40)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1f, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="d6cf7634315a49fff420214c89294b2dfa6aec056d77b4eb7ba0f29d", 0x1c, 0xbc91}, {&(0x7f0000000140)="c6fa913d803c7643f4e4ac26ca5d4cbf3c7d6c98b14702e766e52436cc3651035a631fab2ef8e9598c54332e7b7cc4c66a2d18ffdbcabeaaf180e6aead91dfe548f345113b06acb08d855492a2de9126cde978dde1e4eb287c0af7cf78578919eca1123c9ee22a0f6d0ab01ce6453e57f9ca9b4da51756a166c9673b0b0df706dc93bf61955c50c4376806c600320f2539150ffbccc8a5d22de46eda14d207a7587a287f5744247ba4bb67f1d4224db34be2ac397c8e8ebd6f6f4549a36f5fbc5a4371162ab06862ddd61deac9dea2322338bd69cced37166a", 0xd9, 0x9}, {&(0x7f0000000240)="ce74854a3182346f1e928e1a00147a66b5cd9fc56e39cfe903b1308f152671f2", 0x20, 0x2}, {&(0x7f0000000280)="de328972901b6fda4668ec425826866b2932c3f1eb354eb5bf43426fed94b4e9deaf267b3df0dc3e455b446cd3c65948dd024b3a86e28c81c5d2be32c313f91bd380607bfd081b7e460920768df8cc7f796a81012644ac0a9cbb034841f88296bd80b5f16b3223ada9e8058c4bbd623fbe92ff73aafb6cbeb5a438742f339017d3c2edd85f05bedb6cfa6d316adee774e58ab84996806698e091329432a032a961fc712a1a3f3e7336782b49edd06ec2cb51bd4ec6", 0xb5, 0x80}, {&(0x7f0000000340)="0e209324402db58b62a2d4e89b16620fd684fe50585a365045d527d7f40130b5272081bccbe3af2e746fd343db2e3d68c09ebb7759784d55f8ec4fcc318ed8bc280c0be61433f99baece247df41d993f23fd746dadb393fd0e28d40f0da761f2404dc077195f0ce2fd73d21f46f63162690306b57f9db06e4a263e3a7b66b95df0a576d76c3740f45a416c4172b1cf310a569b43edfa16645bf545419a5ef6ca6f0f735e16a8cc84916b4719279bfa88fa69fca3a5ebbea28427080d08b1ba43a6bccb13", 0xc4}], 0x10000, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 358.491591][T29835] loop4: p1[EZD] p2 p3 p4 [ 358.496136][T29835] loop4: partition table partially beyond EOD, truncated [ 358.501381][T29831] REISERFS warning (device loop1): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 358.501381][T29831] [ 358.504091][T29835] loop4: p1 start 4098 is beyond EOD, truncated [ 358.524827][T29835] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 358.532908][T29835] loop4: p3 start 225 is beyond EOD, truncated [ 358.539423][T29835] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 358.711581][T29806] loop5: p1[EZD] p2 p3 p4 [ 358.716114][T29806] loop5: partition table partially beyond EOD, truncated [ 358.723468][T29806] loop5: p1 start 4098 is beyond EOD, truncated [ 358.729755][T29806] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 358.737743][T29806] loop5: p3 start 225 is beyond EOD, truncated [ 358.744826][T29806] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x16b7a, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:05 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1f, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="d6cf7634315a49fff420214c89294b2dfa6aec056d77b4eb7ba0f29d", 0x1c, 0xbc91}, {&(0x7f0000000140)="c6fa913d803c7643f4e4ac26ca5d4cbf3c7d6c98b14702e766e52436cc3651035a631fab2ef8e9598c54332e7b7cc4c66a2d18ffdbcabeaaf180e6aead91dfe548f345113b06acb08d855492a2de9126cde978dde1e4eb287c0af7cf78578919eca1123c9ee22a0f6d0ab01ce6453e57f9ca9b4da51756a166c9673b0b0df706dc93bf61955c50c4376806c600320f2539150ffbccc8a5d22de46eda14d207a7587a287f5744247ba4bb67f1d4224db34be2ac397c8e8ebd6f6f4549a36f5fbc5a4371162ab06862ddd61deac9dea2322338bd69cced37166a", 0xd9, 0x9}, {&(0x7f0000000240)="ce74854a3182346f1e928e1a00147a66b5cd9fc56e39cfe903b1308f152671f2", 0x20, 0x2}, {&(0x7f0000000280)="de328972901b6fda4668ec425826866b2932c3f1eb354eb5bf43426fed94b4e9deaf267b3df0dc3e455b446cd3c65948dd024b3a86e28c81c5d2be32c313f91bd380607bfd081b7e460920768df8cc7f796a81012644ac0a9cbb034841f88296bd80b5f16b3223ada9e8058c4bbd623fbe92ff73aafb6cbeb5a438742f339017d3c2edd85f05bedb6cfa6d316adee774e58ab84996806698e091329432a032a961fc712a1a3f3e7336782b49edd06ec2cb51bd4ec6", 0xb5, 0x80}, {&(0x7f0000000340)="0e209324402db58b62a2d4e89b16620fd684fe50585a365045d527d7f40130b5272081bccbe3af2e746fd343db2e3d68c09ebb7759784d55f8ec4fcc318ed8bc280c0be61433f99baece247df41d993f23fd746dadb393fd0e28d40f0da761f2404dc077195f0ce2fd73d21f46f63162690306b57f9db06e4a263e3a7b66b95df0a576d76c3740f45a416c4172b1cf310a569b43edfa16645bf545419a5ef6ca6f0f735e16a8cc84916b4719279bfa88fa69fca3a5ebbea28427080d08b1ba43a6bccb13", 0xc4}], 0x10000, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr}) 04:14:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x28, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61018fdd9c40f7bae59f1438d4b82884bcb4218c"}}) 04:14:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1f, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="d6cf7634315a49fff420214c89294b2dfa6aec056d77b4eb7ba0f29d", 0x1c, 0xbc91}, {&(0x7f0000000140)="c6fa913d803c7643f4e4ac26ca5d4cbf3c7d6c98b14702e766e52436cc3651035a631fab2ef8e9598c54332e7b7cc4c66a2d18ffdbcabeaaf180e6aead91dfe548f345113b06acb08d855492a2de9126cde978dde1e4eb287c0af7cf78578919eca1123c9ee22a0f6d0ab01ce6453e57f9ca9b4da51756a166c9673b0b0df706dc93bf61955c50c4376806c600320f2539150ffbccc8a5d22de46eda14d207a7587a287f5744247ba4bb67f1d4224db34be2ac397c8e8ebd6f6f4549a36f5fbc5a4371162ab06862ddd61deac9dea2322338bd69cced37166a", 0xd9, 0x9}, {&(0x7f0000000240)="ce74854a3182346f1e928e1a00147a66b5cd9fc56e39cfe903b1308f152671f2", 0x20, 0x2}, {&(0x7f0000000280)="de328972901b6fda4668ec425826866b2932c3f1eb354eb5bf43426fed94b4e9deaf267b3df0dc3e455b446cd3c65948dd024b3a86e28c81c5d2be32c313f91bd380607bfd081b7e460920768df8cc7f796a81012644ac0a9cbb034841f88296bd80b5f16b3223ada9e8058c4bbd623fbe92ff73aafb6cbeb5a438742f339017d3c2edd85f05bedb6cfa6d316adee774e58ab84996806698e091329432a032a961fc712a1a3f3e7336782b49edd06ec2cb51bd4ec6", 0xb5, 0x80}, {&(0x7f0000000340)="0e209324402db58b62a2d4e89b16620fd684fe50585a365045d527d7f40130b5272081bccbe3af2e746fd343db2e3d68c09ebb7759784d55f8ec4fcc318ed8bc280c0be61433f99baece247df41d993f23fd746dadb393fd0e28d40f0da761f2404dc077195f0ce2fd73d21f46f63162690306b57f9db06e4a263e3a7b66b95df0a576d76c3740f45a416c4172b1cf310a569b43edfa16645bf545419a5ef6ca6f0f735e16a8cc84916b4719279bfa88fa69fca3a5ebbea28427080d08b1ba43a6bccb13", 0xc4}], 0x10000, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x0, 0x0) 04:14:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x2, "e46b"}}) 04:14:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x4e, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61018fdd9c40f7bae59f1438d4b82884bcb4218cc6b254882965447d29899e0516ea467eb8c27f619460e0a1da63b30176cc0c26e9f748ef4a2b"}}) 04:14:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x0, 0x0) [ 358.912314][T29865] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 358.912314][T29865] 04:14:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x1, "e4"}}) 04:14:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x1, "e4"}}) 04:14:06 executing program 2: syz_mount_image$reiserfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1f, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="d6cf7634315a49fff420214c89294b2dfa6aec056d77b4eb7ba0f29d", 0x1c, 0xbc91}, {&(0x7f0000000140)="c6fa913d803c7643f4e4ac26ca5d4cbf3c7d6c98b14702e766e52436cc3651035a631fab2ef8e9598c54332e7b7cc4c66a2d18ffdbcabeaaf180e6aead91dfe548f345113b06acb08d855492a2de9126cde978dde1e4eb287c0af7cf78578919eca1123c9ee22a0f6d0ab01ce6453e57f9ca9b4da51756a166c9673b0b0df706dc93bf61955c50c4376806c600320f2539150ffbccc8a5d22de46eda14d207a7587a287f5744247ba4bb67f1d4224db34be2ac397c8e8ebd6f6f4549a36f5fbc5a4371162ab06862ddd61deac9dea2322338bd69cced37166a", 0xd9, 0x9}, {&(0x7f0000000240)="ce74854a3182346f1e928e1a00147a66b5cd9fc56e39cfe903b1308f152671f2", 0x20, 0x2}, {&(0x7f0000000280)="de328972901b6fda4668ec425826866b2932c3f1eb354eb5bf43426fed94b4e9deaf267b3df0dc3e455b446cd3c65948dd024b3a86e28c81c5d2be32c313f91bd380607bfd081b7e460920768df8cc7f796a81012644ac0a9cbb034841f88296bd80b5f16b3223ada9e8058c4bbd623fbe92ff73aafb6cbeb5a438742f339017d3c2edd85f05bedb6cfa6d316adee774e58ab84996806698e091329432a032a961fc712a1a3f3e7336782b49edd06ec2cb51bd4ec6", 0xb5, 0x80}, {&(0x7f0000000340)="0e209324402db58b62a2d4e89b16620fd684fe50585a365045d527d7f40130b5272081bccbe3af2e746fd343db2e3d68c09ebb7759784d55f8ec4fcc318ed8bc280c0be61433f99baece247df41d993f23fd746dadb393fd0e28d40f0da761f2404dc077195f0ce2fd73d21f46f63162690306b57f9db06e4a263e3a7b66b95df0a576d76c3740f45a416c4172b1cf310a569b43edfa16645bf545419a5ef6ca6f0f735e16a8cc84916b4719279bfa88fa69fca3a5ebbea28427080d08b1ba43a6bccb13", 0xc4}], 0x10000, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 359.008195][T29867] REISERFS warning (device loop1): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 359.008195][T29867] [ 359.391513][T29871] loop5: p1[EZD] p2 p3 p4 [ 359.395972][T29871] loop5: partition table partially beyond EOD, truncated [ 359.404869][T29871] loop5: p1 start 4098 is beyond EOD, truncated [ 359.411401][T29871] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 359.418848][T29871] loop5: p3 start 225 is beyond EOD, truncated [ 359.426903][T29871] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x1, "e4"}}) 04:14:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x2, "e46b"}}) 04:14:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x0, 0x0) 04:14:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1f, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="d6cf7634315a49fff420214c89294b2dfa6aec056d77b4eb7ba0f29d", 0x1c, 0xbc91}, {&(0x7f0000000140)="c6fa913d803c7643f4e4ac26ca5d4cbf3c7d6c98b14702e766e52436cc3651035a631fab2ef8e9598c54332e7b7cc4c66a2d18ffdbcabeaaf180e6aead91dfe548f345113b06acb08d855492a2de9126cde978dde1e4eb287c0af7cf78578919eca1123c9ee22a0f6d0ab01ce6453e57f9ca9b4da51756a166c9673b0b0df706dc93bf61955c50c4376806c600320f2539150ffbccc8a5d22de46eda14d207a7587a287f5744247ba4bb67f1d4224db34be2ac397c8e8ebd6f6f4549a36f5fbc5a4371162ab06862ddd61deac9dea2322338bd69cced37166a", 0xd9, 0x9}, {&(0x7f0000000240)="ce74854a3182346f1e928e1a00147a66b5cd9fc56e39cfe903b1308f152671f2", 0x20, 0x2}, {&(0x7f0000000280)="de328972901b6fda4668ec425826866b2932c3f1eb354eb5bf43426fed94b4e9deaf267b3df0dc3e455b446cd3c65948dd024b3a86e28c81c5d2be32c313f91bd380607bfd081b7e460920768df8cc7f796a81012644ac0a9cbb034841f88296bd80b5f16b3223ada9e8058c4bbd623fbe92ff73aafb6cbeb5a438742f339017d3c2edd85f05bedb6cfa6d316adee774e58ab84996806698e091329432a032a961fc712a1a3f3e7336782b49edd06ec2cb51bd4ec6", 0xb5, 0x80}, {&(0x7f0000000340)="0e209324402db58b62a2d4e89b16620fd684fe50585a365045d527d7f40130b5272081bccbe3af2e746fd343db2e3d68c09ebb7759784d55f8ec4fcc318ed8bc280c0be61433f99baece247df41d993f23fd746dadb393fd0e28d40f0da761f2404dc077195f0ce2fd73d21f46f63162690306b57f9db06e4a263e3a7b66b95df0a576d76c3740f45a416c4172b1cf310a569b43edfa16645bf545419a5ef6ca6f0f735e16a8cc84916b4719279bfa88fa69fca3a5ebbea28427080d08b1ba43a6bccb13", 0xc4}], 0x10000, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x16b7b, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:06 executing program 2: syz_mount_image$reiserfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1f, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="d6cf7634315a49fff420214c89294b2dfa6aec056d77b4eb7ba0f29d", 0x1c, 