.170185][T26011] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1113.170994][T26012] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1113.192520][ T177] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1113.193407][T25996] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1113.203684][ T177] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 1113.209336][T25996] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1113.217219][ T177] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1113.234911][ T177] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 1113.243284][ T177] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 1113.250135][T25996] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1113.255125][ T177] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 1113.264036][T25996] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1113.269545][ T177] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 1113.281610][ T177] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 1113.282838][T25996] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1113.289700][ T177] Buffer I/O error on dev loop4p4, logical block 0, async page read [ 1113.306948][T26025] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1113.313842][ T1923] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 1113.318327][T26025] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1113.328479][T26025] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1113.337564][T26025] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1113.345307][T26025] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1113.505919][T25996] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1113.514055][T26037] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1113.520326][T26037] loop4: partition table partially beyond EOD, truncated [ 1113.534739][T26037] loop4: p1 start 10 is beyond EOD, truncated [ 1113.543414][T26037] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1113.551804][T26037] loop4: p3 start 225 is beyond EOD, truncated [ 1113.559521][T26037] loop4: p4 size 2 extends beyond EOD, truncated [ 1113.566518][T26037] loop4: p5 start 10 is beyond EOD, truncated [ 1113.572704][T26037] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1113.611327][T25996] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1113.616794][T25996] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1113.624382][T25996] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1113.632338][T25996] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1113.639572][T25996] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1113.720364][T26037] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1113.725727][T26037] loop4: partition table partially beyond EOD, truncated [ 1113.733084][T26037] loop4: p1 start 10 is beyond EOD, truncated [ 1113.739160][T26037] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1113.746715][T26037] loop4: p3 start 225 is beyond EOD, truncated [ 1113.752991][T26037] loop4: p4 size 2 extends beyond EOD, truncated [ 1113.760439][T26037] loop4: p5 start 10 is beyond EOD, truncated 14:50:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x28000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:43 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1600}, 0x40) 14:50:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xffff0300) 14:50:43 executing program 3: syz_read_part_table(0xffffffe4, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:43 executing program 4: syz_read_part_table(0x123, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:43 executing program 5: syz_read_part_table(0x1fffeb420000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1113.773089][T26037] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:43 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1700}, 0x40) 14:50:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xffffff0f) 14:50:43 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1000000}, 0x40) 14:50:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x43000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:43 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000}, 0x40) 14:50:43 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3000000}, 0x40) 14:50:43 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4000000}, 0x40) 14:50:43 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5000000}, 0x40) [ 1113.970389][T26066] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1113.976567][T26064] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1113.986238][T26068] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1113.991984][T26066] loop4: partition table partially beyond EOD, truncated [ 1113.999258][T26064] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1114.006811][T26068] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1114.023404][T26066] loop4: p1 start 10 is beyond EOD, truncated [ 1114.030251][T26064] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1114.037773][T26068] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1114.046099][T26064] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1114.053581][T26066] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1114.064004][T26064] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1114.071623][T26066] loop4: p3 start 225 is beyond EOD, truncated [ 1114.077962][T26068] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1114.081690][T26066] loop4: p4 size 2 extends beyond EOD, truncated [ 1114.093256][T26066] loop4: p5 start 10 is beyond EOD, truncated [ 1114.098648][T26068] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1114.102653][T26066] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1114.276258][T26064] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1114.283843][T26064] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1114.291846][T26064] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1114.300038][T26064] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1114.307360][T26064] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1114.320107][T26066] loop4: p1 p2 p3 < > p4 < p5 p6 > 14:50:44 executing program 3: syz_read_part_table(0xfffffff6, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1114.325796][T26066] loop4: partition table partially beyond EOD, truncated [ 1114.343707][T26066] loop4: p1 start 10 is beyond EOD, truncated [ 1114.358361][T26066] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1114.377676][T26066] loop4: p3 start 225 is beyond EOD, truncated [ 1114.393924][T26066] loop4: p4 size 2 extends beyond EOD, truncated [ 1114.401382][T26066] loop4: p5 start 10 is beyond EOD, truncated [ 1114.407478][T26066] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xffffffe0) 14:50:44 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6000000}, 0x40) 14:50:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:44 executing program 5: syz_read_part_table(0x42ebff1f0000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:44 executing program 4: syz_read_part_table(0x134, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:44 executing program 3: syz_read_part_table(0xfffffffd, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:44 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7000000}, 0x40) 14:50:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xfffffff6) 14:50:44 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8000000}, 0x40) 14:50:44 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9000000}, 0x40) 14:50:44 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa000000}, 0x40) 14:50:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xfffffffe) 14:50:44 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xb000000}, 0x40) [ 1114.644712][T26134] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1114.650666][T26134] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1114.658113][T26134] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1114.660274][T26158] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1114.673255][T26134] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1114.674548][T26158] loop4: partition table partially beyond EOD, truncated [ 1114.689259][T26158] loop4: p1 start 10 is beyond EOD, truncated [ 1114.689314][T26134] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1114.696733][T26158] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1114.715693][T26158] loop4: p3 start 225 is beyond EOD, truncated [ 1114.728365][T26158] loop4: p4 size 2 extends beyond EOD, truncated [ 1114.734982][T26135] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1114.748377][T26135] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1114.756263][T26158] loop4: p5 start 10 is beyond EOD, truncated [ 1114.761448][T26134] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1114.766718][T26158] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1114.777535][T26135] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1114.789112][T26135] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1114.800071][T26135] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1114.808451][T26134] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1114.816513][T26134] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1114.823957][T26134] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1114.833081][T26134] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1114.840745][T26134] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1114.890350][T26158] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1114.895666][T26158] loop4: partition table partially beyond EOD, truncated [ 1114.903466][T26158] loop4: p1 start 10 is beyond EOD, truncated [ 1114.909544][T26158] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1114.917732][T26158] loop4: p3 start 225 is beyond EOD, truncated [ 1114.924197][T26158] loop4: p4 size 2 extends beyond EOD, truncated [ 1114.931052][T26158] loop4: p5 start 10 is beyond EOD, truncated [ 1114.937305][T26158] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1114.996264][T26135] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1115.006795][T26135] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1115.014335][T26135] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1115.022411][T26135] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1115.029697][T26135] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:45 executing program 5: syz_read_part_table(0x1000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xc000000}, 0x40) 14:50:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x1000000000) 14:50:45 executing program 3: syz_read_part_table(0xfffffffe, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:45 executing program 4: syz_read_part_table(0x1e2, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x40000000000) 14:50:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xd000000}, 0x40) 14:50:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xe000000}, 0x40) 14:50:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xf000000}, 0x40) 14:50:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x10000000}, 0x40) [ 1115.263957][T26201] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1115.273113][T26201] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1115.283205][T26201] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1115.294168][T26201] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1115.302632][T26201] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1115.373137][T26206] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1115.380550][T26206] loop4: partition table partially beyond EOD, truncated [ 1115.387889][T26206] loop4: p1 start 10 is beyond EOD, truncated [ 1115.394802][T26206] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1115.402627][T26206] loop4: p3 start 225 is beyond EOD, truncated [ 1115.409087][T26206] loop4: p4 size 2 extends beyond EOD, truncated [ 1115.415853][T26206] loop4: p5 start 10 is beyond EOD, truncated [ 1115.422093][T26206] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1115.445721][T26225] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1115.453681][T26225] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1115.462037][T26225] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1115.470196][T26225] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1115.477546][T26225] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1115.500324][T26201] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1115.506573][T26201] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1115.514034][T26201] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1115.522204][T26201] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1115.529490][T26201] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1115.683427][T26225] __loop_clr_fd: partition scan of loop5 failed (rc=-16) 14:50:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x11000000}, 0x40) 14:50:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x1000000000000) 14:50:45 executing program 4: syz_read_part_table(0x203, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1115.761936][T26225] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1115.767537][T26225] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1115.776480][T26225] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1115.786061][T26225] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1115.793779][T26225] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:45 executing program 3: syz_read_part_table(0x800000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:45 executing program 5: syz_read_part_table(0x3000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xd8000000, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12000000}, 0x40) 14:50:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x2000000000000) 14:50:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x13000000}, 0x40) 14:50:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x14000000}, 0x40) 14:50:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x4000000000000) 14:50:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1115.937978][T26270] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1115.953221][T26270] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1115.967806][T26270] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1115.976125][T26270] loop5: p5 size 11290111 extends beyond EOD, truncated 14:50:45 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x15000000}, 0x40) 14:50:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1115.988105][T26268] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1116.001310][T26268] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1116.015308][T26270] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1116.025419][T26266] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1116.032290][T26266] loop4: partition table partially beyond EOD, truncated [ 1116.033439][T26268] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1116.054367][T26266] loop4: p1 start 10 is beyond EOD, truncated [ 1116.087752][T26268] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1116.098121][T26266] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1116.105753][T26268] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1116.114834][T26266] loop4: p3 start 225 is beyond EOD, truncated [ 1116.121365][T26266] loop4: p4 size 2 extends beyond EOD, truncated [ 1116.130080][T26270] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1116.138171][T26266] loop4: p5 start 10 is beyond EOD, truncated [ 1116.168089][T26266] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1116.327683][T26266] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1116.338505][T26266] loop4: partition table partially beyond EOD, truncated [ 1116.345792][T26266] loop4: p1 start 10 is beyond EOD, truncated [ 1116.357522][T26266] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1116.365819][T26266] loop4: p3 start 225 is beyond EOD, truncated [ 1116.374704][T26266] loop4: p4 size 2 extends beyond EOD, truncated [ 1116.384871][T26266] loop4: p5 start 10 is beyond EOD, truncated [ 1116.393318][T26266] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:46 executing program 4: syz_read_part_table(0x204, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x8000000000000) 14:50:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:46 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x16000000}, 0x40) 14:50:46 executing program 5: syz_read_part_table(0x4000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:46 executing program 3: syz_read_part_table(0x1000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:46 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x17000000}, 0x40) 14:50:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x10000000000000) 14:50:46 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x70) 14:50:46 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x20000100) 14:50:46 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) clone3(&(0x7f0000000280)={0x800000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x12}, &(0x7f0000000100)=""/181, 0xb5, &(0x7f00000001c0)=""/70, &(0x7f0000000240)=[0x0], 0x1}, 0x50) [ 1116.611474][T26346] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1116.616953][T26346] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1116.625722][T26346] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1116.634074][T26346] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1116.641766][T26346] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1116.660093][T26377] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1116.665316][T26377] loop4: partition table partially beyond EOD, truncated [ 1116.673400][T26377] loop4: p1 start 10 is beyond EOD, truncated [ 1116.679580][T26377] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1116.687211][T26377] loop4: p3 start 225 is beyond EOD, truncated [ 1116.693746][T26377] loop4: p4 size 2 extends beyond EOD, truncated [ 1116.700636][T26377] loop4: p5 start 10 is beyond EOD, truncated [ 1116.706748][T26377] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1116.722420][T26342] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1116.728183][T26342] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1116.740208][T26342] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1116.750859][T26342] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1116.758237][T26342] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1116.914331][T26377] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1116.924368][T26377] loop4: partition table partially beyond EOD, truncated [ 1116.931656][T26377] loop4: p1 start 10 is beyond EOD, truncated [ 1116.943719][T26377] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1116.954734][T26377] loop4: p3 start 225 is beyond EOD, truncated [ 1116.964087][T26346] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1116.970894][T26346] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1116.976156][T26377] loop4: p4 size 2 extends beyond EOD, truncated [ 1116.984676][T26346] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1116.992012][T26377] loop4: p5 start 10 is beyond EOD, truncated [ 1116.999191][T26346] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1117.005940][T26377] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:47 executing program 4: syz_read_part_table(0x226, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:47 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_SET_MSCBIT(r4, 0x40045568, 0x13) socket$nl_xfrm(0x10, 0x3, 0x6) pread64(r2, &(0x7f0000000100)=""/162, 0xa2, 0x80000001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0x7, &(0x7f0000000000)={0x81, 0x7fff, 0x47a, 0x101}, 0x10) 14:50:47 executing program 5: syz_read_part_table(0x7ffffffffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x40000000000000) [ 1117.013994][T26346] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:47 executing program 3: syz_read_part_table(0x1fffeb465000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x40040000000000) 14:50:47 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141842, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmstat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000300)={'raw\x00', 0x3a, "bae81f662633758dbf3171310f890dfc3e11c5006600f02579ed92b713a59e78ac7b32c06035513442bd6c87675454512cbd0801af1d9fbd953b"}, &(0x7f0000000040)=0x5e) sendfile(r4, r3, 0x0, 0x100000064) getsockname$packet(r3, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) bind(r2, &(0x7f00000005c0)=@xdp={0x2c, 0x8, r5, 0x1e}, 0x80) socket(0x18, 0x1, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) lseek(r7, 0xff, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', r5}) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x5, 0x2, 0x0, 0x0, 0x29a, r9, 0x3, [0x0, 0x0, 0x0, 0x0, 0x2000000], r8, r11, 0x4}, 0x40) 14:50:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0xa, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xb0080000000000) 14:50:47 executing program 0: syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x5, 0x800) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, &(0x7f0000000040)=0x751, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) [ 1117.140404][T26410] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1117.148135][T26410] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1117.157121][T26410] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1117.177948][T26410] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1117.205411][T26410] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1117.224194][T26424] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1117.231050][T26424] loop4: partition table partially beyond EOD, truncated [ 1117.238695][T26424] loop4: p1 start 10 is beyond EOD, truncated [ 1117.246190][T26424] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1117.255077][T26424] loop4: p3 start 225 is beyond EOD, truncated [ 1117.261409][T26424] loop4: p4 size 2 extends beyond EOD, truncated [ 1117.268217][T26424] loop4: p5 start 10 is beyond EOD, truncated [ 1117.274385][T26424] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1117.403882][T26438] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1117.411055][T26438] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1117.419596][T26438] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1117.427792][T26438] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1117.435244][T26438] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1117.470273][T26424] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1117.477485][T26424] loop4: partition table partially beyond EOD, truncated [ 1117.488078][T26446] print_req_error: 4263 callbacks suppressed [ 1117.488090][T26446] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1117.506155][T26424] loop4: p1 start 10 is beyond EOD, truncated [ 1117.508231][ T136] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1117.512301][T26424] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1117.524250][ T136] buffer_io_error: 4219 callbacks suppressed [ 1117.524256][ T136] Buffer I/O error on dev loop3, logical block 33008, async page read [ 1117.532668][T26424] loop4: p3 start 225 is beyond EOD, truncated [ 1117.538777][T26446] blk_update_request: I/O error, dev loop3, sector 263928 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1117.545866][T26424] loop4: p4 size 2 extends beyond EOD, truncated [ 1117.570648][T26424] loop4: p5 start 10 is beyond EOD, truncated [ 1117.580796][T26424] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1117.600373][ T177] blk_update_request: I/O error, dev loop3, sector 263928 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1117.603647][T26410] loop5: p1 p2 p3 < > p4 < p5 p6 > 14:50:47 executing program 4: syz_read_part_table(0x300, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:47 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$selinux_attr(r3, &(0x7f0000000200)='system_u:object_r:newrole_exec_t:s0\x00', 0x24) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="00000072217ff400", @ANYRES16=r5, @ANYBLOB="00000008000000000000010000000800040003000000"], 0x1c}}, 0x4000) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="84000000", @ANYRES16=r5, @ANYBLOB="00022dbd7000fcdbdf250f0000000800060004000000300002800800050041cb000014000100237140f97fe066583a1e0d0b5c83a94e080008003b5400000800050003000000080004000800000020f10280140002006261746164765f736c6176655f310000060004000000000008000600020000000800050003000000"], 0x84}, 0x1, 0x0, 0x0, 0x4}, 0x8000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0xc, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1117.611865][ T177] Buffer I/O error on dev loop3, logical block 32991, async page read [ 1117.626785][T26410] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1117.634423][T26410] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1117.642650][T26410] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1117.660662][T26410] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1117.700262][T26438] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1117.707503][T26438] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1117.715008][T26438] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1117.723341][T26438] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1117.730916][T26438] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x100000000000000) 14:50:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x28, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:47 executing program 3: syz_read_part_table(0x1000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:47 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200001, 0x31, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30}, 0x0) read(r0, &(0x7f0000000000)=""/124, 0x7c) setreuid(0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x5, 0x0, 0x4, 0x1, 0x0, r3, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x40) 14:50:47 executing program 5: syz_read_part_table(0x20000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x64, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x200000000000000) 14:50:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x300000000000000) 14:50:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x5f5e0ff, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1117.950470][T26465] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1117.951543][T26472] blk_update_request: I/O error, dev loop3, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1117.955946][T26474] blk_update_request: I/O error, dev loop3, sector 225 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1117.967518][ T1921] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1117.979483][T26465] loop4: partition table partially beyond EOD, truncated [ 1117.988941][T26475] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1117.994373][T26465] loop4: p1 start 10 is beyond EOD, truncated [ 1118.006902][ T136] blk_update_request: I/O error, dev loop3, sector 263946 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1118.019905][T26465] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1118.024308][ T136] Buffer I/O error on dev loop3p5, logical block 131968, async page read [ 1118.034198][T26465] loop4: p3 start 225 is beyond EOD, truncated [ 1118.039746][ T136] blk_update_request: I/O error, dev loop3, sector 225 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1118.046010][T26465] loop4: p4 size 2 extends beyond EOD, truncated [ 1118.057382][ T136] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1118.060166][ T136] blk_update_request: I/O error, dev loop3, sector 225 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1118.076235][T26465] loop4: p5 start 10 is beyond EOD, truncated [ 1118.088428][ T136] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1118.094426][T26465] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1118.102942][ T136] Buffer I/O error on dev loop3p5, logical block 131969, async page read [ 1118.118284][ T136] Buffer I/O error on dev loop3p5, logical block 131970, async page read [ 1118.127481][ T136] Buffer I/O error on dev loop3p5, logical block 131971, async page read [ 1118.136020][ T136] Buffer I/O error on dev loop3p6, logical block 33008, async page read [ 1118.136244][T26472] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1118.162012][T26470] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1118.173535][T26470] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1118.197005][T26470] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1118.216845][T26470] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1118.225363][T26470] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1118.233163][T26496] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 1118.290833][T26465] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1118.296200][T26465] loop4: partition table partially beyond EOD, truncated [ 1118.303383][T26465] loop4: p1 start 10 is beyond EOD, truncated [ 1118.309566][T26465] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1118.317394][T26465] loop4: p3 start 225 is beyond EOD, truncated [ 1118.323591][T26465] loop4: p4 size 2 extends beyond EOD, truncated [ 1118.330434][T26465] loop4: p5 start 10 is beyond EOD, truncated [ 1118.336656][T26465] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:48 executing program 4: syz_read_part_table(0x302, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x400000000000000) 14:50:48 executing program 3: syz_read_part_table(0x7ffffffffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x600000000000000) [ 1118.460257][T26470] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1118.466187][T26470] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1118.473680][T26470] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1118.481724][T26470] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1118.489221][T26470] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x700000000000000) 14:50:48 executing program 5: syz_read_part_table(0x90000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1118.604087][T26514] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1118.613106][T26514] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1118.625178][T26514] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1118.635014][T26514] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1118.642579][T26514] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1118.671077][T26527] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1118.684353][T26527] loop4: partition table partially beyond EOD, truncated [ 1118.698075][T26527] loop4: p1 start 10 is beyond EOD, truncated [ 1118.705932][T26527] loop4: p2 size 1073741824 extends beyond EOD, truncated 14:50:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x800000000000000) [ 1118.715787][T26527] loop4: p3 start 225 is beyond EOD, truncated [ 1118.738572][T26527] loop4: p4 size 2 extends beyond EOD, truncated [ 1118.753979][T26527] loop4: p5 start 10 is beyond EOD, truncated 14:50:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1118.770070][T26527] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1118.784966][ T1920] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1118.839475][T26514] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1118.859611][T26514] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1118.897652][T26514] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1118.917369][T26554] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1118.924231][T26554] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1118.935141][T26514] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1118.953614][T26554] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1118.970091][T26514] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1118.987626][T26554] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1119.011650][T26554] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1119.020970][T26527] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1119.030530][T26527] loop4: partition table partially beyond EOD, truncated [ 1119.065781][T26527] loop4: p1 start 10 is beyond EOD, truncated [ 1119.095894][T26527] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1119.111826][T26527] loop4: p3 start 225 is beyond EOD, truncated [ 1119.138269][T26527] loop4: p4 size 2 extends beyond EOD, truncated [ 1119.157489][T26527] loop4: p5 start 10 is beyond EOD, truncated [ 1119.175747][T26527] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:49 executing program 4: syz_read_part_table(0x30a, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x1000000000000000) 14:50:49 executing program 3: syz_read_part_table(0xa000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:49 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xe1009064}, 0xc, &(0x7f0000000140)={&(0x7f0000000940)=ANY=[@ANYBLOB="18020000", @ANYRES16=r2, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x20040004}, 0x4041) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0xdc, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x48, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x578bf53b}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x59a76df9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6fb2015c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdf}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xef}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x5c, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xae}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x62}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x12057ea1}]}, {0x4}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x69}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2ca5864}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}]}]}, 0xdc}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) waitid$P_PIDFD(0x3, r6, 0x0, 0x1000000, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = fcntl$dupfd(r8, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0x3c) setreuid(0x0, r10) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:49 executing program 5: syz_read_part_table(0x100000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x1010000000000000) 14:50:49 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) write$P9_RGETLOCK(r0, &(0x7f00000001c0)={0x34, 0x37, 0x1, {0x2, 0x5, 0x101, r1, 0x16, 'net/ip_tables_targets\x00'}}, 0x34) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r4) ptrace(0x420c, r4) r5 = syz_open_procfs(r4, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$KDSETKEYCODE(r5, 0x4b4d, &(0x7f0000000040)={0x1db1, 0x6}) 14:50:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1119.390391][T26574] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1119.396059][T26574] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1119.417285][T26574] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1119.426275][T26574] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1119.433887][T26577] loop3: p1 p2 p3 < > p4 < p5 p6 > 14:50:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x9, 0x0, 0x0, 0x0, 0x12, 0x1, 0xc3, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) 14:50:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1119.439933][T26577] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1119.454079][T26574] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1119.505385][T26586] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1119.513383][T26586] loop4: partition table partially beyond EOD, truncated [ 1119.515728][T26577] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1119.527669][T26586] loop4: p1 start 10 is beyond EOD, truncated [ 1119.540809][T26586] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1119.559571][T26586] loop4: p3 start 225 is beyond EOD, truncated [ 1119.567873][T26577] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1119.574526][T26586] loop4: p4 size 2 extends beyond EOD, truncated [ 1119.584906][T26577] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1119.588185][T26586] loop4: p5 start 10 is beyond EOD, truncated [ 1119.598373][T26586] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1119.700288][T26586] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1119.707769][T26586] loop4: partition table partially beyond EOD, truncated [ 1119.715155][T26586] loop4: p1 start 10 is beyond EOD, truncated [ 1119.721477][T26586] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1119.729042][T26586] loop4: p3 start 225 is beyond EOD, truncated [ 1119.735948][T26586] loop4: p4 size 2 extends beyond EOD, truncated [ 1119.742719][T26586] loop4: p5 start 10 is beyond EOD, truncated 14:50:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000040)={0x7, 0x0, 0xa06f, 0x5, 0xc, "75dd8a49140507bc"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000000)={0xb93, 0x0, 0x2}) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) socket$inet_icmp_raw(0x2, 0x3, 0x1) 14:50:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x1d00000000000000) 14:50:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xb, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:49 executing program 5: syz_read_part_table(0x200000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:49 executing program 4: syz_read_part_table(0x3a4, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:49 executing program 3: syz_read_part_table(0x20000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1119.748845][T26586] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x2000000000000000) 14:50:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xc, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) truncate(&(0x7f0000001140)='./file0\x00', 0x1f) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) ioctl$TIOCL_UNBLANKSCREEN(r2, 0x541c, &(0x7f0000000040)) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000001200)) sendto(r0, &(0x7f0000000100)="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", 0x1000, 0x928f38d4468e48be, &(0x7f0000001180)=@l2tp={0x2, 0x0, @local, 0x3}, 0x80) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, &(0x7f0000000080)={0x6, 0x7, 'syz2\x00'}, &(0x7f0000001100)=0x28) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x2601000000000000) 14:50:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$inet6(r1, &(0x7f0000000000), &(0x7f0000000040)=0x1c) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:49 executing program 0: ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000100)=0x4) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L+', 0xb3}, 0x16, 0x0) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x800, 0xfffffffe, 0x0, 0x2, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000000)=0x10000) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000040)=0x1f, 0x4) 14:50:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000100)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000000)=0xe8) setreuid(r4, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1119.900301][T26639] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1119.907894][T26639] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1119.918516][T26639] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1119.931784][T26639] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1119.945293][T26636] loop5: p1 p2 p3 < > p4 < p5 p6 > 14:50:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xd, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) close(r5) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x94, r6, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE_PROBE_RESP={0x7f, 0x7f, "1d5f77f85f5f15fa43d5264cdecbb426a82d146f8c486afec157aefebcf8b03661ac92e8954d80ffafed4dfdbe7a34a26d2e3d8e28a1eee1fefdb5bc0f3b643a780b9e37c0dd2899679f466a97310d820997952a9e289a8770ad19f8178a7c5e63e9163dbf1ab8b45d287a09cffafc5993d3707dc57610aeb96875"}]}, 0x94}}, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2, @local}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) sendmsg$NL80211_CMD_GET_INTERFACE(r4, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r6, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6}}]}, 0x30}, 0x1, 0x0, 0x0, 0x14}, 0x4000) accept4$tipc(r4, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x180000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000100)=0xc) setreuid(0x0, r9) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1119.952171][T26639] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1119.956178][T26636] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1119.972858][T26636] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1119.981795][T26636] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1119.989352][T26636] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1120.000260][T26638] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1120.013638][T26638] loop4: partition table partially beyond EOD, truncated [ 1120.032341][T26638] loop4: p1 start 10 is beyond EOD, truncated [ 1120.038802][T26638] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1120.059817][T26638] loop4: p3 start 225 is beyond EOD, truncated [ 1120.067358][T26638] loop4: p4 size 2 extends beyond EOD, truncated [ 1120.081805][T26638] loop4: p5 start 10 is beyond EOD, truncated [ 1120.094329][T26638] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1120.125202][T26639] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1120.131100][T26639] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1120.138582][T26639] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1120.146750][T26639] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1120.154390][T26639] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:50 executing program 5: syz_read_part_table(0x300000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1120.224025][T26638] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1120.229289][T26638] loop4: partition table partially beyond EOD, truncated [ 1120.236968][T26638] loop4: p1 start 10 is beyond EOD, truncated [ 1120.243248][T26638] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1120.250872][T26638] loop4: p3 start 225 is beyond EOD, truncated [ 1120.257796][T26638] loop4: p4 size 2 extends beyond EOD, truncated [ 1120.264529][T26638] loop4: p5 start 10 is beyond EOD, truncated [ 1120.270641][T26638] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:50 executing program 4: syz_read_part_table(0x3e4, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xe, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_tcp_int(r1, 0x6, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x8) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xf, 0x1, 0xff, 0x3, 0x404, 0x1, 0x3, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r3, 0x0, 0x0, 0xfffffffd}, 0x40) 14:50:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x3201000000000000) 14:50:50 executing program 3: syz_read_part_table(0x5046ebff1f0000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x10, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000080)) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 14:50:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x4000000000000000) 14:50:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 14:50:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x1000, 0x0, 0x200, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x11, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1120.506670][T26689] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1120.512387][T26689] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1120.522800][T26689] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1120.531683][T26689] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1120.539173][T26689] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1120.560466][T26709] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1120.578985][T26709] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1120.601930][T26709] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1120.611021][T26709] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1120.618567][T26709] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1120.670475][T26731] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1120.684369][T26731] loop4: partition table partially beyond EOD, truncated [ 1120.700772][T26731] loop4: p1 start 10 is beyond EOD, truncated [ 1120.707065][T26731] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1120.714628][T26731] loop4: p3 start 225 is beyond EOD, truncated 14:50:50 executing program 5: syz_read_part_table(0x400000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1120.721186][T26731] loop4: p4 size 2 extends beyond EOD, truncated [ 1120.728044][T26731] loop4: p5 start 10 is beyond EOD, truncated [ 1120.734483][T26731] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1120.880254][T26731] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 1120.941264][T26709] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1120.959786][T26709] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1120.977603][T26709] loop3: p2 size 1073741824 extends beyond EOD, truncated 14:50:50 executing program 4: syz_read_part_table(0x402, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x12, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x4800000000000000) 14:50:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x4c00000000000000) [ 1120.989963][T26709] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1120.997362][T26751] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1121.001800][T26709] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1121.011801][T26751] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1121.032505][T26751] loop5: p2 size 1073741824 extends beyond EOD, truncated 14:50:51 executing program 3: syz_read_part_table(0x90000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x38, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1121.054978][T26751] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1121.063926][T26751] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3fe, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x6800000000000000) 14:50:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x6c00000000000000) [ 1121.289727][T26769] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1121.311196][T26769] loop4: partition table partially beyond EOD, truncated [ 1121.331960][T26751] loop5: p1 p2 p3 < > p4 < p5 p6 > 14:50:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x700, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1121.341305][T26751] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1121.365627][T26769] loop4: p1 start 10 is beyond EOD, truncated [ 1121.367532][T26751] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1121.380768][T26769] loop4: p2 size 1073741824 extends beyond EOD, truncated 14:50:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x7400000000000000) [ 1121.389239][T26751] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1121.411242][T26794] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1121.423844][T26794] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1121.434739][T26751] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1121.444263][T26769] loop4: p3 start 225 is beyond EOD, truncated [ 1121.459578][T26794] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1121.468581][T26769] loop4: p5 start 10 is beyond EOD, truncated 14:50:51 executing program 5: syz_read_part_table(0x500000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1121.491116][T26769] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1121.494955][T26794] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1121.507707][T26794] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1121.728237][ T1920] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1121.783719][T26794] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1121.793120][T26794] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1121.815108][T26794] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1121.832683][T26794] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1121.843089][T26794] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1121.864351][T26769] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1121.874046][T26769] loop4: partition table partially beyond EOD, truncated [ 1121.884861][T26769] loop4: p1 start 10 is beyond EOD, truncated [ 1121.891420][T26769] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1121.902231][T26769] loop4: p3 start 225 is beyond EOD, truncated [ 1121.926961][T26769] loop4: p5 start 10 is beyond EOD, truncated [ 1121.934169][T26769] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:52 executing program 4: syz_read_part_table(0x406, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x900, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x7a00000000000000) 14:50:52 executing program 3: syz_read_part_table(0x100000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x8000000000000000) 14:50:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa00, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xc000000000000000) 14:50:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xb00, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1122.110107][T26829] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1122.121952][T26829] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1122.132024][T26829] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1122.147958][T26829] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1122.182679][T26829] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:52 executing program 5: syz_read_part_table(0x600000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1122.239968][T26854] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1122.249860][T26854] loop4: partition table partially beyond EOD, truncated [ 1122.272140][T26854] loop4: p1 start 10 is beyond EOD, truncated 14:50:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xc00, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xe0ffffffffffffff) [ 1122.284361][T26854] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1122.305734][T26854] loop4: p3 start 225 is beyond EOD, truncated [ 1122.325332][T26855] loop3: p1 p2 p3 < > p4 < p5 p6 > 14:50:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xd00, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1122.338274][T26855] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1122.358285][ T1920] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1122.406986][T26855] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1122.415954][T26854] loop4: p5 start 10 is beyond EOD, truncated [ 1122.420223][T26855] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1122.434568][T26855] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1122.442579][T26854] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1122.481106][T26887] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1122.489480][T26887] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1122.504547][T26887] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1122.520717][T26887] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1122.549694][T26887] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1122.674559][T26855] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1122.691952][T26855] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1122.710345][T26855] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1122.730386][T26855] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1122.737697][T26854] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1122.740398][T26855] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1122.757327][T26854] loop4: partition table partially beyond EOD, truncated [ 1122.777611][T26854] loop4: p1 start 10 is beyond EOD, truncated [ 1122.787593][T26854] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1122.800506][T26887] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1122.811536][T26887] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1122.818879][T26854] loop4: p3 start 225 is beyond EOD, truncated [ 1122.836842][T26887] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1122.837094][T26854] loop4: p5 start 10 is beyond EOD, truncated [ 1122.859813][T26854] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1122.869127][T26887] loop5: p5 size 11290111 extends beyond EOD, truncated 14:50:52 executing program 4: syz_read_part_table(0x480, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xe00, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xf6ffffff00000000) 14:50:52 executing program 3: syz_read_part_table(0x200000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1122.893074][T26887] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:52 executing program 5: syz_read_part_table(0x700000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xf00, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xfeffffff00000000) [ 1123.083890][T26902] print_req_error: 2525 callbacks suppressed [ 1123.083901][T26902] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1123.084962][T26917] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1123.097855][T26918] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1123.101433][ T1923] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 1123.132180][ T177] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.132723][T26919] blk_update_request: I/O error, dev loop5, sector 225 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1123.143148][ T177] buffer_io_error: 2496 callbacks suppressed [ 1123.143161][ T177] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 1123.154871][T26920] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1123.160823][ T177] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.172111][ T136] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.180094][ T177] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 1123.190988][ T136] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 1123.219966][ T136] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.229968][ T177] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1123.230905][ T136] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 1123.249811][ T177] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 1123.257947][ T1920] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1123.265324][ T177] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 1123.273546][ T177] Buffer I/O error on dev loop4p2, logical block 0, async page read 14:50:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xffff030000000000) [ 1123.280027][ T136] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 1123.290016][ T136] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 1123.298153][ T136] Buffer I/O error on dev loop5p4, logical block 0, async page read [ 1123.305596][T26916] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1123.318374][T26916] loop3: p1 size 11290111 extends beyond EOD, truncated 14:50:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x1300, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xffffff0f00000000) 14:50:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x1600, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xffffffff00000000) [ 1123.409465][T26916] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1123.445354][T26916] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1123.465562][T26916] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1123.477210][T26946] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1123.488570][T26946] loop4: partition table partially beyond EOD, truncated [ 1123.499053][T26946] loop4: p1 start 10 is beyond EOD, truncated [ 1123.509668][T26946] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1123.531442][T26953] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1123.543434][T26953] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1123.561204][T26946] loop4: p3 start 225 is beyond EOD, truncated [ 1123.575118][T26953] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1123.603300][T26946] loop4: p5 start 10 is beyond EOD, truncated [ 