0xbc91}, {&(0x7f0000000140)="c6fa913d803c7643f4e4ac26ca5d4cbf3c7d6c98b14702e766e52436cc3651035a631fab2ef8e9598c54332e7b7cc4c66a2d18ffdbcabeaaf180e6aead91dfe548f345113b06acb08d855492a2de9126cde978dde1e4eb287c0af7cf78578919eca1123c9ee22a0f6d0ab01ce6453e57f9ca9b4da51756a166c9673b0b0df706dc93bf61955c50c4376806c600320f2539150ffbccc8a5d22de46eda14d207a7587a287f5744247ba4bb67f1d4224db34be2ac397c8e8ebd6f6f4549a36f5fbc5a4371162ab06862ddd61deac9dea2322338bd69cced37166a", 0xd9, 0x9}, {&(0x7f0000000240)="ce74854a3182346f1e928e1a00147a66b5cd9fc56e39cfe903b1308f152671f2", 0x20, 0x2}, {&(0x7f0000000280)="de328972901b6fda4668ec425826866b2932c3f1eb354eb5bf43426fed94b4e9deaf267b3df0dc3e455b446cd3c65948dd024b3a86e28c81c5d2be32c313f91bd380607bfd081b7e460920768df8cc7f796a81012644ac0a9cbb034841f88296bd80b5f16b3223ada9e8058c4bbd623fbe92ff73aafb6cbeb5a438742f339017d3c2edd85f05bedb6cfa6d316adee774e58ab84996806698e091329432a032a961fc712a1a3f3e7336782b49edd06ec2cb51bd4ec6", 0xb5, 0x80}, {&(0x7f0000000340)="0e209324402db58b62a2d4e89b16620fd684fe50585a365045d527d7f40130b5272081bccbe3af2e746fd343db2e3d68c09ebb7759784d55f8ec4fcc318ed8bc280c0be61433f99baece247df41d993f23fd746dadb393fd0e28d40f0da761f2404dc077195f0ce2fd73d21f46f63162690306b57f9db06e4a263e3a7b66b95df0a576d76c3740f45a416c4172b1cf310a569b43edfa16645bf545419a5ef6ca6f0f735e16a8cc84916b4719279bfa88fa69fca3a5ebbea28427080d08b1ba43a6bccb13", 0xc4}], 0x10000, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x28, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61018fdd9c40f7bae59f1438d4b82884bcb4218c"}}) 04:14:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x2, "e46b"}}) 04:14:06 executing program 2: syz_mount_image$reiserfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1f, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="d6cf7634315a49fff420214c89294b2dfa6aec056d77b4eb7ba0f29d", 0x1c, 0xbc91}, {&(0x7f0000000140)="c6fa913d803c7643f4e4ac26ca5d4cbf3c7d6c98b14702e766e52436cc3651035a631fab2ef8e9598c54332e7b7cc4c66a2d18ffdbcabeaaf180e6aead91dfe548f345113b06acb08d855492a2de9126cde978dde1e4eb287c0af7cf78578919eca1123c9ee22a0f6d0ab01ce6453e57f9ca9b4da51756a166c9673b0b0df706dc93bf61955c50c4376806c600320f2539150ffbccc8a5d22de46eda14d207a7587a287f5744247ba4bb67f1d4224db34be2ac397c8e8ebd6f6f4549a36f5fbc5a4371162ab06862ddd61deac9dea2322338bd69cced37166a", 0xd9, 0x9}, {&(0x7f0000000240)="ce74854a3182346f1e928e1a00147a66b5cd9fc56e39cfe903b1308f152671f2", 0x20, 0x2}, {&(0x7f0000000280)="de328972901b6fda4668ec425826866b2932c3f1eb354eb5bf43426fed94b4e9deaf267b3df0dc3e455b446cd3c65948dd024b3a86e28c81c5d2be32c313f91bd380607bfd081b7e460920768df8cc7f796a81012644ac0a9cbb034841f88296bd80b5f16b3223ada9e8058c4bbd623fbe92ff73aafb6cbeb5a438742f339017d3c2edd85f05bedb6cfa6d316adee774e58ab84996806698e091329432a032a961fc712a1a3f3e7336782b49edd06ec2cb51bd4ec6", 0xb5, 0x80}, {&(0x7f0000000340)="0e209324402db58b62a2d4e89b16620fd684fe50585a365045d527d7f40130b5272081bccbe3af2e746fd343db2e3d68c09ebb7759784d55f8ec4fcc318ed8bc280c0be61433f99baece247df41d993f23fd746dadb393fd0e28d40f0da761f2404dc077195f0ce2fd73d21f46f63162690306b57f9db06e4a263e3a7b66b95df0a576d76c3740f45a416c4172b1cf310a569b43edfa16645bf545419a5ef6ca6f0f735e16a8cc84916b4719279bfa88fa69fca3a5ebbea28427080d08b1ba43a6bccb13", 0xc4}], 0x10000, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x2, "e46b"}}) 04:14:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x15, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61"}}) 04:14:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x2, "e46b"}}) 04:14:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x0, &(0x7f0000000280)) [ 359.780415][T29924] REISERFS warning (device loop1): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 359.780415][T29924] 04:14:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x2, "e46b"}}) 04:14:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x2, "e46b"}}) 04:14:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x0, 0x0) [ 360.152049][T29923] loop5: p1[EZD] p2 p3 p4 [ 360.156515][T29923] loop5: partition table partially beyond EOD, truncated [ 360.167086][T29923] loop5: p1 start 4098 is beyond EOD, truncated [ 360.174189][T29923] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 360.183320][T29923] loop5: p3 start 225 is beyond EOD, truncated [ 360.189711][T29923] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x15, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61"}}) 04:14:07 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', 0x0, 0x1f, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="d6cf7634315a49fff420214c89294b2dfa6aec056d77b4eb7ba0f29d", 0x1c, 0xbc91}, {&(0x7f0000000140)="c6fa913d803c7643f4e4ac26ca5d4cbf3c7d6c98b14702e766e52436cc3651035a631fab2ef8e9598c54332e7b7cc4c66a2d18ffdbcabeaaf180e6aead91dfe548f345113b06acb08d855492a2de9126cde978dde1e4eb287c0af7cf78578919eca1123c9ee22a0f6d0ab01ce6453e57f9ca9b4da51756a166c9673b0b0df706dc93bf61955c50c4376806c600320f2539150ffbccc8a5d22de46eda14d207a7587a287f5744247ba4bb67f1d4224db34be2ac397c8e8ebd6f6f4549a36f5fbc5a4371162ab06862ddd61deac9dea2322338bd69cced37166a", 0xd9, 0x9}, {&(0x7f0000000240)="ce74854a3182346f1e928e1a00147a66b5cd9fc56e39cfe903b1308f152671f2", 0x20, 0x2}, {&(0x7f0000000280)="de328972901b6fda4668ec425826866b2932c3f1eb354eb5bf43426fed94b4e9deaf267b3df0dc3e455b446cd3c65948dd024b3a86e28c81c5d2be32c313f91bd380607bfd081b7e460920768df8cc7f796a81012644ac0a9cbb034841f88296bd80b5f16b3223ada9e8058c4bbd623fbe92ff73aafb6cbeb5a438742f339017d3c2edd85f05bedb6cfa6d316adee774e58ab84996806698e091329432a032a961fc712a1a3f3e7336782b49edd06ec2cb51bd4ec6", 0xb5, 0x80}, {&(0x7f0000000340)="0e209324402db58b62a2d4e89b16620fd684fe50585a365045d527d7f40130b5272081bccbe3af2e746fd343db2e3d68c09ebb7759784d55f8ec4fcc318ed8bc280c0be61433f99baece247df41d993f23fd746dadb393fd0e28d40f0da761f2404dc077195f0ce2fd73d21f46f63162690306b57f9db06e4a263e3a7b66b95df0a576d76c3740f45a416c4172b1cf310a569b43edfa16645bf545419a5ef6ca6f0f735e16a8cc84916b4719279bfa88fa69fca3a5ebbea28427080d08b1ba43a6bccb13", 0xc4}], 0x10000, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x2, "e46b"}}) 04:14:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x0, &(0x7f0000000280)) 04:14:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x16b7c, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x1, "e4"}}) 04:14:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x2, "e46b"}}) 04:14:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x2, "e46b"}}) 04:14:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1f, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="d6cf7634315a49fff420214c89294b2dfa6aec056d77b4eb7ba0f29d", 0x1c, 0xbc91}, {&(0x7f0000000140)="c6fa913d803c7643f4e4ac26ca5d4cbf3c7d6c98b14702e766e52436cc3651035a631fab2ef8e9598c54332e7b7cc4c66a2d18ffdbcabeaaf180e6aead91dfe548f345113b06acb08d855492a2de9126cde978dde1e4eb287c0af7cf78578919eca1123c9ee22a0f6d0ab01ce6453e57f9ca9b4da51756a166c9673b0b0df706dc93bf61955c50c4376806c600320f2539150ffbccc8a5d22de46eda14d207a7587a287f5744247ba4bb67f1d4224db34be2ac397c8e8ebd6f6f4549a36f5fbc5a4371162ab06862ddd61deac9dea2322338bd69cced37166a", 0xd9, 0x9}, {&(0x7f0000000240)="ce74854a3182346f1e928e1a00147a66b5cd9fc56e39cfe903b1308f152671f2", 0x20, 0x2}, {&(0x7f0000000280)="de328972901b6fda4668ec425826866b2932c3f1eb354eb5bf43426fed94b4e9deaf267b3df0dc3e455b446cd3c65948dd024b3a86e28c81c5d2be32c313f91bd380607bfd081b7e460920768df8cc7f796a81012644ac0a9cbb034841f88296bd80b5f16b3223ada9e8058c4bbd623fbe92ff73aafb6cbeb5a438742f339017d3c2edd85f05bedb6cfa6d316adee774e58ab84996806698e091329432a032a961fc712a1a3f3e7336782b49edd06ec2cb51bd4ec6", 0xb5, 0x80}, {&(0x7f0000000340)="0e209324402db58b62a2d4e89b16620fd684fe50585a365045d527d7f40130b5272081bccbe3af2e746fd343db2e3d68c09ebb7759784d55f8ec4fcc318ed8bc280c0be61433f99baece247df41d993f23fd746dadb393fd0e28d40f0da761f2404dc077195f0ce2fd73d21f46f63162690306b57f9db06e4a263e3a7b66b95df0a576d76c3740f45a416c4172b1cf310a569b43edfa16645bf545419a5ef6ca6f0f735e16a8cc84916b4719279bfa88fa69fca3a5ebbea28427080d08b1ba43a6bccb13", 0xc4}], 0x10000, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:07 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', 0x0, 0x1f, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="d6cf7634315a49fff420214c89294b2dfa6aec056d77b4eb7ba0f29d", 0x1c, 0xbc91}, {&(0x7f0000000140)="c6fa913d803c7643f4e4ac26ca5d4cbf3c7d6c98b14702e766e52436cc3651035a631fab2ef8e9598c54332e7b7cc4c66a2d18ffdbcabeaaf180e6aead91dfe548f345113b06acb08d855492a2de9126cde978dde1e4eb287c0af7cf78578919eca1123c9ee22a0f6d0ab01ce6453e57f9ca9b4da51756a166c9673b0b0df706dc93bf61955c50c4376806c600320f2539150ffbccc8a5d22de46eda14d207a7587a287f5744247ba4bb67f1d4224db34be2ac397c8e8ebd6f6f4549a36f5fbc5a4371162ab06862ddd61deac9dea2322338bd69cced37166a", 0xd9, 0x9}, {&(0x7f0000000240)="ce74854a3182346f1e928e1a00147a66b5cd9fc56e39cfe903b1308f152671f2", 0x20, 0x2}, {&(0x7f0000000280)="de328972901b6fda4668ec425826866b2932c3f1eb354eb5bf43426fed94b4e9deaf267b3df0dc3e455b446cd3c65948dd024b3a86e28c81c5d2be32c313f91bd380607bfd081b7e460920768df8cc7f796a81012644ac0a9cbb034841f88296bd80b5f16b3223ada9e8058c4bbd623fbe92ff73aafb6cbeb5a438742f339017d3c2edd85f05bedb6cfa6d316adee774e58ab84996806698e091329432a032a961fc712a1a3f3e7336782b49edd06ec2cb51bd4ec6", 0xb5, 0x80}, {&(0x7f0000000340)="0e209324402db58b62a2d4e89b16620fd684fe50585a365045d527d7f40130b5272081bccbe3af2e746fd343db2e3d68c09ebb7759784d55f8ec4fcc318ed8bc280c0be61433f99baece247df41d993f23fd746dadb393fd0e28d40f0da761f2404dc077195f0ce2fd73d21f46f63162690306b57f9db06e4a263e3a7b66b95df0a576d76c3740f45a416c4172b1cf310a569b43edfa16645bf545419a5ef6ca6f0f735e16a8cc84916b4719279bfa88fa69fca3a5ebbea28427080d08b1ba43a6bccb13", 0xc4}], 0x10000, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0xc, "e46b74a2c8d66f9a08f4b4a0"}}) 04:14:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x0, &(0x7f0000000280)) 04:14:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x2, "e46b"}}) 04:14:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x3, "e46b74"}}) 04:14:07 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', 0x0, 0x1f, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="d6cf7634315a49fff420214c89294b2dfa6aec056d77b4eb7ba0f29d", 0x1c, 0xbc91}, {&(0x7f0000000140)="c6fa913d803c7643f4e4ac26ca5d4cbf3c7d6c98b14702e766e52436cc3651035a631fab2ef8e9598c54332e7b7cc4c66a2d18ffdbcabeaaf180e6aead91dfe548f345113b06acb08d855492a2de9126cde978dde1e4eb287c0af7cf78578919eca1123c9ee22a0f6d0ab01ce6453e57f9ca9b4da51756a166c9673b0b0df706dc93bf61955c50c4376806c600320f2539150ffbccc8a5d22de46eda14d207a7587a287f5744247ba4bb67f1d4224db34be2ac397c8e8ebd6f6f4549a36f5fbc5a4371162ab06862ddd61deac9dea2322338bd69cced37166a", 0xd9, 0x9}, {&(0x7f0000000240)="ce74854a3182346f1e928e1a00147a66b5cd9fc56e39cfe903b1308f152671f2", 0x20, 0x2}, {&(0x7f0000000280)="de328972901b6fda4668ec425826866b2932c3f1eb354eb5bf43426fed94b4e9deaf267b3df0dc3e455b446cd3c65948dd024b3a86e28c81c5d2be32c313f91bd380607bfd081b7e460920768df8cc7f796a81012644ac0a9cbb034841f88296bd80b5f16b3223ada9e8058c4bbd623fbe92ff73aafb6cbeb5a438742f339017d3c2edd85f05bedb6cfa6d316adee774e58ab84996806698e091329432a032a961fc712a1a3f3e7336782b49edd06ec2cb51bd4ec6", 0xb5, 