1123.612688][T26946] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1123.627176][T26953] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1123.640836][T26916] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1123.648105][T26916] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1123.659880][T26953] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1123.674125][T26916] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1123.682404][T26916] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1123.689999][T26916] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:53 executing program 4: syz_read_part_table(0x500, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xffffffffffffffe0) 14:50:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f00000004c0)=0xfffffff7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$inet6_opts(r4, 0x29, 0x39, &(0x7f0000000400)=""/123, &(0x7f0000000480)=0x7b) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={r0, 0x13, 0x1, 0xa0, &(0x7f00000002c0)=[0x0, 0x0], 0x2}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x2, 0x0, r4, 0xf22, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$SO_BINDTODEVICE(r9, 0x1, 0xb, &(0x7f0000000000), 0x10) r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r7, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r10, 0x100, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x340480d1}, 0x4048000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r12, 0x8983, &(0x7f0000000140)={0x8, 'geneve0\x00', {'vlan0\x00'}, 0x8001}) sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r10, 0x2, 0x70bd2a, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x10000}}}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r13 = syz_genetlink_get_family_id$smc(&(0x7f0000000200)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8c000000", @ANYRES16=r13, @ANYBLOB="040025bd7000ffdbdf25030000000900010073797a3000000000140002006261740af68b491ba4bd6164765f736c6176655f3000000900010073797a32000000000900030073797a31000000000900010073797a30000000000900030073797a30000000000900010073797a3000000000140002000400000000050004008200"/141], 0x8c}, 0x1, 0x0, 0x0, 0x20004054}, 0x40) [ 1123.890448][T26953] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1123.895803][T26953] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1123.914481][ T1921] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1123.926455][T26953] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1123.937446][T26953] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1123.945313][T26992] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1123.951263][T26992] loop4: partition table partially beyond EOD, truncated [ 1123.954532][T26953] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1123.971355][T26992] loop4: p1 start 10 is beyond EOD, truncated 14:50:53 executing program 5: syz_read_part_table(0x800000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:53 executing program 3: syz_read_part_table(0x204000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x2, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0xffffffffffffffff) 14:50:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r3, 0x6, 0x3, &(0x7f0000000000)=0xff, 0x4) [ 1123.986060][T26992] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1123.997095][T26992] loop4: p3 start 225 is beyond EOD, truncated [ 1124.006780][T26992] loop4: p5 start 10 is beyond EOD, truncated [ 1124.013230][T26992] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000000)={'macvlan1\x00', {0x2, 0x4e21, @local}}) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x2}, 0x40) 14:50:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x3, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) r1 = dup(r0) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x7, 0x6, 0x3, 0x0, 0x0, {0xc, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0xff}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0xeb6}]}, 0x50}, 0x1, 0x0, 0x0, 0x8044}, 0x20000800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1124.175025][T27009] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 1124.220294][T26992] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1124.227746][T26992] loop4: partition table partially beyond EOD, truncated [ 1124.238794][T26992] loop4: p1 start 10 is beyond EOD, truncated [ 1124.246174][T26992] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1124.254329][T26992] loop4: p3 start 225 is beyond EOD, truncated [ 1124.261966][T26992] loop4: p5 start 10 is beyond EOD, truncated [ 1124.268169][T26992] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:54 executing program 4: syz_read_part_table(0x600, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x4, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0xc801, 0x0) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x3) ioctl$PIO_CMAP(r3, 0x4b71, &(0x7f0000000040)={0x8, 0x6, 0x7, 0x19e40, 0xfff, 0x9}) [ 1124.320749][T27015] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1124.326451][T27015] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1124.333858][T27015] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1124.341910][T27015] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1124.349241][T27015] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:54 executing program 5: syz_read_part_table(0x900000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x5, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x10, 0x101, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r2, 0x0, 0x80000}, 0x92) 14:50:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="d79f33dbe9c1db4211ea8d9d6e27e91fb3fa8f5918a953a68b9f94aaf1fb33b6c31c24d19e14c89d5e1e0c004d1ba18f44686103337e4b6c59281d68515a629f68d1b345e39acc708ddd0232d8db23782ad7dc9b68b4bdbdf25cd6195a7c5c2916977923ba21d494f0258934558eca54348d0987e58183d1fe4207ce88ad6f0bfc77e05e86ea446eab2b021525b53e622059dad3f0ba521eb105545cb244e43a156cdc0c0992328f65328aa803fa6d4de317e4145cc573c43b754e1e7c1e0bfecbff7a6eb943", 0xc6}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="d822ca561f632903e9345f297a8e6868d9618da96c9952d63375023400e6193b8eda97419a136ea3ea9186a3a1bd43c1837bddf428ef8a7e1df9bdec0259b2198af19325297dd81ed67afc9bf8f5bb79167cbb4586412735225290bdd9e0f4068101ac5d25d2b0bdf9cd8b5cad5c563c3171582b17d256a0c241b68c3253c3ed7ad362347d92a75a370a9419dd339ae9adb94c799f58df8bfe070f90d0ca7b8f7711b50d34aed31c7d9fbd6d277fcf49593bdf2e2044e9ee8fcec0acc2af28e83aa174dfaacd596bee627f3f754536f2df533f9d03fb1dd27121d4fffa67603c41b8643c49226edde6cf593a0677", 0xee}], 0x3, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$vsock_dgram(0x28, 0x2, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000015c0)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001580)={&(0x7f00000014c0)=@deltaction={0x94, 0x31, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x50, 0x1, [{0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}, {0x10, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x101}}, {0x10, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0x14, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}]}, @TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x16, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5e03dc12}}, {0xc, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}]}, @TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x44000}, 0x2c008000) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/196, 0xc4}], 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x40, 0x8) 14:50:54 executing program 3: syz_read_part_table(0x300000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:54 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r0, 0x0, &(0x7f0000000000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000080)=0xffffffffffffff0c) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x3}, 0x40) [ 1124.539896][T27045] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1124.549127][T27045] loop4: partition table partially beyond EOD, truncated 14:50:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x6, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1124.580546][T27063] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1124.591845][T27045] loop4: p1 start 10 is beyond EOD, truncated [ 1124.601896][T27063] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1124.610315][T27045] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1124.622293][T27063] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1124.626701][T27045] loop4: p3 start 225 is beyond EOD, truncated [ 1124.646117][T27063] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1124.653812][T27061] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1124.659580][T27045] loop4: p5 start 10 is beyond EOD, truncated [ 1124.669043][T27061] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1124.675910][T27045] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1124.679441][T27061] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1124.683859][T27063] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1124.702998][T27061] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1124.713112][T27061] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1124.894095][T27063] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1124.899929][T27063] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1124.907301][T27063] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1124.917042][T27063] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1124.925055][T27063] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1124.932579][T27045] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1124.939303][T27045] loop4: partition table partially beyond EOD, truncated [ 1124.951436][T27045] loop4: p1 start 10 is beyond EOD, truncated [ 1124.963631][T27045] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1124.976568][T27045] loop4: p3 start 225 is beyond EOD, truncated [ 1124.985793][T27045] loop4: p5 start 10 is beyond EOD, truncated [ 1124.997844][T27045] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:55 executing program 4: syz_read_part_table(0x604, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x7, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:55 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048885}, 0x40000) setreuid(0x0, r2) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400040, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x110, 0x1, 0x20, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r4, 0x0, 0x0, 0xfffffffc}, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) r7 = getpid() rt_tgsigqueueinfo(r7, r7, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r7) ptrace(0x420c, r7) r8 = syz_open_procfs(r7, &(0x7f0000000280)='net/snmp\x00') ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f00000002c0)={0x0, 0x2, 0x4, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFNETMASK(r6, 0x891c, &(0x7f0000000240)={'team_slave_0\x00', {0x2, 0x4e22, @empty}}) 14:50:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r1) fcntl$dupfd(r1, 0x406, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x81) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x6) 14:50:55 executing program 3: syz_read_part_table(0x400000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:55 executing program 5: syz_read_part_table(0xa00000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x8, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1125.040227][ T1920] __loop_clr_fd: partition scan of loop5 failed (rc=-16) 14:50:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000000)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x9, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x28c2, 0x0) 14:50:55 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:55 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setreuid(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1125.177955][T27114] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1125.189954][T27114] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1125.215933][T27125] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1125.217655][T27114] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1125.225018][T27125] loop4: partition table partially beyond EOD, truncated [ 1125.230258][T27114] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1125.241313][T27125] loop4: p1 start 10 is beyond EOD, truncated [ 1125.243937][T27114] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1125.250912][T27125] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1125.270148][T27141] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1125.280716][T27141] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1125.292617][T27125] loop4: p3 start 225 is beyond EOD, truncated [ 1125.297622][T27141] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1125.300602][T27125] loop4: p5 start 10 is beyond EOD, truncated [ 1125.314270][T27125] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1125.318692][T27141] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1125.329455][T27141] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1125.450830][T27125] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1125.456121][T27125] loop4: partition table partially beyond EOD, truncated [ 1125.463403][T27125] loop4: p1 start 10 is beyond EOD, truncated [ 1125.473837][T27125] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1125.481696][T27125] loop4: p3 start 225 is beyond EOD, truncated [ 1125.488548][T27125] loop4: p5 start 10 is beyond EOD, truncated [ 1125.494678][T27125] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1125.520892][T27114] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1125.526249][T27114] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1125.534177][T27114] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1125.542426][T27114] loop3: p5 size 11290111 extends beyond EOD, truncated 14:50:55 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xd8, 0x2, 0x3, "e8ec71a26643c52a00", "7d155b9ccc424e279c98e3909dc8a6dea3782314f8c37ae08d70f6e6ffa5333a975f018a326bfb666c3249b9fe4a4d39592d4c5506c8a3f22e1d80ad9b684221f07ac9526df54825d7c1b6e652a1117b04877f966526cad1856504c1e05cd5e554dbc46ad6a6c535b8dc488801b99be94adeddc277d7e2729b2c8a390889936800aac91bd3f6f47f6b105f230c2710261fcd5218a385526dc1a2d74fe85af603398d0935e841fb3482342a835ecc8e0139166bbb61ed0b2d9e6e03f2b280f3de38216b"}, 0xd8, 0x4) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000015c0)={@mcast2, 0x3, 0x0, 0x3, 0x5, 0x7, 0x3ed}, 0x20) 14:50:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0xa, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:55 executing program 4: syz_read_part_table(0x700, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1125.550124][T27114] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:55 executing program 3: syz_read_part_table(0x500000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0xb, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) socket$inet6(0xa, 0x1, 0x3f) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x9, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x3}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x10004081}, 0x4000) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:55 executing program 5: syz_read_part_table(0xb00000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:55 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20a901, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0xf4) sendmmsg(r5, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp={0x2c, 0xffffa888, r7}, 0x80, 0x0}}], 0x300, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000008c0)={&(0x7f00000009c0)=ANY=[@ANYRESHEX=r3, @ANYRES16=r4, @ANYBLOB="00082dbd7000fcdbdf250400000014000600fe80000000000000000000000000002d14000600fe8000000000000000000000000000bb08000800ac1414bb080007007f00000106000b002500008da8475c3a6903ebf907a8785db666d53138b91530041cb7bb3c22555496b8017f514598ec4eb4d91d95e5c5209d3ea6f1d808eba9eb59eaf43c227a0bc293f4346fa360241d6a5167bded585ea3b9d480", @ANYRES64=r5, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES64=0x0, @ANYRES16]], 0x5}, 0x1, 0x0, 0x0, 0x48000}, 0x800) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='y\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000127bd7000fedbdf250300000014000600fe8000000000000000000000000000bb08000400010000000b000100252c5c215d2e000014000600fe880000000000000000000000000001060001002d00000008000c0001000000"], 0x60}}, 0x800) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0xc, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0xd, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:55 executing program 3: syz_read_part_table(0x600000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000080)={0x42, 0x2}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r0) clone(0x11000, &(0x7f00000000c0)="2c8effd1821d9935c69764120cb24645711a2bc7c5fe3c15a1cbb25c7708cbde735bfec1a6244f306741aa061205b18c4354ad271da9268fa4cdaac53a19e84cfcb7d0a2b6437c927007a44b39884d", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)="e5e6af8c02d9fdecf87dfd3d71a1dd383df670e87e600bd9a13f844527fa6d84439b679ee2ae88ebf97b5b9cfcbf539cb6ad452d6f7c7190e27df97c2f179894fe67fdd6e62a8a69b8358ebb1838b5312938ef3351b04c8ab212347a4e22f71f617a4d8229d2615c77f76c72f71a366ccdd769c2d21d8e502560f83e5acfaef2a2d8e72d6f558ef903454eebc691c37c13bf924cf97c9e65242679b0a388db40302d4b6f7cde7d3feceb590736a3d46e994e8a2949f908120e2b183ed2c733756b45fa0dd1c7") ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="34000010", @ANYRES16=r6, @ANYBLOB="010000000000000000000c0000002000058008000100657468001400028008000100000000000800020000000000"], 0x34}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)={0x120, r6, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x47}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x10000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x20}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xde}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200000}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}]}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x4000000}, 0x8001) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RNDADDENTROPY(r4, 0x40085203, &(0x7f00000003c0)={0x4, 0xbf, "f58c076ec3769da67b3a5975f4b03eadf0cac7400470a4a79dda91f6a7ea605b232a4f0d7ec5115b5d646b0c22ea751194292e47cd0a0f1e4d71e417694cb2c0044c0aa7facd43a299a9d16791b1dd25b18e668d669de924556e4cfde779d64706c61390fe6387c1f5ca8b5a0120c2f49d286ce4671632b357ea2ae2169182c2c72b46e11b38b28f5e59ba1703e9b70247feb2a82e1a3bdcc19503ba85dfec9a60f83f5afbede503ccad4ea00ea97afa97cca6c29190221c2a73d91dea9e3f"}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000380)={0x2, &(0x7f0000000200)=[{0xa68, 0xd3, 0x3, 0x2}, {0x3, 0x83, 0xff, 0x7}]}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0xe, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1125.831448][T27194] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1125.837385][T27194] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1125.847456][T27194] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1125.856386][T27194] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1125.864331][T27194] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1125.912075][T27200] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1125.926435][T27200] loop4: partition table partially beyond EOD, truncated [ 1125.980000][T27200] loop4: p1 start 10 is beyond EOD, truncated [ 1125.991881][T27200] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1126.000131][T27200] loop4: p3 start 225 is beyond EOD, truncated [ 1126.008747][T27200] loop4: p5 start 10 is beyond EOD, truncated [ 1126.015161][T27200] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1126.040253][T27223] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1126.045632][T27223] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1126.052953][T27223] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1126.061110][T27223] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1126.068622][T27223] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1126.220523][T27200] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1126.225852][T27200] loop4: partition table partially beyond EOD, truncated [ 1126.233461][T27200] loop4: p1 start 10 is beyond EOD, truncated [ 1126.247528][T27200] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1126.256805][T27200] loop4: p3 start 225 is beyond EOD, truncated [ 1126.263830][T27200] loop4: p5 start 10 is beyond EOD, truncated [ 1126.272700][T27200] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:56 executing program 5: syz_read_part_table(0xc00000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000040)) 14:50:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0xf, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2000, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r4) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(r6, 0x29, 0x41, &(0x7f0000000300)={'raw\x00', 0x3a, "bae81f662633758dbf3171310f890dfc3e11c5006600f02579ed92b713a59e78ac7b32c06035513442bd6c87675454512cbd0801af1d9fbd953b"}, &(0x7f0000000040)=0x5e) sendfile(r7, r6, 0x0, 0x100000064) getsockname$packet(r6, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) bind(r5, &(0x7f00000005c0)=@xdp={0x2c, 0x8, r8, 0x1e}, 0x80) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000140)={'team0\x00', r8}) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r3, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r9}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}]}, 0x28}, 0x1, 0x0, 0x0, 0xc4}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x18, 0x400, 0x0, 0x0, 0x8, r11, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) 14:50:56 executing program 4: syz_read_part_table(0x900, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:56 executing program 3: syz_read_part_table(0x604000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x10, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'batadv_slave_0\x00', r5}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r8, 0x8927, &(0x7f0000000300)={'hsr0\x00', @ifru_mtu=0x4}) accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f00000002c0)=r9) membarrier(0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000180)=r10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x11, 0x0, 0x8, 0x81, 0x20, r1, 0x5, [], r5, r7, 0x5, 0x2, 0x5}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfffffffffffffffe) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setreuid(0x0, 0x0) ioctl$sock_netdev_private(r0, 0x89f6, &(0x7f0000000000)="9c3907d0cbbc44c07f87ba36c73c1e8ecff09be5ac8613124c72ed52ba3de44681746d15975353c17cf529c088915deeddf3377dba5c") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x4800, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000080)) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1126.420740][T27255] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1126.427814][T27255] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1126.437600][T27255] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1126.445798][T27255] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1126.453656][T27255] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x11, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="00000072217ff400", @ANYRES16=r3, @ANYBLOB="00000008000000000000010000000800040003000000"], 0x1c}}, 0x4000) sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x58, r3, 0x800, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x660b}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}]}, 0x58}}, 0xc004) setreuid(0x0, r1) 14:50:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) getpeername$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f0000000380)=0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r6, 0xc080661a, &(0x7f0000000280)={{0x3, 0x0, @descriptor="dabdb611cdc7e21b"}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, &(0x7f00000001c0)={0x2, 'team0\x00', {0x80000000}, 0x3}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r7) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) fsetxattr$trusted_overlay_opaque(r9, &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x1) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x1, 0x401, 0x0, 0x0, {0x0, 0x0, 0x4}, [@CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1000}, @CTA_ZONE={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) [ 1126.470069][T27256] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1126.478984][T27256] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1126.488389][T27256] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1126.497144][T27256] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1126.510345][T27256] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1126.667457][T27255] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1126.675044][T27255] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1126.683670][T27255] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1126.694166][T27255] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1126.701758][T27255] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1126.730267][T27256] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1126.736079][T27306] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1126.741796][T27306] loop4: partition table partially beyond EOD, truncated [ 1126.743264][T27256] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1126.754148][T27306] loop4: p1 start 10 is beyond EOD, truncated 14:50:56 executing program 5: syz_read_part_table(0xd00000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x12, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:56 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) setreuid(0x0, r3) ioprio_get$uid(0x0, r3) 14:50:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) splice(r2, &(0x7f0000000040)=0xe1, r0, &(0x7f0000000000)=0x40, 0x8, 0x5) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x4281, 0x0) [ 1126.774479][T27306] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1126.790193][T27256] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1126.800927][T27306] loop4: p3 start 225 is beyond EOD, truncated [ 1126.816478][T27256] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1126.823903][T27306] loop4: p5 start 10 is beyond EOD, truncated [ 1126.828711][T27256] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1126.831694][T27306] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1127.010682][T27334] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1127.019900][T27334] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1127.027225][T27334] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1127.035199][T27306] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1127.042635][T27306] loop4: partition table partially beyond EOD, truncated [ 1127.057464][T27306] loop4: p1 start 10 is beyond EOD, truncated [ 1127.063920][T27306] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1127.063978][T27334] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1127.071564][T27306] loop4: p3 start 225 is beyond EOD, truncated [ 1127.085283][T27306] loop4: p5 start 10 is beyond EOD, truncated [ 1127.091658][T27334] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1127.091691][T27306] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:57 executing program 4: syz_read_part_table(0xa00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:57 executing program 3: syz_read_part_table(0x700000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x25, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) getsockopt$IP_SET_OP_VERSION(r2, 0x1, 0x53, &(0x7f0000000000), &(0x7f0000000040)=0x8) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfffffffffffffffe) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:57 executing program 5: syz_read_part_table(0xd26000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x28, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:57 executing program 5: syz_read_part_table(0xe00000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x43, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000040)) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x5, 0x400, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r4) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) [ 1127.302334][ T1923] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 1127.316613][T27365] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1127.327981][T27365] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1127.353629][T27365] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1127.370726][T27378] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1127.385063][T27378] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1127.390225][T27365] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1127.401155][T27378] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1127.401681][T27365] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1127.422026][T27378] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1127.425676][T27394] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1127.437226][T27378] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1127.439565][T27394] loop4: partition table partially beyond EOD, truncated [ 1127.458907][T27394] loop4: p1 start 10 is beyond EOD, truncated [ 1127.466332][T27394] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1127.481913][T27394] loop4: p3 start 225 is beyond EOD, truncated [ 1127.488569][T27394] loop4: p5 start 10 is beyond EOD, truncated [ 1127.494789][T27394] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1127.650533][T27394] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1127.675419][T27394] loop4: partition table partially beyond EOD, truncated [ 1127.688214][T27394] loop4: p1 start 10 is beyond EOD, truncated [ 1127.696204][T27394] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1127.708203][T27394] loop4: p3 start 225 is beyond EOD, truncated [ 1127.721112][T27378] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1127.735130][T27394] loop4: p5 start 10 is beyond EOD, truncated [ 1127.736205][T27378] loop5: p1 size 11290111 extends beyond EOD, truncated 14:50:57 executing program 4: syz_read_part_table(0xa03, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x20000, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000080)={@broadcast, @local}, &(0x7f00000000c0)=0xc) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'batadv_slave_0\x00', r5}) bind$packet(r1, &(0x7f0000000100)={0x11, 0x3, r5, 0x1, 0x1, 0x6, @remote}, 0x14) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x204a00, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r8, 0x5502) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r9) setreuid(0x0, r9) 14:50:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x48, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:57 executing program 3: syz_read_part_table(0x800000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1127.766285][T27394] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1127.783908][T27378] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1127.805555][T27378] loop5: p5 size 11290111 extends beyond EOD, truncated 14:50:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x4c, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1127.827957][T27378] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) futimesat(r3, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x7530}, {0x77359400}}) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x1}, 0x40) [ 1127.889105][T27421] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1127.896612][T27421] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1127.916170][T27421] loop3: p2 size 1073741824 extends beyond EOD, truncated 14:50:57 executing program 5: syz_read_part_table(0x1000000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:57 executing program 0: timer_create(0x5, &(0x7f0000000000)={0x0, 0x2e, 0x1}, &(0x7f0000000040)=0x0) timer_delete(r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_DIRENT(r3, &(0x7f0000000100)={0x168, 0x0, 0x1, [{0x6, 0x4, 0x0, 0x5}, {0x0, 0x2, 0x10, 0x400, 'posix_acl_access'}, {0x0, 0x9, 0x0, 0x8}, {0x1, 0x5, 0x2, 0x7, '{+'}, {0x1, 0x3, 0x8, 0x8, '-}system'}, {0x3, 0x0, 0x2, 0x1, '(\xef'}, {0x2, 0x80000001, 0x0, 0xff}, {0x2, 0x3, 0x1f, 0x6a, 'cpuset^selinuxselfzwlan1cpuset-'}, {0x2, 0x9, 0x10, 0x100, 'vmnet0nodevwlan1'}, {0x6, 0xba, 0xe, 0x0, 'security.ppp1\''}]}, 0x168) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1127.939726][T27421] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1127.958042][T27421] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:50:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x68, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x6c, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1128.180919][T27432] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1128.189079][T27432] loop4: partition table partially beyond EOD, truncated [ 1128.207553][T27432] loop4: p1 start 10 is beyond EOD, truncated [ 1128.221583][T27432] loop4: p2 size 1073741824 extends beyond EOD, truncated 14:50:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, &(0x7f0000000000)={0x0, 0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000080), &(0x7f00000001c0)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000300)={'raw\x00', 0x3a, "bae81f662633758dbf3171310f890dfc3e11c5006600f02579ed92b713a59e78ac7b32c06035513442bd6c87675454512cbd0801af1d9fbd953b"}, &(0x7f0000000040)=0x5e) r6 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) sendfile(r6, r5, 0x0, 0x100000066) getsockname$packet(r5, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) bind(r4, &(0x7f00000005c0)=@can, 0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', r7}) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x200, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], r8}, 0x40) [ 1128.236402][T27453] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1128.246570][T27453] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1128.276345][T27432] loop4: p3 start 225 is beyond EOD, truncated [ 1128.291094][T27453] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1128.305043][T27432] loop4: p5 start 10 is beyond EOD, truncated [ 1128.321324][T27453] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1128.331550][T27432] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1128.338261][T27421] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1128.351458][T27421] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1128.365923][T27453] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1128.380294][T27421] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1128.416670][T27421] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1128.432936][T27421] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1128.540157][T27432] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1128.548970][T27432] loop4: partition table partially beyond EOD, truncated [ 1128.559277][T27432] loop4: p1 start 10 is beyond EOD, truncated [ 1128.568392][T27432] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1128.577958][T27432] loop4: p3 start 225 is beyond EOD, truncated [ 1128.585901][T27432] loop4: p5 start 10 is beyond EOD, truncated [ 1128.592509][T27432] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:58 executing program 4: syz_read_part_table(0xb00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setreuid(0x0, 0xee01) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400202, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x74, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:58 executing program 3: syz_read_part_table(0x900000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) ioctl$FICLONE(r5, 0x40049409, r5) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="100400009b6967a8c712", @ANYRES16=r4, @ANYBLOB="050c270000000000647b54127300"], 0x3}, 0x1, 0x0, 0x0, 0x5a247b1ad52de849}, 0x8040) sendmsg$NBD_CMD_STATUS(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r4, 0x0, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x24}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x100000001}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3ff}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7fffffff}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NBD_CMD_STATUS(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x20, r4, 0x20, 0x70bd27, 0x25dfdbff, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}]}, 0x20}, 0x1, 0x0, 0x0, 0xf7a98a0befd95721}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYRES16=r5, @ANYRES16=r4, @ANYBLOB="000127bd7000fbdbdf25010000000c0005000401000000000000", @ANYRES64, @ANYRES64=r4], 0x5}, 0x1, 0x0, 0x0, 0x8080}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0x58, r4, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8, 0x1, r7}, {0x8, 0x1, r5}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x103}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xffff}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x24000000}, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r8) ioctl$sock_netdev_private(r8, 0x89f4, &(0x7f0000000380)="28cd6c4fef6536dd7ae0") ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000400)={0x0, 0x1, {0x17, 0x3, 0xa, 0x2, 0x2, 0x4, 0x2, 0x2d, 0xffffffffffffffff}}) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r4, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x100000000}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x58}, 0x1, 0x0, 0x0, 0x44804}, 0x20004811) r9 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:50:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x80540, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x7, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0x3}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) bind(r0, &(0x7f0000000000)=@l2={0x1f, 