0x80}, {&(0x7f0000000340)="0e209324402db58b62a2d4e89b16620fd684fe50585a365045d527d7f40130b5272081bccbe3af2e746fd343db2e3d68c09ebb7759784d55f8ec4fcc318ed8bc280c0be61433f99baece247df41d993f23fd746dadb393fd0e28d40f0da761f2404dc077195f0ce2fd73d21f46f63162690306b57f9db06e4a263e3a7b66b95df0a576d76c3740f45a416c4172b1cf310a569b43edfa16645bf545419a5ef6ca6f0f735e16a8cc84916b4719279bfa88fa69fca3a5ebbea28427080d08b1ba43a6bccb13", 0xc4}], 0x10000, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x2, "e46b"}}) [ 360.604803][T29997] REISERFS warning (device loop1): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 360.604803][T29997] 04:14:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x16b7d, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x3, "e46b74"}}) 04:14:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x1c0}]) 04:14:08 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="d6cf7634315a49fff420214c89294b2dfa6aec056d77b4eb7ba0f29d", 0x1c, 0xbc91}, {&(0x7f0000000140)="c6fa913d803c7643f4e4ac26ca5d4cbf3c7d6c98b14702e766e52436cc3651035a631fab2ef8e9598c54332e7b7cc4c66a2d18ffdbcabeaaf180e6aead91dfe548f345113b06acb08d855492a2de9126cde978dde1e4eb287c0af7cf78578919eca1123c9ee22a0f6d0ab01ce6453e57f9ca9b4da51756a166c9673b0b0df706dc93bf61955c50c4376806c600320f2539150ffbccc8a5d22de46eda14d207a7587a287f5744247ba4bb67f1d4224db34be2ac397c8e8ebd6f6f4549a36f5fbc5a4371162ab06862ddd61deac9dea2322338bd69cced37166a", 0xd9, 0x9}, {&(0x7f0000000240)="ce74854a3182346f1e928e1a00147a66b5cd9fc56e39cfe903b1308f152671f2", 0x20, 0x2}, {&(0x7f0000000280)="de328972901b6fda4668ec425826866b2932c3f1eb354eb5bf43426fed94b4e9deaf267b3df0dc3e455b446cd3c65948dd024b3a86e28c81c5d2be32c313f91bd380607bfd081b7e460920768df8cc7f796a81012644ac0a9cbb034841f88296bd80b5f16b3223ada9e8058c4bbd623fbe92ff73aafb6cbeb5a438742f339017d3c2edd85f05bedb6cfa6d316adee774e58ab84996806698e091329432a032a961fc712a1a3f3e7336782b49edd06ec2cb51bd4ec6", 0xb5, 0x80}, {&(0x7f0000000340)="0e209324402db58b62a2d4e89b16620fd684fe50585a365045d527d7f40130b5272081bccbe3af2e746fd343db2e3d68c09ebb7759784d55f8ec4fcc318ed8bc280c0be61433f99baece247df41d993f23fd746dadb393fd0e28d40f0da761f2404dc077195f0ce2fd73d21f46f63162690306b57f9db06e4a263e3a7b66b95df0a576d76c3740f45a416c4172b1cf310a569b43edfa16645bf545419a5ef6ca6f0f735e16a8cc84916b4719279bfa88fa69fca3a5ebbea28427080d08b1ba43a6bccb13", 0xc4}], 0x10000, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0xc, "e46b74a2c8d66f9a08f4b4a0"}}) [ 360.901451][T29985] loop5: p1[EZD] p2 p3 p4 [ 360.906712][T29985] loop5: partition table partially beyond EOD, truncated [ 360.914315][T29985] loop5: p1 start 4098 is beyond EOD, truncated [ 360.920952][T29985] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 360.928827][T29985] loop5: p3 start 225 is beyond EOD, truncated [ 360.935398][T29985] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x3, "e46b74"}}) 04:14:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x3, "e46b74"}}) [ 361.071920][T30037] loop1: p1[EZD] p2 p3 p4 [ 361.076662][T30037] loop1: p1 size 11290111 extends beyond EOD, truncated [ 361.088551][T30037] loop1: p2 size 1073872896 extends beyond EOD, truncated [ 361.105672][T30043] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 361.105672][T30043] 04:14:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x8, "e46b74a2c8d66f9a"}}) 04:14:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x3, "e46b74"}}) [ 361.129968][T30037] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 361.154823][T30037] loop1: p4 size 3657465856 extends beyond EOD, truncated 04:14:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x1c0}]) 04:14:08 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 361.233235][ T5040] loop1: p1[EZD] p2 p3 p4 [ 361.237705][ T5040] loop1: p1 size 11290111 extends beyond EOD, truncated [ 361.269194][ T5040] loop1: p2 size 1073872896 extends beyond EOD, truncated [ 361.299440][T30076] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 361.299440][T30076] [ 361.307068][ T5040] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 361.332281][ T5040] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 361.511468][T30044] loop5: p1[EZD] p2 p3 p4 [ 361.515901][T30044] loop5: partition table partially beyond EOD, truncated [ 361.523122][T30044] loop5: p1 start 4098 is beyond EOD, truncated [ 361.529361][T30044] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 361.537410][T30044] loop5: p3 start 225 is beyond EOD, truncated [ 361.544065][T30044] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x16b7e, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x4, "e46b74a2"}}) 04:14:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x3, "e46b74"}}) 04:14:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x1c0}]) 04:14:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0xc, "e46b74a2c8d66f9a08f4b4a0"}}) 04:14:08 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x8, "e46b74a2c8d66f9a"}}) 04:14:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0xc, "e46b74a2c8d66f9a08f4b4a0"}}) 04:14:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x4, "e46b74a2"}}) 04:14:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x4, "e46b74a2"}}) [ 361.721279][T30110] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 361.721279][T30110] 04:14:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x4, "e46b74a2"}}) 04:14:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140), 0x0, 0x1c0}]) [ 362.201341][T30112] loop5: p1[EZD] p2 p3 p4 [ 362.205813][T30112] loop5: partition table partially beyond EOD, truncated [ 362.215021][T30112] loop5: p1 start 4098 is beyond EOD, truncated [ 362.221724][T30112] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 362.229266][T30112] loop5: p3 start 225 is beyond EOD, truncated [ 362.238542][T30112] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x16b7f, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x6, "e46b74a2c8d6"}}) 04:14:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0xc, "e46b74a2c8d66f9a08f4b4a0"}}) 04:14:09 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x4, "e46b74a2"}}) 04:14:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140), 0x0, 0x1c0}]) 04:14:09 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0xc, "e46b74a2c8d66f9a08f4b4a0"}}) 04:14:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x4, "e46b74a2"}}) 04:14:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x4, "e46b74a2"}}) 04:14:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140), 0x0, 0x1c0}]) 04:14:09 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:09 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0xc, "e46b74a2c8d66f9a08f4b4a0"}}) [ 362.801301][T30164] loop5: p1[EZD] p2 p3 p4 [ 362.806135][T30164] loop5: partition table partially beyond EOD, truncated [ 362.816453][T30164] loop5: p1 start 4098 is beyond EOD, truncated [ 362.822960][T30164] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 362.830623][T30164] loop5: p3 start 225 is beyond EOD, truncated [ 362.838769][T30164] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x16b80, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x4, "e46b74a2"}}) 04:14:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x6, "e46b74a2c8d6"}}) 04:14:09 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0xc, "e46b74a2c8d66f9a08f4b4a0"}}) 04:14:09 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000", 0x20, 0x1c0}]) 04:14:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x4, "e46b74a2"}}) 04:14:10 executing program 1: socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0xc, "e46b74a2c8d66f9a08f4b4a0"}}) 04:14:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x4, "e46b74a2"}}) 04:14:10 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:10 executing program 1: socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0xc, "e46b74a2c8d66f9a08f4b4a0"}}) 04:14:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x4, "e46b74a2"}}) [ 363.246837][T30226] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 363.246837][T30226] [ 363.521350][T30209] loop5: p1[EZD] p2 p3 p4 [ 363.525980][T30209] loop5: partition table partially beyond EOD, truncated [ 363.533357][T30209] loop5: p1 start 4098 is beyond EOD, truncated [ 363.540084][T30209] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 363.548891][T30209] loop5: p3 start 225 is beyond EOD, truncated [ 363.558591][T30209] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:10 executing program 1: socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0xc, "e46b74a2c8d66f9a08f4b4a0"}}) 04:14:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x5, "e46b74a2c8"}}) 04:14:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000", 0x20, 0x1c0}]) 04:14:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x4, "e46b74a2"}}) 04:14:10 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x16b81, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x5, "e46b74a2c8"}}) 04:14:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 04:14:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x5, "e46b74a2c8"}}) 04:14:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 04:14:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x5, "e46b74a2c8"}}) 04:14:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x5, "e46b74a2c8"}}) 04:14:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000", 0x20, 0x1c0}]) [ 363.795668][T30258] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 363.795668][T30258] 04:14:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 04:14:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1f, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="d6cf7634315a49fff420214c89294b2dfa6aec056d77b4eb7ba0f29d", 0x1c, 0xbc91}, {&(0x7f0000000140)="c6fa913d803c7643f4e4ac26ca5d4cbf3c7d6c98b14702e766e52436cc3651035a631fab2ef8e9598c54332e7b7cc4c66a2d18ffdbcabeaaf180e6aead91dfe548f345113b06acb08d855492a2de9126cde978dde1e4eb287c0af7cf78578919eca1123c9ee22a0f6d0ab01ce6453e57f9ca9b4da51756a166c9673b0b0df706dc93bf61955c50c4376806c600320f2539150ffbccc8a5d22de46eda14d207a7587a287f5744247ba4bb67f1d4224db34be2ac397c8e8ebd6f6f4549a36f5fbc5a4371162ab06862ddd61deac9dea2322338bd69cced37166a", 0xd9, 0x9}, {&(0x7f0000000240)="ce74854a3182346f1e928e1a00147a66b5cd9fc56e39cfe903b1308f152671f2", 0x20, 0x2}, {&(0x7f0000000280)="de328972901b6fda4668ec425826866b2932c3f1eb354eb5bf43426fed94b4e9deaf267b3df0dc3e455b446cd3c65948dd024b3a86e28c81c5d2be32c313f91bd380607bfd081b7e460920768df8cc7f796a81012644ac0a9cbb034841f88296bd80b5f16b3223ada9e8058c4bbd623fbe92ff73aafb6cbeb5a438742f339017d3c2edd85f05bedb6cfa6d316adee774e58ab84996806698e091329432a032a961fc712a1a3f3e7336782b49edd06ec2cb51bd4ec6", 0xb5, 0x80}, {&(0x7f0000000340)="0e209324402db58b62a2d4e89b16620fd684fe50585a365045d527d7f40130b5272081bccbe3af2e746fd343db2e3d68c09ebb7759784d55f8ec4fcc318ed8bc280c0be61433f99baece247df41d993f23fd746dadb393fd0e28d40f0da761f2404dc077195f0ce2fd73d21f46f63162690306b57f9db06e4a263e3a7b66b95df0a576d76c3740f45a416c4172b1cf310a569b43edfa16645bf545419a5ef6ca6f0f735e16a8cc84916b4719279bfa88fa69fca3a5ebbea28427080d08b1ba43a6bccb13", 0xc4}], 0x10000, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@hash_rupasov='hash=rupasov'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:14:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x5, "e46b74a2c8"}}) 04:14:10 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 363.973656][T30287] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 363.973656][T30287] [ 364.082089][T30293] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 364.082089][T30293] 04:14:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0xfffff, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', 0x0}) 04:14:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000340), &(0x7f0000000380)=0x10) 04:14:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e1000000887700720030", 0x30, 0x1c0}]) 04:14:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000340), &(0x7f0000000380)=0x10) 04:14:11 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 364.241218][T30259] loop5: p1[EZD] p2 p3 p4 [ 364.245642][T30259] loop5: partition table partially beyond EOD, truncated [ 364.254289][T30259] loop5: p1 start 4098 is beyond EOD, truncated [ 364.260650][T30259] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 364.268720][T30259] loop5: p3 start 225 is beyond EOD, truncated [ 364.276953][T30259] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', 0x0}) 04:14:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x80000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000180)) open(&(0x7f0000000300)='.\x00', 0x880, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x9b, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61018fdd9c40f7bae59f1438d4b82884bcb4218cc6b254882965447d29899e0516ea467eb8c27f619460e0a1da63b30176cc0c26e9f748ef4a2b2edb21d40c263fa3cbe738b01a926d3db4582135ef1b76b576e33d55317e3730b7ce3c4c620cf53396b029de8dc49fa5cb6e9c7acd8826eeb706f9a45496e0723cf315b9e8f0a6c002760f66e7"}}) 04:14:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x80000) r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000340), &(0x7f0000000380)=0x10) 04:14:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', 0x0}) 04:14:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x80000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000180)) r1 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000340), &(0x7f0000000380)=0x10) [ 364.456903][T30320] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 364.456903][T30320] 04:14:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e1000000887700720030", 0x30, 0x1c0}]) 04:14:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x40020000, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x80000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000180)) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x9b, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61018fdd9c40f7bae59f1438d4b82884bcb4218cc6b254882965447d29899e0516ea467eb8c27f619460e0a1da63b30176cc0c26e9f748ef4a2b2edb21d40c263fa3cbe738b01a926d3db4582135ef1b76b576e33d55317e3730b7ce3c4c620cf53396b029de8dc49fa5cb6e9c7acd8826eeb706f9a45496e0723cf315b9e8f0a6c002760f66e7"}}) 04:14:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr}) 04:14:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x80000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000180)) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x9b, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61018fdd9c40f7bae59f1438d4b82884bcb4218cc6b254882965447d29899e0516ea467eb8c27f619460e0a1da63b30176cc0c26e9f748ef4a2b2edb21d40c263fa3cbe738b01a926d3db4582135ef1b76b576e33d55317e3730b7ce3c4c620cf53396b029de8dc49fa5cb6e9c7acd8826eeb706f9a45496e0723cf315b9e8f0a6c002760f66e7"}}) 04:14:12 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e1000000887700720030", 0x30, 0x1c0}]) 04:14:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr}) [ 365.257954][T30368] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "smackfsroot=/dev/usbmon#" 04:14:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x80000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000180)) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) r2 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000340), &(0x7f0000000380)=0x10) 04:14:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr}) 04:14:12 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:12 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff0000", 0x38, 0x1c0}]) [ 365.467292][T30391] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "smackfsroot=/dev/usbmon#" [ 365.681735][T30394] loop3: p1[EZD] p2 p3 p4 [ 365.686247][T30394] loop3: p1 size 11290111 extends beyond EOD, truncated [ 365.718923][T30394] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 365.737116][T30394] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 365.755062][T30394] loop3: p4 size 3657465856 extends beyond EOD, truncated 04:14:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x7ffffff2, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x6, "e46b74a2c8d6"}}) 04:14:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x80000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000180)) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x9b, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61018fdd9c40f7bae59f1438d4b82884bcb4218cc6b254882965447d29899e0516ea467eb8c27f619460e0a1da63b30176cc0c26e9f748ef4a2b2edb21d40c263fa3cbe738b01a926d3db4582135ef1b76b576e33d55317e3730b7ce3c4c620cf53396b029de8dc49fa5cb6e9c7acd8826eeb706f9a45496e0723cf315b9e8f0a6c002760f66e7"}}) 04:14:13 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff0000", 0x38, 0x1c0}]) 04:14:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x80000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000180)) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x9b, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61018fdd9c40f7bae59f1438d4b82884bcb4218cc6b254882965447d29899e0516ea467eb8c27f619460e0a1da63b30176cc0c26e9f748ef4a2b2edb21d40c263fa3cbe738b01a926d3db4582135ef1b76b576e33d55317e3730b7ce3c4c620cf53396b029de8dc49fa5cb6e9c7acd8826eeb706f9a45496e0723cf315b9e8f0a6c002760f66e7"}}) 04:14:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr}) 04:14:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x80000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000180)) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x2) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x9b, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61018fdd9c40f7bae59f1438d4b82884bcb4218cc6b254882965447d29899e0516ea467eb8c27f619460e0a1da63b30176cc0c26e9f748ef4a2b2edb21d40c263fa3cbe738b01a926d3db4582135ef1b76b576e33d55317e3730b7ce3c4c620cf53396b029de8dc49fa5cb6e9c7acd8826eeb706f9a45496e0723cf315b9e8f0a6c002760f66e7"}}) 04:14:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x80000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000180)) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x2) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x9b, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61018fdd9c40f7bae59f1438d4b82884bcb4218cc6b254882965447d29899e0516ea467eb8c27f619460e0a1da63b30176cc0c26e9f748ef4a2b2edb21d40c263fa3cbe738b01a926d3db4582135ef1b76b576e33d55317e3730b7ce3c4c620cf53396b029de8dc49fa5cb6e9c7acd8826eeb706f9a45496e0723cf315b9e8f0a6c002760f66e7"}}) 04:14:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr}) 04:14:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff0000", 0x38, 0x1c0}]) [ 366.219758][T30432] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "smackfsroot=/dev/usbmon#" 04:14:13 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 366.458682][T30454] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 366.458682][T30454] 04:14:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x7ffffff8, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr}) 04:14:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x80000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000180)) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x2) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r3, 0x8b29, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x9b, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61018fdd9c40f7bae59f1438d4b82884bcb4218cc6b254882965447d29899e0516ea467eb8c27f619460e0a1da63b30176cc0c26e9f748ef4a2b2edb21d40c263fa3cbe738b01a926d3db4582135ef1b76b576e33d55317e3730b7ce3c4c620cf53396b029de8dc49fa5cb6e9c7acd8826eeb706f9a45496e0723cf315b9e8f0a6c002760f66e7"}}) 04:14:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x80000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000180)) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x2) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r3, 0x8b29, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x9b, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61018fdd9c40f7bae59f1438d4b82884bcb4218cc6b254882965447d29899e0516ea467eb8c27f619460e0a1da63b30176cc0c26e9f748ef4a2b2edb21d40c263fa3cbe738b01a926d3db4582135ef1b76b576e33d55317e3730b7ce3c4c620cf53396b029de8dc49fa5cb6e9c7acd8826eeb706f9a45496e0723cf315b9e8f0a6c002760f66e7"}}) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000340), &(0x7f0000000380)=0x10) 04:14:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff000000000080", 0x3c, 0x1c0}]) 04:14:14 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x3, "e46b74"}}) 04:14:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff000000000080", 0x3c, 0x1c0}]) 04:14:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x80000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000180)) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x2) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r3, 0x8b29, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x9b, "e46b74a2c8d66f9a08f4b4a010b2ca440e91bedb61018fdd9c40f7bae59f1438d4b82884bcb4218cc6b254882965447d29899e0516ea467eb8c27f619460e0a1da63b30176cc0c26e9f748ef4a2b2edb21d40c263fa3cbe738b01a926d3db4582135ef1b76b576e33d55317e3730b7ce3c4c620cf53396b029de8dc49fa5cb6e9c7acd8826eeb706f9a45496e0723cf315b9e8f0a6c002760f66e7"}}) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000340), &(0x7f0000000380)=0x10) [ 367.113568][T30483] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 367.113568][T30483] 04:14:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x67}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001ff) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f00000002c0)={{0x75, 0x5}, 'port1\x00', 0x50, 0x4, 0x1, 0x2e, 0x7, 0x2, 0x9, 0x0, 0x4, 0x3}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/153) 04:14:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x3, "e46b74"}}) 04:14:14 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/usbmon#\x00'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 367.339946][T30509] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 367.339946][T30509] 04:14:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x7ffffff9, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff000000000080", 0x3c, 0x1c0}]) 04:14:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/sockstat\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x100000, 0x0) 04:14:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x3, "e46b74"}}) 04:14:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0xffffffff, 0x40, 0x1, 'queue0\x00', 0x8}) write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r2 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETBLKSIZE(r4, 