0x4, @fixed={[], 0x10}, 0x8}, 0x80) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r7) setreuid(r7, r2) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1128.647065][T27453] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1128.661829][T27453] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1128.678438][T27453] loop5: p2 size 1073741824 extends beyond EOD, truncated 14:50:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x7a, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:58 executing program 5: syz_read_part_table(0x1100000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000700000004000000f003000000000000000000000000000008030000080300000803000004000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000bbbbbbbbbbbb0000000000000000000000000000000000000000000000000000ac1e0101ac1414bb0f000000ffffffff00000000ac1e0001ffffffff000000ff0003bbbbbbbbbbbb00000000000000000000ff00000000ff0000000000000000000000000000000000000000000000000000ffffffffffff0000000000000000000000040003fff9040100080ab774756e6c300000000000000000000000766972745f7769666930000000000000bd00000000000000000000000000000000000000000000000000000000000000000000010000c000e80000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000030000018003000000ac1414407f00000100000000ffffff00020000000000000000000000000000000000ffffffff00ff0000000000000000000000000000000000000000000000000000ffffffff00ff0000000000000000000000010004010101007fff00046d61637674617030000000000000000076657468305f766c616e00000000000000000000000000000000000000000000ff000000000000000000000000000000000008020000c000100100000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ac14141608000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000791cd4c0bf4584891ac58f0f921f8f7f231ceef9a35dfe63a611bdfb0ab2645e74940505aed64c670040143432f6a46c2a2d25ef39b0d518b9e2f700892330138f412503820b508b8dd91d8448ca1615bf1a49861f411ecf5d1639e59e169333fd191dccc8b03d7e6a11213c37d4a2bd820eb93408ffc461645d91f85c6fb2"], 0x440) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000040)) setreuid(0x0, r3) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0xd8, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1128.712634][T27453] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1128.724560][T27453] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:50:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) dup3(r2, 0xffffffffffffffff, 0x0) setreuid(0x0, r1) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000300)={'raw\x00', 0x3a, "bae81f662633758dbf3171310f890dfc3e11c5006600f02579ed92b713a59e78ac7b32c06035513442bd6c87675454512cbd0801af1d9fbd953b"}, &(0x7f0000000040)=0x5e) sendfile(r5, r4, 0x0, 0x100000064) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) r7 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getpeername$packet(r9, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000080)=""/59) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000000240)={@rand_addr="2d88366f11f46c1c7d590853c63953bc", @local, @dev={0xfe, 0x80, [], 0x32}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x20c200a2}) r11 = getpid() rt_tgsigqueueinfo(r11, r11, 0x16, &(0x7f00000000c0)) ptrace(0x4206, r11) ptrace(0x420c, r11) r12 = getpgrp(r11) ptrace$setregset(0x4205, r12, 0x202, &(0x7f00000001c0)={&(0x7f00000007c0)="4bb245a666ab53a366301b23c36e005f4ad1d64fb6ba2f869ed500a78b4fcd5ac4b6f977c0b31b3bcfc440ec58b6cae203162240ff6cf63e06d32dc598372069cf2f121c97c91b17ea27911e56c6e347e458fdb2314244af64390a8462ae0fabab17ce667b2f20290c45545641366add92e6fd21de885d4ecb0c7ec3998dfdd54b8b12effd9799c31cf28beac5e0e4df0db46559c3106a04737e685c2350cb366b5c29ac5be64bd8db3cd2cc0b366c4fef4b734a0e0275f0c7806b3a983790f1880b33dbf9da424b67211690a1467f91a2d10085446f7df57ec1a8cd4e3fb359117da3c5c56fd84d77f8077450465dcf7d00b1d97fe3ae1e1c96a38139ef14c40354d42313f4110335e49c20ae9cf14dc2ceb1f3e676186f1a8201862e6c5c4469ae1902ccab423c125c54db552a0bd980709c617e43fb71cf44064ad658c3bc17bc743de27e2cac8ba3ba60d9078cbdb7c86627c4a6e36b1386b266ec42ce5197289569526f92e697c89b9a9ccb8e1b1cbb4aa794b7f2eddd569f9a0be26cf187a952b8be667e7ae73abc18872ffa43dbbd7e1015e56bc1264eef84e9eb4f3eedf8b0db23f9cedc2d03b2913c987f9bdd401c003505d3f26b2a30945957a05bdf5d17aa5d05bce57f675bd8c526b4212ffba319ec2b8c71ea5a036bb52b5d612ee44fef32837b57bdbdb0bc99dd1ffe47e1394461d944f07d5cf51d4320a4f92dfd771857165ee50ad9ec5314de0e5ecd41549b9c47c478f7b121c76cb79872b40c5d384dcf2ec4b9ef3a8b37a6d21039b019bc5bd66c337bbf636a8d9ce19e381b90c6d54c3aeba645995a83a628632fe926d2db0a828a1b53d31d1ef8acd76ffd6fcdd3184a499b2ea975d5eca118226e774b2481f631bb986f26e9692553d216320a5baff3c2b21e42f850d6c46f08a9ea5225b4a4854e14ff5550a898c972edd916da31fc55e8b76c464bcc333497eaaae21e68a832153787143f4c442bb3aca69730562edf37bf8072cbc4353341dc7ef532bb5487f1fd2bf465c2fc00ad42eba1b085eea8647645c84c990a6a16943d13009c88efd6251ad40d64148a5a718e952badb11f2c4f290153b0709444a047851bcc0626667613858aa4cf9669001d4e75de932c990d41c30eeb493a43b591a2a8cbc5ac8561bd89caebffe48ddc76df2b3324e32b8334b4b0ea6b5f9ee9f50fa9836b578249c7d249986b2bb7030c39c6ec0db86eb77381ba0f466ea521f05544eb8864cb9db4d8e231300ac73c7043f766be088e1073c550f442a6c36e77b14d5621c206b86918511493db2c7ce6ccd0516130280875d95cdc654f92d9149ebdbd9c0fdb9b1e5889191dca5c2c53fd52b14e40fbb0d124dfcd6861e7fd533b4f22430c35d75a8b5437b5bcdd94953d5bb0363bc2ad16b2235f05d7be2b5301861b4615f653fb2eb49cd8f863c66f610ccf78b6f288b6566d8d00f2cb7771c49afea01c4a5ce48258f40b50f25c4aa58bd7b2858dc14ed9ab3fc6ff910d19097a02507e869d79f7ee6b4d771e93a4c3262322826a361e5667e9e946c6c721d8b87023a23f20a078d455e3995c16014c25086975306f9ddbb158f6386d0c9fa8818a650569907fe0395282fb7a035a3e2572af41540628ec7fb54269bae0f8cc1a63993ac8f17a006132937ac153354cfe8842c708a013edbf7977c2c4524ec1d653db7c83fc2593d208b4d54c01a6e8b70706383e8510f3452a324039d478787e48e30ad86ad7ba8d05203a771a08afeb42e4f62a78d0aa6218a7be65c7e6bbf200368450c202675bbc2978c498422d3283702fcd639a46fbe7d06fe20ea98ec9b4028eed7a9df5a3b2b9b49e720fa11ac9ded8dbcbcfaf468e274d2c71517d60df5ea383b8b6b49ca74073417daeca8f68aab4f4cc66c591f9d6630c5ca6a560af12f9a8840b2cbb7b7444b7545d4c85699050f16821f42844ea2839a49c1c192c2ecfec44f4288080ee60388b5a158715b7fe13ab538ecc828cc6b00ca60209ea1f35a3128ff2d87e99d04631c024ff3f47c5befca52bebcd913164b763dfd069dfc511d0735d852aa52fc5d18c15aee40b4a34f77ee0a218765af73d57ebd33f6cd2d5f35ef3257535f97ca9186fdf3d51711a4c3028afd0abe4a8eecb55050c05ebae949121bff5f4d33a4c93b70d53315f8cc59b5e43c10bbc51d937ffeace934ccaebbb235f18b22c9c360bfb3f18f4fd3fbf9e7dc30b13a0b2f1ad5ec45ed613b0355723e7fc4a05e1c2afad2e961b21519a6bd914a17ffe9f957e35e5d67ea008effb1b6169f13a2a7cbdb274d96504825eda79b9bc6d40bb2918f84b2686daadd5eb7ae83395dd84844927f4cbb2bc913b1ea067467f806e5295d417d7933e9c8da242fa19faab5955d0cc252c6d896cc268f6dcc1c560986709789523e187e55e747a81cf66ee48650489e73adf0f34aeab24b57b63133b64790e9f13e975dbb4d7b7322413f15e517b7c5d8281c0d8fde0dda867dff0da747532d378781963954c915a424b6d37dd3bc9dd48d40d8bc281509b37b7b926890e6a0ae9d0b55bb2586e66f89758bdf8c1ee07f106d1d1dbdf004e9159eb0014ae8a442222cd68167a2c82e4458abbbaa098a1a854008c80e0b93c8ebab0cdc77da1ae641b6ce35301c6953d1a4396e2c2b0b856064c03a336f60232d9d448d40a87677667537f1f547d2b73700bb2cacb33c129fe62a67c8531081080c14ed601aa07536f367447f0ba48a7bac1fd1d1c243dc18c880a0252333cd17d070800fa307b3825150d77ee247250057db4f5b48ee22573d3f007539dbf6bf89f92e4821db51609cb5429d72ca5a4dc9b9e967a01235612fd202f42a33abfebc4fe045385677cb824d268f0b85b423826219a9975711a3e361508c0385eec74af249bbd0c32bc0de6ddff20067b41667d8ab29ebc4e153304acd992fb86dd528e9615e3942d73c4dbc530cf0476848ad59518838ec895943c19983e2afc2dc8ee79860fa6a5a69403941da2a0ae3162f4fc617e8bf5dfc3a7317fb24587a1fa6b1dcde1ad7e4ba2d037bfc6950fb55f750b54cf4a9f5c73a6121d9d17893f1422fd60288f92983dae98fda06c2e53166284fd842f412374c0d0e020045cc7a659567c5202fbbc629478061db49d2e0ba883c6b36f09e03ca774e8f0a8e0df90c0a6cdeeffb5680020a8db823bd154487c24dc0c77e968d39b0772ca3e7325254aee346b91d9b795ae8bc3713cbd356b441aced079b1d50524e73b5fcc7a20a2d08e2a122f9853a123958a834108c5dabd152824a44611cc41958923d681de55a2e204c03ed0388b0fb88491c5209aceb0e011924017ae339dd9a60d776c5674644a0b4b570640aef7d26629996c489a00ccb550edee79b420c6156e3ed766ea897e0acb8974c5941e5a8aed193d1ffab763dfbce89e851d74ac17c0152668a1608ab9de146dc12adcbd8c4a1ffccec9cfdc9ef9ca38e699c92f78b6dcfbe803e32a029f32935c8f5814d2a6b642760b3c3b182c0a5801086538aefc20e67603547d8e4d1be57134bcc7c8661c1c51eb438b7201b029b3cba69d2e0d8b4c51169753258614ca589e47e2f72d12e62de623670a59a85365409fb1def7ae0d3b3c734515ff4cb1d7ea139cd660d11d7f9d57c642b9f5540c26922be82742ad00656ca19846dabb50dd216b6cb5c87a5e7af3385c06e495e236ab3efa28cb840b5fccb43496f9bdcfd30605c95e69baa47c96fee380bd714476c400929e8885e1f7bf9b89c182aafb60921fe61ce97f3ee3753b1cc7199ea8c941f8ed8574f690ad90cc4773ea5c6360e3a47b1b3799b13d37790e47a6a901fe4374fcb6474dc4bc4355ec449e71ccea2de7d119650e5dddff44a98d94115704c1d7c6172e583ce1280a1dc6ab56fbd24025ff440cd645ec0ea84dd8ec78591846da64e0ef5b3073e9a3b4019348666263a33d9a3bde62b49a94d755c7383e196f2803fb89da8c863d9fb90c5465b5fab8a5ce9294dd19e4bf39f984092dee7e5efb8c7e41b1ae404425b4426e5d552dcf6dad23f897f67d8948ae0f2f428eebe49435aa28eea0a96828a4eddf9b2a91c16fb037e600ef50799b85ad48cfc3f4ba426595d8895d740ac11112191013680b4f83d4a64e5f9e0ce7c02e0894763df51b42bc9ec8d4e0c57afc5b98522ab782c689b2a50fc5408da25e878b9990003989b2f3878d0e168842c4654ee758f8d0a99e95238fe7c488f8a5da331825ecb043550ff0cbf8e65b0a0f320159a6765f4bc5e0554e52f44507c606653073707f57e5146b7578a676c8876145aea235d5d32483dcbd24ff50879d7e3a7ae13092dc5a1a9524e145de9c3309e924c8962e41cfba3effe5c9c256ccc465566d1b3267a2ef790be06d614d87146a7b61aa452761a89b929df1cbb726656b2228fbcafd7b39704aad8dd0afcfc3d988e1d6cedcc1479156d4c31073814c4044dcca429f665e45213c62958e9bd15f1fb9d69090a237b25827b43b4d7a06672536a594f476c682a6b3cc40a42d9be9597298a861d10b37fc42c8192280e1f17b88d5f57dee5536b16e92f5c13858455a6c960603e81bad2b09a4156cc382d6935e1df96348271b0586a66012ba28842f78b80c97603f8f2eaf6e2278d229d1aa23e86e4cd139d7e6fbe3c18c7bb062c8915615fa731cae1cb3af1f84102e0b47ade5aad2896bd1a17a67553dcc3bef06650f1764f5c028f301e189872ac71b4028896ef559fe127ae10ed3df1c771b6129ad4031acafc5bff7ee16ae25748cc493a785aa075004cb06869580b9baadd2858c9f0897b617d2fe4722a70497fb17a250ffd1d84a211ddc1163ca80d5b2f63f94701131fa3b5e05fc9c8f12a5fe4d9d18d11c0fe3e860986cdaef8fe964bc52051342176f5d78243c14efb35dde7845572cdd0cfafad7a5abf0bd0f607d1b0c4945a5b4d4562601e72e7a6f8127084e27d86b98c0a50aa01365277edc92eafc6a6c7c38ef757aa4938e2040c2bdfb6c6dd44f53fe07630f74e81fd36a7cfb61a5aef8fe76489d2689851f140649f2c8cbe0c7eefaa9bc333bf1e3e95e1563407e8f4868adfbb9660360fb17ff5415f315536d73e58b21d95ceb99b92c21c2b687d534d5af4c656f27169ae581a88ed1a805264617243d656eb69d0f6b232ef9687aaa2ee40e28cb560e32fef3358e031768fa232cdbf818dde455b1edbbc3aed092ce8b164a07e69f672f8fe52c1f1171fc1201ab061ccb674924a37d205ff8e33f33c5aa75865264230154fb0b8db81d038e7b88ba0a05f4ebe4b28ce5bf4f1333ee259d51ce9ab61e710a50a459e54fe8ab04f9f693899675c94ccea0e1dedeb87aa24b19ccbfdb60e02de602c98f915ee343ba952847e537bbbc2a1c2f9315cfa55a8afa4a2c28966900c4e504d157239d4e3527b72f1c4bbe785961b688cecec8e29b26b36148a7b465c0f2738139e2d76f83b28160c6151a239c2fcccdffacb3ac03143a90fcd5bdc38ad645ab24d4a66eac95474830b4924b484a3ae5e6a37843f434d8ed84f3c6cb1bb3d014a43b0415ff8588902094da6eeefa9a9e1b7b5dba4c20dcd9a2640f1dcd2de44d1dc5ebcc9d912c16ba7e84a7aa4755cd52a3a8c2c76bfd0ae1156f983041b3077d8d4784c9767b0ce7e4dcbb02ce901957259a45925ab952279cf07baea487104ee50b3847bb2de0fd819e47bc47e4ee55611aa64057fc8f2525886f4b1c3df9b0fbc85e8bacb23999cbf0c992a255cfa3d37653a032b9655cd4", 0x1000}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'batadv_slave_0\x00', r10}) bind(r3, &(0x7f00000005c0)=@nl=@kern={0x10, 0x0, 0x0, 0x2000000}, 0x80) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], r6, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) setreuid(r1, 0xffffffffffffffff) 14:50:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3}, 0x40) [ 1128.911447][T27490] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1128.916910][T27490] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1128.934734][T27490] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1128.947972][T27490] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1128.964572][T27490] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1128.967407][T27527] print_req_error: 3358 callbacks suppressed [ 1128.967418][T27527] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1128.990273][ T136] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1129.005385][ T136] buffer_io_error: 3320 callbacks suppressed [ 1129.005389][ T136] Buffer I/O error on dev loop5p2, logical block 33008, async page read [ 1129.019872][T27527] blk_update_request: I/O error, dev loop5, sector 264176 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1129.031879][ T177] blk_update_request: I/O error, dev loop5, sector 264176 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1129.034178][T27528] blk_update_request: I/O error, dev loop3, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1129.043222][ T177] Buffer I/O error on dev loop5p2, logical block 33022, async page read [ 1129.055012][ T1920] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1129.064782][ T177] blk_update_request: I/O error, dev loop3, sector 263946 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1129.070706][T27531] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1129.081828][ T177] Buffer I/O error on dev loop3p1, logical block 131968, async page read [ 1129.101709][ T177] blk_update_request: I/O error, dev loop3, sector 263948 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1129.113129][ T177] Buffer I/O error on dev loop3p1, logical block 131969, async page read [ 1129.121660][ T177] blk_update_request: I/O error, dev loop3, sector 263950 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1129.132951][ T177] Buffer I/O error on dev loop3p1, logical block 131970, async page read [ 1129.141540][ T177] blk_update_request: I/O error, dev loop3, sector 263952 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1129.153023][ T177] Buffer I/O error on dev loop3p1, logical block 131971, async page read [ 1129.161597][ T177] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 1129.169619][ T177] Buffer I/O error on dev loop3p1, logical block 132080, async page read [ 1129.178294][ T177] Buffer I/O error on dev loop3p1, logical block 132081, async page read [ 1129.186764][ T177] Buffer I/O error on dev loop3p1, logical block 132082, async page read [ 1129.219943][T27539] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 1129.260194][T27535] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1129.265438][T27535] loop4: partition table partially beyond EOD, truncated [ 1129.283834][T27490] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1129.285288][T27535] loop4: p1 start 10 is beyond EOD, truncated [ 1129.303762][T27535] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1129.312696][T27535] loop4: p3 start 225 is beyond EOD, truncated [ 1129.319266][T27535] loop4: p5 start 10 is beyond EOD, truncated [ 1129.325668][T27535] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1129.400413][T27539] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1129.406968][T27539] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1129.416542][T27539] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1129.428648][T27539] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1129.437044][T27539] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1129.440170][T27490] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1129.449544][T27490] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1129.457350][T27490] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1129.465564][T27490] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1129.478486][T27490] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1129.542817][T27535] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1129.554012][T27535] loop4: partition table partially beyond EOD, truncated [ 1129.561434][T27535] loop4: p1 start 10 is beyond EOD, truncated [ 1129.567725][T27535] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1129.575241][T27535] loop4: p3 start 225 is beyond EOD, truncated [ 1129.581872][T27535] loop4: p5 start 10 is beyond EOD, truncated [ 1129.587952][T27535] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:50:59 executing program 4: syz_read_part_table(0xc00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, 0x0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}]}, 0x40}, 0x1, 0x0, 0x0, 0x20040004}, 0x800) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) r3 = getpgid(0xffffffffffffffff) fcntl$lock(r0, 0x6, &(0x7f0000000040)={0x1, 0x3, 0xef, 0x0, r3}) 14:50:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x300, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:59 executing program 5: syz_read_part_table(0x1200000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:59 executing program 3: syz_read_part_table(0x926000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:50:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) 14:50:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x500, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:50:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x24000, 0x0) 14:50:59 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) setsockopt$inet_tcp_buf(r3, 0x6, 0xe, &(0x7f0000000180)="abc52dc552dc751ff2e1784b36d255103372ea94129f2bb9787def2d631c2fb39a89b00633c6282bee79b790e1343531356b9b531a2adc0b51eb45d7ec62f60975f54e7dd59f784331a2afc2d31966b8bdfb60bbb19c06bc56b018c99f311f73c2a1a9383392", 0x66) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RRENAME(r3, &(0x7f0000000000)={0x7, 0x15, 0x2}, 0x7) setreuid(0x0, r1) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) getresgid(&(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000280)=0x0) lchown(&(0x7f0000000080)='./file0\x00', r5, r6) socket$inet6(0xa, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x600, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], r7, 0xffffffffffffffff, 0x5}, 0x40) 14:50:59 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$key(0xf, 0x3, 0x2) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40040, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e21, @loopback}}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000180)) ioctl$PPPIOCSFLAGS1(r4, 0x40047459, &(0x7f0000000140)=0x80402c3) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:50:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0xde8c3, 0x0) [ 1129.859118][ T1923] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 