0xc0045004, &(0x7f0000000000)) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r5, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000640)='./file0/file0\x00', 0x0) 04:14:14 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:14:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x5, "e46b74a2c8"}}) 04:14:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/sockstat\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x7a00, 0x0) [ 367.928297][T30537] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 367.928297][T30537] 04:14:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da", 0x3e, 0x1c0}]) 04:14:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000200)={0xe0002011}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000000)) epoll_create(0x6) openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NL80211_CMD_GET_STATION(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x30, r0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x1}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x1}}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x90}]}, 0x30}, 0x1, 0x0, 0x0, 0x44804}, 0x0) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r4, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000640)='./file0/file0\x00', 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r5, &(0x7f00000000c0)='./file0\x00') 04:14:15 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}]}) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:14:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x5, "e46b74a2c8"}}) [ 368.212086][T30558] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 368.212086][T30558] 04:14:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x7ffffffc, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) open(&(0x7f0000000000)='./file0\x00', 0x204100, 0x5a262d5df57992fd) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r1, &(0x7f0000000180)='./file0\x00', r0, &(0x7f0000000640)='./file0/file0\x00', 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r2, 0x8b29, &(0x7f0000000040)) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000100)={0x0, 'veth0_to_team\x00', {0x1}, 0x4c7}) 04:14:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000200)=@ethtool_perm_addr={0x20, 0x5, "e46b74a2c8"}}) 04:14:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/sockstat\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x4c00, 0x0) 04:14:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da", 0x3e, 0x1c0}]) 04:14:15 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}]}) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:14:15 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}]}) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:14:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000200)={0xe0002011}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)) epoll_create(0x6) openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r3, 0x40045730, &(0x7f0000000100)=0x401) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r4, &(0x7f00000000c0)='./file0\x00') [ 368.798040][T30586] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 368.798040][T30586] 04:14:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000200)={0xe0002011}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)) epoll_create(0x6) openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r3, 0x40045730, &(0x7f0000000100)=0x401) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r4, &(0x7f00000000c0)='./file0\x00') 04:14:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000200)={0xe0002011}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)) epoll_create(0x6) openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) ioctl(0xffffffffffffffff, 0x8b29, &(0x7f0000000040)) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000140)=0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x80141, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00') 04:14:16 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}]}) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:14:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da", 0x3e, 0x1c0}]) [ 368.933217][T30595] REISERFS warning (device loop1): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 368.933217][T30595] [ 369.164381][T30617] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 369.164381][T30617] 04:14:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0xda008000, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/sockstat\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x4000, 0x0) 04:14:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000200)={0xe0002011}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)) epoll_create(0x6) openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) ioctl(0xffffffffffffffff, 0x8b29, &(0x7f0000000040)) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000140)=0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x80141, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00') 04:14:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r8, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000300)=ANY=[@ANYRES32=r9, @ANYBLOB="3e000000b38d237d8533b02c4e3ae8673f40c6b19074ce8f0868cc172f1465dfa79b52d99a24c11f1159ddd523dd5ba479a093d58b206d48f4003e9ff0051216433885e2bbe2ebff8daf0f0fb68a70c74e334cdbb9b28e0a66737d5f2617f701827a1af3d475ad3f65b961ef43ca2d3b7158dbfe380accb6ef0e70cc5c5edb989ec7c29960447067c77a3aea885cea198cb076f88af9b6799c5666d43a8970f609019497abe778f795e238a7417070087b0d9f6a7e41954514"], &(0x7f0000000180)=0x46) 04:14:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55", 0x3f, 0x1c0}]) 04:14:16 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:14:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/sockstat\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x1100, 0x0) 04:14:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55", 0x3f, 0x1c0}]) 04:14:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r8, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000300)=ANY=[@ANYRES32=r9, @ANYBLOB="3e000000b38d237d8533b02c4e3ae8673f40c6b19074ce8f0868cc172f1465dfa79b52d99a24c11f1159ddd523dd5ba479a093d58b206d48f4003e9ff0051216433885e2bbe2ebff8daf0f0fb68a70c74e334cdbb9b28e0a66737d5f2617f701827a1af3d475ad3f65b961ef43ca2d3b7158dbfe380accb6ef0e70cc5c5edb989ec7c29960447067c77a3aea885cea198cb076f88af9b6799c5666d43a8970f609019497abe778f795e238a7417070087b0d9f6a7e41954514"], &(0x7f0000000180)=0x46) [ 369.674380][T30646] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 369.674380][T30646] 04:14:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000200)={0xe0002011}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)) epoll_create(0x6) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu\x00', 0x2000, 0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000140)=0x1, 0x4) openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r3, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000640)='./file0/file0\x00', 0x0) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r4, &(0x7f00000000c0)='./file0\x00') 04:14:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000200)={0xe0002011}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)) epoll_create(0x6) recvfrom$l2tp6(0xffffffffffffffff, &(0x7f0000000240)=""/192, 0xc0, 0x100, &(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, 0x20) epoll_create(0x2) openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00') 04:14:16 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 369.942774][T30667] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 369.942774][T30667] 04:14:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0xffff88809f195398, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r8, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000300)=ANY=[@ANYRES32=r9, @ANYBLOB="3e000000b38d237d8533b02c4e3ae8673f40c6b19074ce8f0868cc172f1465dfa79b52d99a24c11f1159ddd523dd5ba479a093d58b206d48f4003e9ff0051216433885e2bbe2ebff8daf0f0fb68a70c74e334cdbb9b28e0a66737d5f2617f701827a1af3d475ad3f65b961ef43ca2d3b7158dbfe380accb6ef0e70cc5c5edb989ec7c29960447067c77a3aea885cea198cb076f88af9b6799c5666d43a8970f609019497abe778f795e238a7417070087b0d9f6a7e41954514"], &(0x7f0000000180)=0x46) 04:14:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=@newtfilter={0x764, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x8}, {0x8, 0xfff1}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x738, 0x2, [@TCA_U32_SEL={0x734, 0x5, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x27, 0x4, 0x2, 0x80000000}, {0x11d, 0x8, 0xffffffff, 0x69}, {0x7, 0x80000000, 0x80000001, 0xb63}, {0xffffffff, 0x0, 0x4, 0x3}, {0x5, 0x0, 0x0, 0x40}, {0x5, 0x4, 0x8, 0x6}, {0x7, 0x101, 0x7b56b858, 0xffff6a27}, {0x3, 0x4, 0x100, 0xffffffff}, {0xf9, 0x6, 0x6, 0x19}, {0x9, 0x1f, 0xb0b}, {0x5, 0x117, 0x9, 0x6461}, {0x7fffffff, 0x81, 0x6, 0x400}, {0x5, 0xbb, 0x6, 0xfffff390}, {0xff, 0x9, 0xfffffffc, 0x5cd7}, {0x4e7a, 0x1, 0x1, 0x3f}, {0x5, 0x0, 0x6, 0x6}, {0x6df, 0x20, 0x101, 0x67e}, {0x3, 0x6, 0xffffffb5, 0x5}, {0x0, 0x2, 0x3f, 0x200}, {0x2, 0x726}, {0x7, 0x800, 0xfff, 0x7}, {0x7, 0x8, 0x6, 0x2}, {0x5223bebd, 0x0, 0x800, 0xd37}, {0xfffffffb, 0x1, 0x6, 0x1f}, {0x2, 0xd8, 0x6, 0xc807}, {0x8, 0x6, 0x8, 0x9}, {0x40, 0x40, 0x9, 0x9}, {0x4, 0x1000, 0xab6, 0xdd}, {0xff, 0x6, 0x1, 0xfffffffd}, {0x8, 0x1, 0x3fcc, 0x5}, {0xfffffffe, 0x23d0, 0x3, 0x3}, {0x6, 0x0, 0x8, 0x1d8be730}, {0x20, 0x7101, 0x2, 0x8001}, {0x0, 0x16f330bf, 0x10000, 0xfffffff9}, {0x40, 0x9, 0x6, 0xfff}, {0x7f, 0x2, 0x7, 0x8001}, {0x6, 0x400, 0x0, 0x1000}, {0x0, 0x9, 0x8d9b, 0x6}, {0x9, 0xfff00, 0x4e48a602, 0x9788}, {0x1400000, 0x9, 0x4, 0x400}, {0x7, 0x8, 0x6, 0x80000001}, {0x7fffffff, 0x8000, 0xe}, {0x7, 0x3, 0x4, 0xdf42}, {0x10001, 0x4, 0x3, 0x3ff}, {0x5, 0x6}, {0x7, 0x2, 0xfffffff7, 0x1f}, {0x1, 0x6, 0x1, 0x4}, {0x8000, 0x7f, 0x13, 0x95}, {0x2, 0xff, 0x3ff, 0x9}, {0x3, 0x81, 0x6}, {0x1, 0x0, 0x11, 0x8}, {0x7, 0xfffffffc, 0x8, 0x2}, {0x100, 0x800, 0x7861, 0xe1a}, {0x8, 0x67d, 0x4, 0x10b}, {0x3f, 0x400, 0x0, 0xfffffffb}, {0x7, 0x0, 0x20, 0x3f}, {0x4, 0x9, 0xfffff31f, 0x1}, {0x200, 0xfffffffd, 0x1668, 0x1000}, {0x6, 0x81, 0x9, 0x7fff}, {0x8, 0x7, 0x1, 0x100}, {0x7fff, 0x101, 0xffff, 0x7}, {0x1, 0x5c, 0x996, 0x4}, {0x0, 0x8, 0xffffffff, 0x10000}, {0x80000000, 0x7f, 0x6, 0x2}, {0x40, 0x3f, 0x8, 0x2}, {0x9, 0x8, 0x0, 0x6}, {0x1, 0x5, 0x0, 0x337}, {0x1, 0xed8, 0x1, 0x9}, {0x1, 0x0, 0x40, 0x3}, {0x0, 0x7, 0x4, 0x1ff}, {0x7, 0x2, 0x39, 0x3}, {0x0, 0x8, 0x1f, 0x7ff}, {0x4, 0x1, 0x400, 0x1ff}, {0x7, 0x6, 0x10001, 0xc62d}, {0x3ff, 0xffffff23, 0x7fff, 0x3}, {0x169e, 0x9, 0x9, 0x400}, {0x9, 0x3, 0x2, 0x10000}, {0x7, 0x4, 0x8001, 0x1}, {0xffff, 0x9, 0x6, 0x100}, {0x0, 0xe5a5, 0xffae, 0xa000000}, {0x0, 0x80000000, 0x2489, 0x2}, {0x5, 0x0, 0x20, 0x4}, {0x0, 0x0, 0xeda3, 0x77}, {0xfffffff8, 0x5, 0x2, 0x1000}, {0x0, 0x6, 0x2, 0x34f8d75}, {0x101, 0x5, 0x6, 0x1}, {0x80000000, 0x3, 0x1, 0xcbb2}, {0x8, 0x81, 0xfffffe01, 0x5}, {0xfffff001, 0x7fff, 0x6, 0xfffffffb}, {0x8, 0x1, 0x7}, {0xffff7fff, 0x2, 0x0, 0xfffffff9}, {0x5, 0xeb, 0x8001, 0x4}, {0x4, 0x4, 0x2, 0x3}, {0x2, 0x2, 0x6, 0x80000000}, {0x8bcecd4, 0x6082, 0x8000, 0xfb5ef2fa}, {0x285, 0x7, 0x2, 0xffff085d}, {0x38, 0x7, 0xba, 0x6ec9}, {0x5, 0x4, 0x400, 0x60}, {0xffffffff, 0x7, 0x9, 0x8}, {0x0, 0x5, 0x7f, 0xfff}, {0x0, 0x8001, 0x2, 0x3}, {0x791180, 0xfffffff9, 0x10001, 0x9}, {0xb1ec, 0x8, 0xfffffffb, 0x9}, {0x2, 0x3, 0x400, 0x60000000}, {0xca, 0x0, 0x81, 0x6}, {0x3, 0x3f040000, 0xeb18, 0xffffffff}, {0x4, 0x6, 0xa56, 0x5}, {0x800, 0x1, 0x4, 0x3}, {0xffff, 0xe58, 0x3, 0x7f}, {0x3ff, 0x7, 0x1, 0x20}, {0x64, 0x0, 0x82bc, 0x3}, {0x2, 0x2, 0x9, 0x3}, {0x5, 0x6, 0x9, 0x6}, {0x5a, 0x2, 0x2, 0x10000}]}}]}}]}, 0x764}}, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000200), 0x4924924924926d3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000002d006d54007a08b267ae3604b5000000", @ANYRES32=r3, @ANYBLOB="00080080000000000800f1ff"], 0x24}}, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200), 0x4924924924926d3, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r6 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r6, &(0x7f0000000180)='./file0\x00', r0, &(0x7f0000000640)='./file0/file0\x00', 0x0) 04:14:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55", 0x3f, 0x1c0}]) 04:14:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=@newtfilter={0x764, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x8}, {0x8, 0xfff1}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x738, 0x2, [@TCA_U32_SEL={0x734, 0x5, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x27, 0x4, 0x2, 0x80000000}, {0x11d, 0x8, 0xffffffff, 0x69}, {0x7, 0x80000000, 0x80000001, 0xb63}, {0xffffffff, 0x0, 0x4, 0x3}, {0x5, 0x0, 0x0, 0x40}, {0x5, 0x4, 0x8, 0x6}, {0x7, 0x101, 0x7b56b858, 0xffff6a27}, {0x3, 0x4, 0x100, 0xffffffff}, {0xf9, 0x6, 0x6, 0x19}, {0x9, 0x1f, 0xb0b}, {0x5, 0x117, 0x9, 0x6461}, {0x7fffffff, 0x81, 0x6, 0x400}, {0x5, 0xbb, 0x6, 0xfffff390}, {0xff, 0x9, 0xfffffffc, 0x5cd7}, {0x4e7a, 0x1, 0x1, 0x3f}, {0x5, 0x0, 0x6, 0x6}, {0x6df, 0x20, 0x101, 0x67e}, {0x3, 0x6, 0xffffffb5, 0x5}, {0x0, 0x2, 0x3f, 0x200}, {0x2, 0x726}, {0x7, 0x800, 0xfff, 0x7}, {0x7, 0x8, 0x6, 0x2}, {0x5223bebd, 0x0, 0x800, 0xd37}, {0xfffffffb, 0x1, 0x6, 0x1f}, {0x2, 0xd8, 0x6, 0xc807}, {0x8, 0x6, 0x8, 0x9}, {0x40, 0x40, 0x9, 0x9}, {0x4, 0x1000, 0xab6, 0xdd}, {0xff, 0x6, 0x1, 0xfffffffd}, {0x8, 0x1, 0x3fcc, 0x5}, {0xfffffffe, 0x23d0, 0x3, 0x3}, {0x6, 0x0, 0x8, 0x1d8be730}, {0x20, 0x7101, 0x2, 0x8001}, {0x0, 0x16f330bf, 0x10000, 0xfffffff9}, {0x40, 0x9, 0x6, 0xfff}, {0x7f, 0x2, 0x7, 0x8001}, {0x6, 0x400, 0x0, 0x1000}, {0x0, 0x9, 0x8d9b, 0x6}, {0x9, 0xfff00, 0x4e48a602, 0x9788}, {0x1400000, 0x9, 0x4, 0x400}, {0x7, 0x8, 0x6, 0x80000001}, {0x7fffffff, 0x8000, 0xe}, {0x7, 0x3, 0x4, 0xdf42}, {0x10001, 0x4, 0x3, 0x3ff}, {0x5, 0x6}, {0x7, 0x2, 0xfffffff7, 0x1f}, {0x1, 0x6, 0x1, 0x4}, {0x8000, 0x7f, 0x13, 0x95}, {0x2, 0xff, 0x3ff, 0x9}, {0x3, 0x81, 0x6}, {0x1, 0x0, 0x11, 0x8}, {0x7, 0xfffffffc, 0x8, 0x2}, {0x100, 0x800, 0x7861, 0xe1a}, {0x8, 0x67d, 0x4, 0x10b}, {0x3f, 0x400, 0x0, 0xfffffffb}, {0x7, 0x0, 0x20, 0x3f}, {0x4, 0x9, 0xfffff31f, 0x1}, {0x200, 0xfffffffd, 0x1668, 0x1000}, {0x6, 0x81, 0x9, 0x7fff}, {0x8, 0x7, 0x1, 0x100}, {0x7fff, 0x101, 0xffff, 0x7}, {0x1, 0x5c, 0x996, 0x4}, {0x0, 0x8, 0xffffffff, 0x10000}, {0x80000000, 0x7f, 0x6, 0x2}, {0x40, 0x3f, 0x8, 0x2}, {0x9, 0x8, 0x0, 0x6}, {0x1, 0x5, 0x0, 0x337}, {0x1, 0xed8, 0x1, 0x9}, {0x1, 0x0, 0x40, 0x3}, {0x0, 0x7, 0x4, 0x1ff}, {0x7, 0x2, 0x39, 0x3}, {0x0, 0x8, 0x1f, 0x7ff}, {0x4, 0x1, 0x400, 0x1ff}, {0x7, 0x6, 0x10001, 0xc62d}, {0x3ff, 0xffffff23, 0x7fff, 0x3}, {0x169e, 0x9, 0x9, 0x400}, {0x9, 0x3, 0x2, 0x10000}, {0x7, 0x4, 0x8001, 0x1}, {0xffff, 0x9, 0x6, 0x100}, {0x0, 0xe5a5, 0xffae, 0xa000000}, {0x0, 0x80000000, 0x2489, 0x2}, {0x5, 0x0, 0x20, 0x4}, {0x0, 0x0, 0xeda3, 0x77}, {0xfffffff8, 0x5, 0x2, 0x1000}, {0x0, 0x6, 0x2, 0x34f8d75}, {0x101, 0x5, 0x6, 0x1}, {0x80000000, 0x3, 0x1, 0xcbb2}, {0x8, 0x81, 0xfffffe01, 0x5}, {0xfffff001, 0x7fff, 0x6, 0xfffffffb}, {0x8, 0x1, 0x7}, {0xffff7fff, 0x2, 0x0, 0xfffffff9}, {0x5, 0xeb, 0x8001, 0x4}, {0x4, 0x4, 0x2, 0x3}, {0x2, 0x2, 0x6, 0x80000000}, {0x8bcecd4, 0x6082, 0x8000, 0xfb5ef2fa}, {0x285, 0x7, 0x2, 0xffff085d}, {0x38, 0x7, 0xba, 0x6ec9}, {0x5, 0x4, 0x400, 0x60}, {0xffffffff, 0x7, 0x9, 0x8}, {0x0, 0x5, 0x7f, 0xfff}, {0x0, 0x8001, 0x2, 0x3}, {0x791180, 0xfffffff9, 0x10001, 0x9}, {0xb1ec, 0x8, 0xfffffffb, 0x9}, {0x2, 0x3, 0x400, 0x60000000}, {0xca, 0x0, 0x81, 0x6}, {0x3, 0x3f040000, 0xeb18, 0xffffffff}, {0x4, 0x6, 0xa56, 0x5}, {0x800, 0x1, 0x4, 0x3}, {0xffff, 0xe58, 0x3, 0x7f}, {0x3ff, 0x7, 0x1, 0x20}, {0x64, 0x0, 0x82bc, 0x3}, {0x2, 0x2, 0x9, 0x3}, {0x5, 0x6, 0x9, 0x6}, {0x5a, 0x2, 0x2, 0x10000}]}}]}}]}, 0x764}}, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000200), 0x4924924924926d3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000002d006d54007a08b267ae3604b5000000", @ANYRES32=r3, @ANYBLOB="00080080000000000800f1ff"], 0x24}}, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200), 0x4924924924926d3, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r6 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r6, &(0x7f0000000180)='./file0\x00', r0, &(0x7f0000000640)='./file0/file0\x00', 0x0) 04:14:17 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:14:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r8, 0x2}, &(0x7f0000000080)=0x8) 04:14:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40}]) [ 370.510147][T30694] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 370.531852][T30692] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 370.531852][T30692] [ 370.593242][T30696] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 04:14:17 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 04:14:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) r0 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=@newtfilter={0x764, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x8}, {0x8, 0xfff1}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x738, 0x2, [@TCA_U32_SEL={0x734, 0x5, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x27, 0x4, 0x2, 0x80000000}, {0x11d, 0x8, 0xffffffff, 0x69}, {0x7, 0x80000000, 0x80000001, 0xb63}, {0xffffffff, 0x0, 0x4, 0x3}, {0x5, 0x0, 0x0, 0x40}, {0x5, 0x4, 0x8, 0x6}, {0x7, 0x101, 0x7b56b858, 0xffff6a27}, {0x3, 0x4, 0x100, 0xffffffff}, {0xf9, 0x6, 0x6, 0x19}, {0x9, 0x1f, 0xb0b}, {0x5, 0x117, 0x9, 0x6461}, {0x7fffffff, 0x81, 0x6, 0x400}, {0x5, 0xbb, 0x6, 0xfffff390}, {0xff, 0x9, 0xfffffffc, 0x5cd7}, {0x4e7a, 0x1, 0x1, 0x3f}, {0x5, 0x0, 0x6, 0x6}, {0x6df, 0x20, 0x101, 0x67e}, {0x3, 0x6, 0xffffffb5, 0x5}, {0x0, 0x2, 0x3f, 0x200}, {0x2, 0x726}, {0x7, 0x800, 0xfff, 0x7}, {0x7, 0x8, 0x6, 0x2}, {0x5223bebd, 0x0, 0x800, 0xd37}, {0xfffffffb, 0x1, 0x6, 0x1f}, {0x2, 0xd8, 0x6, 0xc807}, {0x8, 0x6, 0x8, 0x9}, {0x40, 0x40, 0x9, 0x9}, {0x4, 0x1000, 0xab6, 0xdd}, {0xff, 0x6, 0x1, 0xfffffffd}, {0x8, 0x1, 0x3fcc, 0x5}, {0xfffffffe, 0x23d0, 0x3, 0x3}, {0x6, 0x0, 0x8, 0x1d8be730}, {0x20, 0x7101, 0x2, 0x8001}, {0x0, 0x16f330bf, 0x10000, 0xfffffff9}, {0x40, 0x9, 0x6, 0xfff}, {0x7f, 0x2, 0x7, 0x8001}, {0x6, 0x400, 0x0, 0x1000}, {0x0, 0x9, 0x8d9b, 0x6}, {0x9, 0xfff00, 0x4e48a602, 0x9788}, {0x1400000, 0x9, 0x4, 0x400}, {0x7, 0x8, 0x6, 0x80000001}, {0x7fffffff, 0x8000, 0xe}, {0x7, 0x3, 0x4, 0xdf42}, {0x10001, 0x4, 0x3, 0x3ff}, {0x5, 0x6}, {0x7, 0x2, 0xfffffff7, 0x1f}, {0x1, 0x6, 0x1, 0x4}, {0x8000, 0x7f, 0x13, 0x95}, {0x2, 0xff, 0x3ff, 0x9}, {0x3, 0x81, 0x6}, {0x1, 0x0, 0x11, 0x8}, {0x7, 0xfffffffc, 0x8, 0x2}, {0x100, 0x800, 0x7861, 0xe1a}, {0x8, 0x67d, 0x4, 0x10b}, {0x3f, 0x400, 0x0, 0xfffffffb}, {0x7, 0x0, 0x20, 0x3f}, {0x4, 0x9, 0xfffff31f, 0x1}, {0x200, 0xfffffffd, 0x1668, 0x1000}, {0x6, 0x81, 0x9, 0x7fff}, {0x8, 0x7, 0x1, 0x100}, {0x7fff, 0x101, 0xffff, 0x7}, {0x1, 0x5c, 0x996, 0x4}, {0x0, 0x8, 0xffffffff, 0x10000}, {0x80000000, 0x7f, 0x6, 0x2}, {0x40, 0x3f, 0x8, 0x2}, {0x9, 0x8, 0x0, 0x6}, {0x1, 0x5, 0x0, 0x337}, {0x1, 0xed8, 0x1, 0x9}, {0x1, 0x0, 0x40, 0x3}, {0x0, 0x7, 0x4, 0x1ff}, {0x7, 0x2, 0x39, 0x3}, {0x0, 0x8, 0x1f, 0x7ff}, {0x4, 0x1, 0x400, 0x1ff}, {0x7, 0x6, 0x10001, 0xc62d}, {0x3ff, 0xffffff23, 0x7fff, 0x3}, {0x169e, 0x9, 0x9, 0x400}, {0x9, 0x3, 0x2, 0x10000}, {0x7, 0x4, 0x8001, 0x1}, {0xffff, 0x9, 0x6, 0x100}, {0x0, 0xe5a5, 0xffae, 0xa000000}, {0x0, 0x80000000, 0x2489, 0x2}, {0x5, 0x0, 0x20, 0x4}, {0x0, 0x0, 0xeda3, 0x77}, {0xfffffff8, 0x5, 0x2, 0x1000}, {0x0, 0x6, 0x2, 0x34f8d75}, {0x101, 0x5, 0x6, 0x1}, {0x80000000, 0x3, 0x1, 0xcbb2}, {0x8, 0x81, 0xfffffe01, 0x5}, {0xfffff001, 0x7fff, 0x6, 0xfffffffb}, {0x8, 0x1, 0x7}, {0xffff7fff, 0x2, 0x0, 0xfffffff9}, {0x5, 0xeb, 0x8001, 0x4}, {0x4, 0x4, 0x2, 0x3}, {0x2, 0x2, 0x6, 0x80000000}, {0x8bcecd4, 0x6082, 0x8000, 0xfb5ef2fa}, {0x285, 0x7, 0x2, 0xffff085d}, {0x38, 0x7, 0xba, 0x6ec9}, {0x5, 0x4, 0x400, 0x60}, {0xffffffff, 0x7, 0x9, 0x8}, {0x0, 0x5, 0x7f, 0xfff}, {0x0, 0x8001, 0x2, 0x3}, {0x791180, 0xfffffff9, 0x10001, 0x9}, {0xb1ec, 0x8, 0xfffffffb, 0x9}, {0x2, 0x3, 0x400, 0x60000000}, {0xca, 0x0, 0x81, 0x6}, {0x3, 0x3f040000, 0xeb18, 0xffffffff}, {0x4, 0x6, 0xa56, 0x5}, {0x800, 0x1, 0x4, 0x3}, {0xffff, 0xe58, 0x3, 0x7f}, {0x3ff, 0x7, 0x1, 0x20}, {0x64, 0x0, 0x82bc, 0x3}, {0x2, 0x2, 0x9, 0x3}, {0x5, 0x6, 0x9, 0x6}, {0x5a, 0x2, 0x2, 0x10000}]}}]}}]}, 0x764}}, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000200), 0x4924924924926d3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000002d006d54007a08b267ae3604b5000000", @ANYRES32=r3, @ANYBLOB="00080080000000000800f1ff"], 0x24}}, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200), 0x4924924924926d3, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r6 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r6, &(0x7f0000000180)='./file0\x00', r0, &(0x7f0000000640)='./file0/file0\x00', 0x0) 04:14:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3, 0x5}, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x20000009}) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)) epoll_create(0x6) openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00') 04:14:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40}]) [ 370.805608][T30724] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 370.805608][T30724] [ 370.870226][T30731] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 04:14:18 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 04:14:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0xffff88809f195418, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) 04:14:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40}]) 04:14:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r8, 0x2}, &(0x7f0000000080)=0x8) 04:14:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) ioctl$int_out(r0, 0x5462, &(0x7f0000000000)) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x0) 04:14:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r8, 0x2}, &(0x7f0000000080)=0x8) 04:14:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) [ 371.426604][T30763] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 371.426604][T30763] 04:14:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) 04:14:18 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') write(0xffffffffffffffff, &(0x7f00000001c0)="24ebf437fbd841d24b21a6a5347bc923e7a7b00fac4957755407f4f9f5237d58261bf1be81ffbdb9cd751ad02a769aae0846a1ee9ba689bd9dacc33d7ba494f4", 0x40) ioctl$int_out(r0, 0x5462, &(0x7f0000000000)) r1 = open(&(0x7f0000000300)='.