1129.870484][T27563] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1129.880124][T27563] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1129.902026][T27563] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1129.916068][T27563] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1129.924154][T27563] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1129.934399][T27599] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1129.939851][T27599] loop4: partition table partially beyond EOD, truncated [ 1129.947199][T27599] loop4: p1 start 10 is beyond EOD, truncated [ 1129.953368][T27599] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1129.960846][T27599] loop4: p3 start 225 is beyond EOD, truncated [ 1129.967326][T27599] loop4: p5 start 10 is beyond EOD, truncated [ 1129.974234][T27599] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1129.981918][T27602] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1129.990497][T27602] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1130.000408][T27602] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1130.008638][T27602] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1130.016172][T27602] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:51:00 executing program 4: syz_read_part_table(0xd00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x600, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat(r5, &(0x7f0000000000)='./file0\x00', 0x40080, 0x0) accept$inet(r6, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) 14:51:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xa122) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1130.182313][T27563] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1130.191473][T27563] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1130.206379][T27563] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1130.215365][T27563] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1130.222734][T27563] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:51:00 executing program 5: syz_read_part_table(0x1400000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1130.231286][T27602] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1130.237835][T27602] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1130.245339][T27602] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1130.254481][T27602] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1130.262000][T27602] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:51:00 executing program 3: syz_read_part_table(0xa00000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x700, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ffb000/0x4000)=nil) 14:51:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) geteuid() r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r6}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'batadv_slave_0\x00', r6}) syz_extract_tcp_res$synack(&(0x7f0000000100), 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000080)={0x0, 'macsec0\x00', {0x3}, 0x3}) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) fcntl$dupfd(r8, 0x406, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r9) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000000)={'team0\x00'}) r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x490000, 0x0) r11 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getpeername$packet(r13, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r11, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r14}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'batadv_slave_0\x00', r14}) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], r14, r10, 0xfffffffb, 0x0, 0x4}, 0x40) [ 1130.320260][T27633] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1130.325560][T27633] loop4: partition table partially beyond EOD, truncated [ 1130.333073][T27633] loop4: p1 start 10 is beyond EOD, truncated [ 1130.353841][T27633] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1130.364302][T27633] loop4: p3 start 225 is beyond EOD, truncated 14:51:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x900, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000040)={0x0, 0x1ff, 0x5a46b0d3}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:51:00 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xfffffffffffffe52) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1130.376099][T27633] loop4: p5 start 10 is beyond EOD, truncated [ 1130.383597][T27633] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1130.492218][T27645] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1130.497838][T27645] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1130.505846][T27645] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1130.513738][T27643] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1130.521934][T27643] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1130.531128][T27645] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1130.535592][T27643] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1130.545975][T27645] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1130.549281][T27643] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1130.560389][T27643] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1130.600351][T27633] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1130.605702][T27633] loop4: partition table partially beyond EOD, truncated [ 1130.613019][T27633] loop4: p1 start 10 is beyond EOD, truncated [ 1130.619160][T27633] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1130.626761][T27633] loop4: p3 start 225 is beyond EOD, truncated [ 1130.633482][T27633] loop4: p5 start 10 is beyond EOD, truncated [ 1130.639562][T27633] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:51:00 executing program 4: syz_read_part_table(0xe00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) getsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:51:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0xa00, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:00 executing program 1: setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)={@local, @multicast2, 0x1, 0x1, [@empty]}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x4) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1130.793226][T27643] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1130.805172][T27643] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1130.813695][T27643] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1130.826384][T27643] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1130.837021][T27643] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:51:00 executing program 5: syz_read_part_table(0x1c00000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:00 executing program 3: syz_read_part_table(0xb00000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:00 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x38, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:51:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x200803, 0x0) 14:51:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0xb00, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0xc00, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:00 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) setreuid(0x0, r2) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:51:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x84, 0x2, 0x8, 0x5, 0x0, 0x0, {0x5}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_SHUTDOWN_RECD={0x8}, @CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0x6129}, @CTA_TIMEOUT_SCTP_CLOSED={0x8, 0x1, 0x1, 0x0, 0xfff}, @CTA_TIMEOUT_SCTP_SHUTDOWN_RECD={0x8}, @CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xa00}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x20}, @CTA_TIMEOUT_L4PROTO={0x3, 0x3, 0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x5}]}, 0x84}, 0x1, 0x0, 0x0, 0x4}, 0x20008800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1130.978539][T27695] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1131.003398][T27695] loop4: partition table partially beyond EOD, truncated [ 1131.020351][T27695] loop4: p1 start 10 is beyond EOD, truncated [ 1131.026888][T27695] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1131.034633][T27695] loop4: p3 start 225 is beyond EOD, truncated [ 1131.041961][T27695] loop4: p5 start 10 is beyond EOD, truncated [ 1131.049178][T27695] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1131.053102][T27713] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1131.075703][T27713] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1131.083236][T27713] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1131.091441][T27713] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1131.098665][T27713] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:51:01 executing program 4: syz_read_part_table(0x1100, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:51:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) getresgid(&(0x7f0000000040), &(0x7f0000000100)=0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000080)={'vxcan0\x00'}) fchown(r2, r4, r5) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:51:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0xd00, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1131.217761][T27729] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1131.226243][T27713] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1131.245187][T27729] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1131.277058][T27729] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1131.293258][T27729] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1131.300835][T27713] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 1131.309345][T27729] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1131.405495][T27747] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1131.410864][T27747] loop4: partition table partially beyond EOD, truncated [ 1131.418089][T27747] loop4: p1 start 10 is beyond EOD, truncated [ 1131.424284][T27747] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1131.433862][T27747] loop4: p3 start 225 is beyond EOD, truncated [ 1131.440537][T27747] loop4: p5 start 10 is beyond EOD, truncated [ 1131.447915][T27747] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:51:01 executing program 5: syz_read_part_table(0x1f00000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000100)={'filter\x00', 0xca, "33bafe03264a30c85c8cf8485c9ee480e995942a333807a771e83929e310ad8841a5d1bf518682942fffa0184e1e59f8154a5f585c602e61ddb76eb15b938e2d9fb532ba5446abc056c595eaf429670f325d9ed43e95fc2df168055a1e53a8bec6c021099bf2f83c5e944b0e598d4707a7045b12232ea323facb101478e8ed1122ac5832d89aa873fffb8fb8d547ff4851cf35d6726c76abce74404dd93bdab8cbe8d25b7adf4e128f84b7318d501816a27b9d13b69c13e99953629c7fc64c79a53b81c92421c2adfede"}, &(0x7f0000000040)=0xee) 14:51:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0xe00, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:51:01 executing program 3: syz_read_part_table(0xc00000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1131.531420][T27729] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1131.536897][T27729] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1131.544463][T27729] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1131.554448][T27729] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1131.562117][T27729] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1131.570390][T27747] loop4: p1 p2 p3 < > p4 < p5 p6 > 14:51:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x1100, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1131.577307][T27747] loop4: partition table partially beyond EOD, truncated [ 1131.588458][T27747] loop4: p1 start 10 is beyond EOD, truncated [ 1131.597408][T27747] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1131.611223][T27747] loop4: p3 start 225 is beyond EOD, truncated 14:51:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in=@multicast2}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f0000000000)=0xe8) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r7) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r9) getuid() r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r11) setreuid(r11, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:51:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREAD(r3, &(0x7f0000000040)={0x58, 0x75, 0x2, {0x4d, "8e4742e67105e4f2f7731567a7b11257dc366e7b0496010324317fedcd16db3ebd0c673eca7beb5e41c9c4929f1baeb7a2526d337a4bcf906e1c60de9de90bc9c3630c811857a86af41492f499"}}, 0x58) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1131.635974][T27747] loop4: p5 start 10 is beyond EOD, truncated [ 1131.651796][T27778] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1131.654606][T27747] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1131.680497][T27778] loop3: p1 size 11290111 extends beyond EOD, truncated 14:51:01 executing program 4: syz_read_part_table(0x1200, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x1200, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:01 executing program 0: r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)={0x27, 0x0, 0xffffffff}) ptrace(0x4206, r1) ptrace(0x420c, r1) sched_setattr(r1, &(0x7f0000000740)={0x38, 0x1, 0x4, 0xe0, 0x1, 0x4, 0xfd6f, 0x2e8, 0xc210, 0x8}, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000700)={0x8a0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCGNPMODE(r3, 0xc008744c, &(0x7f0000000780)={0xc021, 0x1}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r7) readv(r6, &(0x7f0000000500)=[{&(0x7f0000000100)=""/204, 0xcc}, {&(0x7f0000000000)=""/166, 0xa6}, {&(0x7f0000000200)=""/110, 0x6e}, {&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/119, 0x77}, {&(0x7f0000000340)=""/50, 0x32}, {&(0x7f0000000380)=""/182, 0xb6}, {&(0x7f0000000440)=""/56, 0x38}, {&(0x7f0000000480)=""/14, 0xe}, {&(0x7f00000004c0)=""/15, 0xf}], 0xa) prctl$PR_SET_FPEXC(0xc, 0x80000) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000005c0)=""/214, 0xd6, 0x2000, &(0x7f00000006c0)={0xa, 0x4e23, 0x400, @ipv4={[], [], @multicast2}, 0x10000}, 0x1c) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:51:01 executing program 5: syz_read_part_table(0x2000000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 14:51:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x400, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x34, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x34}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, r4, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x4c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4010}, 0x8000) [ 1131.732731][T27778] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1131.744115][T27778] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1131.761011][T27778] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:51:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x2500, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x80000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) fcntl$dupfd(r5, 0x0, r5) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000040)) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1131.910035][T27810] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1131.923182][T27810] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1131.931040][T27810] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1131.939205][T27810] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1131.946810][T27810] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1131.990405][T27825] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1132.002988][T27825] loop4: partition table partially beyond EOD, truncated [ 1132.014005][T27825] loop4: p1 start 10 is beyond EOD, truncated [ 1132.020440][T27825] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1132.030170][T27825] loop4: p3 start 225 is beyond EOD, truncated [ 1132.036694][T27825] loop4: p5 start 10 is beyond EOD, truncated [ 1132.043520][T27825] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:51:02 executing program 3: syz_read_part_table(0xd00000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x2800, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:02 executing program 4: syz_read_part_table(0x1400, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000640)='nl80211\x00') sendmsg$NL80211_CMD_DEL_STATION(r1, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000740)={&(0x7f0000000680)={0x98, r2, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x24}, @NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x2d4}, @NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x762}, @NL80211_ATTR_STA_FLAGS={0x18, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}, @NL80211_STA_FLAG_MFP={0x4}, @NL80211_STA_FLAG_MFP={0x4}, @NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}, @NL80211_STA_FLAG_AUTHORIZED={0x4}]}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x3c}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x71b}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_STA_WME={0x3c, 0x81, [@NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x81}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x8}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x9}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x1f}, @NL80211_STA_WME_UAPSD_QUEUES={0x5}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x4}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x4}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x20044000}, 0x40) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/policy\x00', 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000005c0)={&(0x7f00000002c0)="01a6ad9b17f2901eeac0c307567fe8db883a7704b52dce1efb0014d1efa8a35f32a823907f5016f9829d79674cb212d75fd7e8065500319765a4e713ce3336474ee779cafc41efd973d564e5d3ae4b", &(0x7f0000000340)=""/187, &(0x7f0000000400)="28d8606869f5766737a206315635d3a061e0d50c36c99da37baa40341fcb838c30f16917ccffc5f497da884421e571e205e6d7c7806e5613a5e002981b701bf87f356ce73e2b8ef1fa9cd6d0059ea7db897c0161564dfd7376670eff52cf620dac1b4623d1c02baa06fa267be30a8a74d1158088059953e9aeb8ac5d6e4127ce474206248778ff047106adda2c8f4d6dc780d1640e905172cd68372527499d35ee1e347dd303dc01bc152cd1574cf025c349adb74ae6154d33d1ff34fa3516655ed7fac10cb63be68f7b9123918f22c437c71b5fa8d9745729e1ae47b4f2747c46b197be19f7e9ad9200ec9d49770c6a3bccd56f9bd0", &(0x7f0000000500)="94fddb7f952ed1359011a347ecf5063eeddafde60a60e3440244f73120685e9840856b62098ffdf675b580d53f44127fc4b68ce4b2297e9e9d98ac92bbaeeb88dae8741c1d5db75f0cd972388808323d307695b4801524a71694e5903d36a04e09f1934c9d85aae1e22075316a218c6e1039", 0x8, r3}, 0x38) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r7, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x60000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="000328bd7005003500700000000800310405000078b6b93001a988fde2"], 0x2c}, 0x1, 0x0, 0x0, 0x4004000}, 0x80) r9 = socket$pptp(0x18, 0x1, 0x2) ioctl$FS_IOC_GETFSLABEL(r9, 0x81009431, &(0x7f0000000040)) [ 1132.120691][T27810] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1132.126499][T27810] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1132.135204][T27810] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1132.143284][T27810] loop5: p5 size 11290111 extends beyond EOD, truncated 14:51:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x4000, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1132.165856][T27810] loop5: p6 size 1073741824 extends beyond EOD, truncated 14:51:02 executing program 5: syz_read_part_table(0x2301000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1132.351747][T27853] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1132.357387][T27853] loop4: partition table partially beyond EOD, truncated [ 1132.365135][T27853] loop4: p1 start 10 is beyond EOD, truncated [ 1132.371233][T27853] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1132.379154][T27853] loop4: p3 start 225 is beyond EOD, truncated [ 1132.385800][T27853] loop4: p5 start 10 is beyond EOD, truncated [ 1132.391911][T27853] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1132.406321][T27859] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1132.411689][T27859] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1132.435406][T27859] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1132.448325][T27859] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1132.456108][T27859] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 1132.490319][T27876] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1132.496391][T27853] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 1132.505894][T27876] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1132.515359][T27876] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1132.526428][T27876] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1132.534672][T27876] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1132.590905][T27853] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1132.596274][T27853] loop4: partition table partially beyond EOD, truncated [ 1132.603713][T27853] loop4: p1 start 10 is beyond EOD, truncated [ 1132.610300][T27853] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1132.617876][T27853] loop4: p3 start 225 is beyond EOD, truncated [ 1132.628003][T27853] loop4: p5 start 10 is beyond EOD, truncated [ 1132.636324][T27853] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:51:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:51:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4(r3, &(0x7f0000000040)=@isdn, &(0x7f00000000c0)=0x80, 0xce9b83811b86164) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000100)="f27a5c0509d73ef1b2ad82513b6e3eca", 0x10) 14:51:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x4300, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:04 executing program 3: syz_read_part_table(0xe00000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:04 executing program 5: syz_read_part_table(0x2403000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:04 executing program 4: syz_read_part_table(0x1401, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x4800, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r6) fcntl$getownex(r6, 0x10, &(0x7f00000003c0)={0x0, 0x0}) clone3(&(0x7f0000000440)={0x88040100, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0x31}, &(0x7f0000000180)=""/26, 0x1a, &(0x7f0000000280)=""/235, &(0x7f0000000400)=[r4, r5, 0x0, r7], 0x4}, 0x50) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x66f, 0x6a, 0x4, 0x3}, {0x7f, 0x9, 0xc2, 0x7}, {0xfffc, 0x7d, 0x5, 0x8}]}) 14:51:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$AUDIT_TRIM(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x1, 0x70bd2d, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x14004040}, 0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:51:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x4c00, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000180)=0x7) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x5c5100, 0x0) write$FUSE_INIT(r4, &(0x7f0000000040)={0x50, 0xfffffffffffffff5, 0x5, {0x7, 0x1f, 0xf9, 0x0, 0x40, 0x400, 0x20, 0x2}}, 0x50) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x8, 0x0) setreuid(0x0, r3) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r5 = open(&(0x7f0000000100)='./file0\x00', 0x18080, 0x103) setsockopt$IP_VS_SO_SET_FLUSH(r5, 0x0, 0x485, 0x0, 0x0) [ 1134.820607][T28331] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1134.826395][T28331] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1134.843396][T28331] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1134.857969][T28331] loop5: p5 size 11290111 extends beyond EOD, truncated 14:51:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000000)=0xfffffffc) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000043c0)='/selinux/policy\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x61, &(0x7f0000004400)={'filter\x00', 0x4}, 0x68) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:51:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fspick(r4, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000040)={{0x2, 0x0, @reserved="82e36831c66209461ca275638df9892dfc1904fb9a01ab127d7b446d959b7cfe"}}) prctl$PR_SET_PTRACER(0x59616d61, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1134.867667][T28331] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1134.890448][T28333] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1134.899612][T28333] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1134.910816][T28333] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1134.942239][T28333] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1134.961169][T28362] print_req_error: 2725 callbacks suppressed [ 1134.961181][T28362] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 14:51:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPSET_CMD_PROTOCOL(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x6, 0x100, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004050}, 0x0) setreuid(0x0, r1) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000140)={0x2, {0x2, 0x7, 0x8001, 0xa74a, 0x8, 0xf}}) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) [ 1134.966521][T28359] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1134.972074][T28360] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1134.984795][T28336] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1134.999053][T28331] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1135.016322][T28336] loop4: partition table partially beyond EOD, truncated [ 1135.029668][T28333] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:51:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x6800, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) [ 1135.034615][ T136] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1135.048666][ T136] buffer_io_error: 2695 callbacks suppressed [ 1135.048674][ T136] Buffer I/O error on dev loop5p2, logical block 33008, async page read [ 1135.050267][T28361] blk_update_request: I/O error, dev loop5, sector 225 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1135.054919][T28359] blk_update_request: I/O error, dev loop5, sector 264176 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1135.074586][T28363] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1135.089553][ T136] blk_update_request: I/O error, dev loop5, sector 264176 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1135.109801][ T136] Buffer I/O error on dev loop5p2, logical block 33022, async page read [ 1135.116274][T28336] loop4: p1 start 10 is beyond EOD, truncated [ 1135.120053][T28359] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1135.132099][ T177] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1135.142460][T28336] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1135.147380][ T177] Buffer I/O error on dev loop5p5, logical block 131968, async page read [ 1135.155754][T28336] loop4: p3 start 225 is beyond EOD, truncated [ 1135.162960][ T177] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 1135.170808][T28336] loop4: p5 start 10 is beyond EOD, truncated [ 1135.178651][ T177] Buffer I/O error on dev loop5p4, logical block 0, async page read 14:51:05 executing program 3: syz_read_part_table(0x1000000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1135.184736][T28336] loop4: p6 size 1073741824 extends beyond EOD, truncated [ 1135.192687][ T177] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 1135.207837][ T177] Buffer I/O error on dev loop5p1, logical block 131968, async page read [ 1135.216412][ T177] Buffer I/O error on dev loop5p1, logical block 131969, async page read [ 1135.224931][ T177] Buffer I/O error on dev loop5p5, logical block 131969, async page read [ 1135.233499][ T177] Buffer I/O error on dev loop5p1, logical block 131970, async page read 14:51:05 executing program 5: syz_read_part_table(0x2500000000000000, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) [ 1135.336499][T28331] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 1135.390381][T28336] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1135.400449][T28336] loop4: partition table partially beyond EOD, truncated [ 1135.407652][T28336] loop4: p1 start 10 is beyond EOD, truncated [ 1135.415443][T28336] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1135.423716][T28336] loop4: p3 start 225 is beyond EOD, truncated [ 1135.430440][T28336] loop4: p5 start 10 is beyond EOD, truncated [ 1135.436528][T28336] loop4: p6 size 1073741824 extends beyond EOD, truncated 14:51:05 executing program 4: syz_read_part_table(0x1f00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0000ffffff8200080000000000000000400000000005000000e100000088770072003007000f00000000000000008000da55aa", 0x40, 0x1c0}]) 14:51:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setreuid(0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000828bd7000fbdbdf250d000000140005800800010075447000080090cf6a010065746800"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) 14:51:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x6c00, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$unix(r0, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) 14:51:05 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) setreuid(0x0, r4) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:51:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xcc, 0x2, 0x2, 0x201, 0x0, 0x0, {0xc, 0x0, 0x1}, [@CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_ZONE={0x6}, @CTA_EXPECT_TUPLE={0x4c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}]}, @CTA_EXPECT_TUPLE={0x44, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @remote}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0xb8}}]}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'sane-20000\x00'}]}, 0xcc}}, 0x4000000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000002, 0x8010, r2, 0x8efe7000) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x4001, 0x0) [ 1135.462111][T28393] loop3: p1 p2 p3 < > p4 < p5 p6 > [ 1135.469627][T28393] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1135.477081][T28393] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1135.487014][T28393] loop3: p5 size 11290111 extends beyond EOD, truncated [ 1135.494425][T28393] loop3: p6 size 1073741824 extends beyond EOD, truncated 14:51:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x7400, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/217, 0x40, 0xd9, 0x1}, 0x20) 14:51:05 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xffffffffffffff70) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r4, 0x80081272, &(0x7f00000001c0)) setreuid(0x0, r2) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)={0xa, 0x8000000, 0x0, 0x8, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000200)=0x0) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x40000, 0x0) sched_setscheduler(r7, 0x6, &(0x7f0000000280)=0x5) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000000c0)) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r8, 0x29, 0x30, &(0x7f0000000380)={0x1000, {{0xa, 0x4e24, 0x7f, @mcast2, 0x10001}}, 0x1, 0x1, [{{0xa, 0x4e22, 0x1, @local, 0x3f}}]}, 0x110) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt(r6, 0x3, 0xfffffffb, &(0x7f0000000100)=""/137, &(0x7f0000000080)=0x89) 14:51:05 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 14:51:05 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0xc, @remote, 0x4e21, 0x3, 'rr\x00', 0x38, 0x6, 0x21}, 0x2c) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "abc2f7265ddf6069", "55d391e30defcf0633c99d33b41c065a", "4a4cdbe5", "d7ab12a799271990"}, 0x28) setreuid(0x0, r1) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r4 = socket$nl_generic(0x10, 0x3, 0x10) fadvise64(r4, 0x9, 0x3, 0x3) [ 1135.531430][T28391] loop5: p1 p2 p3 < > p4 < p5 p6 > [ 1135.541357][T28391] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1135.551756][T28391] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1135.559869][T28391] loop5: p5 size 11290111 extends beyond EOD, truncated [ 1135.568176][T28391] loop5: p6 size 1073741824 extends beyond EOD, truncated [ 1135.645861][ T22] audit: type=1400 audit(1582555865.614:72): avc: denied { map } for pid=28425 comm="syz-executor.1" path="socket:[432318]" dev="sockfs" ino=432318 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1135.693316][ T22] audit: type=1400 audit(1582555865.614:73): avc: denied { read } for pid=28425 comm="syz-executor.1" path="socket:[432318]" dev="sockfs" ino=432318 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1135.723346][ T22] audit: type=1400 audit(1582555865.614:74): avc: denied { map } for pid=28424 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1135.752861][T28430] audit: audit_backlog=10 > audit_backlog_limit=9 [ 1135.760508][ T22] audit: type=1400 audit(1582555865.694:75): avc: denied { watch } for pid=4702 comm="udevd" path="/dev/loop3p2" dev="devtmpfs" ino=432333 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 1135.786065][T28434] audit: audit_backlog=10 > audit_backlog_limit=9 [ 1135.786071][T28434] audit: audit_lost=1 audit_rate_limit=2147483648 audit_backlog_limit=9 [ 1135.786076][T28434] Kernel panic - not syncing: audit: backlog limit exceeded [ 1135.786084][T28434] CPU: 0 PID: 28434 Comm: blkid Not tainted 5.4.21-syzkaller-00756-ge12432318607 #0 [ 1135.786088][T28434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1135.786091][T28434] Call Trace: [ 1135.786107][T28434] dump_stack+0x1b0/0x228 [ 1135.786116][T28434] ? devkmsg_release+0x127/0x127 [ 1135.786129][T28434] ? show_regs_print_info+0x18/0x18 [ 1135.794974][T28412] loop4: p1 p2 p3 < > p4 < p5 p6 > [ 1135.800926][T28434] ? _raw_spin_trylock+0xc6/0x190 [ 1135.800935][T28434] panic+0x26c/0x719 [ 1135.800944][T28434] ? audit_log_lost+0x114/0x1e0 [ 1135.800950][T28434] ? nmi_panic+0x97/0x97 [ 1135.800963][T28434] ? devkmsg_release+0x127/0x127 [ 1135.808610][T28430] audit: audit_lost=2 audit_rate_limit=2147483648 audit_backlog_limit=9 [ 1135.817945][T28434] ? __do_execve_file+0x12a2/0x1c00 [ 1135.817953][T28434] audit_log_lost+0x1d7/0x1e0 [ 1135.817961][T28434] audit_log_start+0x55b/0x9a0 [ 1135.817968][T28434] ? audit_serial+0x30/0x30 [ 1135.817975][T28434] ? __kasan_check_write+0x14/0x20 [ 1135.817985][T28434] ? __kasan_check_read+0x11/0x20 [ 1135.828740][ T22] audit: type=1400 audit(1582555865.694:76): avc: denied { map } for pid=28431 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1135.831474][T28434] ? slow_avc_audit+0x3c0/0x3c0 [ 1135.831482][T28434] common_lsm_audit+0xd9/0x17b0 [ 1135.831489][T28434] ? avc_audit_pre_callback+0x280/0x280 [ 1135.831499][T28434] ? avc_update_node+0x390/0xe40 [ 1135.837543][T28412] loop4: partition table partially beyond EOD, truncated [ 1135.841779][T28434] ? ipv6_skb_to_auditdata+0xdb0/0xdb0 [ 1135.841787][T28434] ? avc_update_node+0x311/0xe40 [ 1135.841796][T28434] ? __rcu_read_lock+0x50/0x50 [ 1135.841804][T28434] slow_avc_audit+0x23b/0x3c0 [ 1135.841811][T28434] ? avc_get_hash_stats+0x1c0/0x1c0 [ 1135.841822][T28434] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 1135.847544][ T22] audit: type=1400 audit(1582555865.694:77): avc: denied { map } for pid=28431 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1135.852623][T28434] ? avc_denied+0x1b0/0x1b0 [ 1135.852631][T28434] avc_has_perm+0x1f0/0x260 [ 1135.852639][T28434] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 1135.852651][T28434] ? __kasan_check_write+0x14/0x20 [ 1135.858229][T28412] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1135.861623][T28434] ? up_write+0xa1/0x190 [ 1135.861632][T28434] selinux_mmap_file+0x20b/0x360 [ 1135.861639][T28434] ? selinux_file_ioctl+0x920/0x920 [ 1135.861647][T28434] ? __kasan_check_write+0x14/0x20 [ 1135.861652][T28434] ? up_write+0xa1/0x190 [ 1135.861659][T28434] ? selinux_file_ioctl+0x920/0x920 [ 1135.861672][T28434] security_mmap_file+0x129/0x1b0 [ 1135.872616][T28412] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1135.875769][T28434] vm_mmap_pgoff+0x115/0x230 [ 1135.875776][T28434] ? account_locked_vm+0x190/0x190 [ 1135.875789][T28434] ? copy_strings+0x900/0x900 [ 1136.110860][T28434] vm_mmap+0x8d/0xb0 [ 1136.114735][T28434] elf_map+0x1b8/0x310 [ 1136.118778][T28434] load_elf_binary+0x1017/0x3720 [ 1136.123692][T28434] ? _raw_read_unlock+0x12/0x30 [ 1136.128517][T28434] ? load_elf_binary+0x801/0x3720 [ 1136.133528][T28434] ? bm_evict_inode+0xd0/0xd0 [ 1136.138197][T28434] ? load_script+0x970/0x970 [ 1136.142782][T28434] search_binary_handler+0x190/0x5e0 [ 1136.148065][T28434] __do_execve_file+0x12a2/0x1c00 [ 1136.153071][T28434] ? do_execve_file+0x40/0x40 [ 1136.157739][T28434] ? getname_flags+0x214/0x640 [ 1136.162518][T28434] __x64_sys_execve+0x94/0xb0 [ 1136.167190][T28434] do_syscall_64+0xc0/0x100 [ 1136.171677][T28434] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1136.177722][T28434] RIP: 0033:0x7fb31efba207 [ 1136.182132][T28434] Code: Bad RIP value. [ 1136.186184][T28434] RSP: 002b:00007ffdaeadd938 EFLAGS: 00000202 ORIG_RAX: 000000000000003b [ 1136.194580][T28434] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007fb31efba207 [ 1136.202531][T28434] RDX: 0000000000b93280 RSI: 00007ffdaeadda30 RDI: 00007ffdaeadea40 [ 1136.210577][T28434] RBP: 0000000000625500 R08: 000000000000125e R09: 000000000000125e [ 1136.218544][T28434] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000b93280 [ 1136.226505][T28434] R13: 0000000000000007 R14: 0000000000af8030 R15: 0000000000000005 [ 1137.348738][T28434] Shutting down cpus with NMI [ 1137.354149][T28434] Kernel Offset: disabled [ 1137.358468][T28434] Rebooting in 86400 seconds..