\x00', 0x880, 0x2) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xba) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r2, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000640)='./file0/file0\x00', 0x0) 04:14:18 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@nolargeio='nolargeio'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 04:14:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r8, 0x2}, &(0x7f0000000080)=0x8) 04:14:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 04:14:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) [ 371.715393][T30782] REISERFS warning (device loop2): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 371.715393][T30782] 04:14:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0xffff88809f195a18, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) 04:14:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) 04:14:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) 04:14:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 04:14:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 04:14:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 04:14:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 04:14:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) socket$inet(0x2, 0x80001, 0x84) 04:14:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 04:14:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) 04:14:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) socket$inet(0x2, 0x80001, 0x84) 04:14:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) 04:14:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) 04:14:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 04:14:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) 04:14:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0xffff88809f195b98, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) socket$inet(0x2, 0x80001, 0x84) 04:14:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) socket$inet(0x2, 0x80001, 0x84) 04:14:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x5, 0x84) 04:14:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x5, 0x84) 04:14:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x7b, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x8) 04:14:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) 04:14:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:14:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) 04:14:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0xffff88809f221e98, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:14:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x5, 0x84) 04:14:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x5, 0x84) 04:14:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) 04:14:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x5, 0x84) 04:14:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:14:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) 04:14:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:14:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) 04:14:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x5, 0x84) 04:14:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x5, 0x84) 04:14:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0xffff88809f2b5798, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) 04:14:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 04:14:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) 04:14:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) 04:14:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:14:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) 04:14:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 04:14:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) 04:14:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) 04:14:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:14:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:14:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0xffff88809f2b6698, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 04:14:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) 04:14:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 04:14:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) 04:14:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:14:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) 04:14:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) 04:14:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:14:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) 04:14:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) 04:14:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:14:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0xffff88809fe3c318, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:14:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) 04:14:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) 04:14:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:14:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:14:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) 04:14:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) 04:14:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:14:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 04:14:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0xffffc90000000000, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) 04:14:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) 04:14:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) 04:14:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) 04:14:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:14:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) 04:14:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) 04:14:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="03015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 04:14:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x300) 04:14:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x30}}, 0x0) [ 378.424509][T31109] loop5: p1[EZD] p2 p3 p4 [ 378.429043][T31109] loop5: partition table partially beyond EOD, truncated [ 378.436744][T31109] loop5: p1 start 4098 is beyond EOD, truncated [ 378.449674][T31109] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 378.457534][T31109] loop5: p3 start 225 is beyond EOD, truncated [ 378.464370][T31109] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) 04:14:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x8004) 04:14:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="04015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) 04:14:25 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x30}}, 0x0) [ 378.690384][T31141] loop5: p1[EZD] p2 p3 p4 [ 378.690389][T31141] loop5: partition table partially beyond EOD, truncated [ 378.690451][T31141] loop5: p1 start 4098 is beyond EOD, truncated 04:14:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:25 executing program 0: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) [ 378.764655][T31141] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) 04:14:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) [ 378.814533][T31141] loop5: p3 start 225 is beyond EOD, truncated [ 378.836605][T31141] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="05015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:26 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 0: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 0: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) 04:14:26 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 3: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) [ 379.050431][T31185] loop5: p1[EZD] p2 p3 p4 [ 379.054866][T31185] loop5: partition table partially beyond EOD, truncated [ 379.069039][T31185] loop5: p1 start 4098 is beyond EOD, truncated [ 379.082888][T31185] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 379.098908][T31185] loop5: p3 start 225 is beyond EOD, truncated [ 379.111770][T31185] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="06015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:26 executing program 3: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) 04:14:26 executing program 1: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) 04:14:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 1: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 2: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 3: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x140}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x30}}, 0x0) [ 379.310531][T31218] loop5: p1[EZD] p2 p3 p4 [ 379.315081][T31218] loop5: partition table partially beyond EOD, truncated [ 379.327021][T31218] loop5: p1 start 4098 is beyond EOD, truncated [ 379.334153][T31218] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 379.347626][T31218] loop5: p3 start 225 is beyond EOD, truncated 04:14:26 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) [ 379.354556][T31218] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="07015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:26 executing program 1: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 2: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 2: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) 04:14:26 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 4: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 04:14:26 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) [ 379.560519][T31247] loop5: p1[EZD] p2 p3 p4 [ 379.565019][T31247] loop5: partition table partially beyond EOD, truncated [ 379.598761][T31247] loop5: p1 start 4098 is beyond EOD, truncated [ 379.605166][T31247] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 379.613627][T31247] loop5: p3 start 225 is beyond EOD, truncated [ 379.624251][T31247] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="08015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:26 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b0617710b364ceb099d320be6215a5d95da232ab2f5c7c453c72928f1c2cc996e5957ecd5fa9883c646c0644a5edfcad6d6e471fd32d4427c8bfdd1d8c619004f29dff5649ca34c1e4f5958e963f41d3d9b8eb6c6c69fae6448410c59405211037c873da9a212b96c39932147132ffeca6fb6c98bb7385f1e6a5005d784da53dc4357e8ac39f8ca93e4184ddef5f5cce35700464a15f9b4da0d819b22b562050725a1466103cac5c930fcad0399884ec02bb440d69074803c4263483c616394180bc045f434087b5d4aca1cf18338f8fc0a26454b2be3bf9b42d86013e696c4e91291c846a52b35f7b0fe39409c31d0aab78d1fa01c16218f32127a244ef6247cb10700b5e378550ad9738230eb26d3d50cd7b4638dd411edd688190e783ce002073b54bcb885071742f4000000000000000000"], 0x30}}, 0x0) 04:14:26 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 04:14:26 executing program 4: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 04:14:26 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 04:14:26 executing program 4: r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:26 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 04:14:26 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) [ 379.851951][T31287] loop5: p1[EZD] p2 p3 p4 [ 379.856457][T31287] loop5: partition table partially beyond EOD, truncated [ 379.864262][T31287] loop5: p1 start 4098 is beyond EOD, truncated [ 379.873711][T31287] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 379.886737][T31287] loop5: p3 start 225 is beyond EOD, truncated [ 379.893510][T31287] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="09015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:27 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:27 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 04:14:27 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 04:14:27 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:27 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:14:27 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 04:14:27 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:14:27 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 04:14:27 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:27 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:14:27 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 380.081775][T31321] loop5: p1[EZD] p2 p3 p4 [ 380.086319][T31321] loop5: partition table partially beyond EOD, truncated [ 380.096785][T31321] loop5: p1 start 4098 is beyond EOD, truncated [ 380.107824][T31321] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 380.115801][T31321] loop5: p3 start 225 is beyond EOD, truncated [ 380.124325][T31321] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0a015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:27 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 04:14:27 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:14:27 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 04:14:27 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:14:27 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:14:27 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 04:14:27 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:14:27 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 04:14:27 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) [ 380.270473][T31350] loop5: p1[EZD] p2 p3 p4 [ 380.275064][T31350] loop5: partition table partially beyond EOD, truncated [ 380.286493][T31350] loop5: p1 start 4098 is beyond EOD, truncated [ 380.293553][T31350] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 380.307963][T31350] loop5: p3 start 225 is beyond EOD, truncated 04:14:27 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) 04:14:27 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 380.315220][T31350] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="10015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:27 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 04:14:27 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) 04:14:27 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:14:27 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) 04:14:27 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) 04:14:27 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:14:27 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:14:27 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) 04:14:27 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) [ 380.480280][T31378] loop5: p1[EZD] p2 p3 p4 [ 380.485665][T31378] loop5: partition table partially beyond EOD, truncated 04:14:27 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:14:27 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) [ 380.554954][T31378] loop5: p1 start 4098 is beyond EOD, truncated [ 380.586869][T31378] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 380.596788][T31378] loop5: p3 start 225 is beyond EOD, truncated [ 380.610029][T31378] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="12015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:27 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) 04:14:27 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:14:27 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) 04:14:27 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:14:27 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) 04:14:27 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) 04:14:27 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) 04:14:27 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) 04:14:27 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) 04:14:27 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) 04:14:27 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) [ 380.811386][T31419] loop5: p1[EZD] p2 p3 p4 [ 380.815912][T31419] loop5: partition table partially beyond EOD, truncated [ 380.853307][T31419] loop5: p1 start 4098 is beyond EOD, truncated [ 380.875250][T31419] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 380.885846][T31419] loop5: p3 start 225 is beyond EOD, truncated [ 380.893811][T31419] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="13015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:28 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) 04:14:28 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) 04:14:28 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) 04:14:28 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) 04:14:28 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) 04:14:28 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) 04:14:28 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) 04:14:28 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) 04:14:28 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) [ 381.100523][T31456] loop5: p1[EZD] p2 p3 p4 [ 381.104994][T31456] loop5: partition table partially beyond EOD, truncated [ 381.112220][T31456] loop5: p1 start 4098 is beyond EOD, truncated [ 381.118493][T31456] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 381.133696][T31456] loop5: p3 start 225 is beyond EOD, truncated [ 381.139862][T31456] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="1a015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:28 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) 04:14:28 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) 04:14:28 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) 04:14:28 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:28 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0], 0x30}}, 0x0) [ 381.304696][T31486] loop5: p1[EZD] p2 p3 p4 [ 381.310319][T31486] loop5: partition table partially beyond EOD, truncated [ 381.344679][T31486] loop5: p1 start 4098 is beyond EOD, truncated [ 381.375706][T31486] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 381.389068][T31486] loop5: p3 start 225 is beyond EOD, truncated [ 381.398551][T31486] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:28 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="64015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:28 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:28 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c37f794b87602d2bdb2ab29363f9fc75cdbf314f6f8614637cd678614d3b678d1dc2d49709f13186458b1fcfbe7c7ff01125dd82daf3c26419b36c103b6274dcc317c0202b507073fe2214b1f4fdf816eed8a70378b7ff336dd179fce21db81d04fcd7fd7b347eddee5dd0c008c0064dee50d0e68e19beef253a95696b32c63477c6e8dd5454be9be617236c7687c637c42b2340ba43add6080b"], 0x30}}, 0x0) 04:14:28 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) [ 381.578089][T31523] loop5: p1[EZD] p2 p3 p4 [ 381.587057][T31523] loop5: partition table partially beyond EOD, truncated 04:14:28 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:28 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="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"], 0x30}}, 0x0) 04:14:28 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) [ 381.664233][T31523] loop5: p1 start 4098 is beyond EOD, truncated [ 381.687009][T31523] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 381.695428][T31523] loop5: p3 start 225 is beyond EOD, truncated [ 381.706395][T31523] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="e0015500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:28 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c3"], 0x30}}, 0x0) 04:14:28 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:28 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:29 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) 04:14:29 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) [ 381.915009][T31561] loop5: p1[EZD] p2 p3 p4 [ 381.919476][T31561] loop5: partition table partially beyond EOD, truncated [ 381.947356][T31561] loop5: p1 start 4098 is beyond EOD, truncated [ 381.983088][T31561] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 382.040827][T31561] loop5: p3 start 225 is beyond EOD, truncated [ 382.047012][T31561] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:29 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:29 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) 04:14:29 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:29 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB], 0x30}}, 0x0) 04:14:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02044c00000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:29 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c3"], 0x30}}, 0x0) 04:14:29 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb"], 0x30}}, 0x0) 04:14:29 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c3"], 0x30}}, 0x0) 04:14:29 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) 04:14:29 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c3"], 0x30}}, 0x0) 04:14:29 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb47cff4238f91d7c254cadb40a8287ec5f98dc8fc868ba558976ac024805270a0166da6db2b926eb9dc49e3711191e83f56f2a86ecc8139f363ac61971485fd3e8f0d61c05499a427581f54c3"], 0x30}}, 0x0) [ 382.201838][T31596] loop5: p1 p2 p3 p4 [ 382.205848][T31596] loop5: partition table partially beyond EOD, truncated [ 382.231084][T31596] loop5: p1 start 4098 is beyond EOD, truncated [ 382.238728][T31596] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:29 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) 04:14:29 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) 04:14:29 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) [ 382.246843][T31596] loop5: p3 start 225 is beyond EOD, truncated [ 382.253679][T31596] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:29 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:29 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) 04:14:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02025500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:29 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) 04:14:29 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) 04:14:29 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) 04:14:29 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:29 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) 04:14:29 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) 04:14:29 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) [ 382.484531][T31632] loop5: p1[EZD] p2 p3 p4 [ 382.489022][T31632] loop5: partition table partially beyond EOD, truncated [ 382.502836][T31632] loop5: p1 start 4098 is beyond EOD, truncated [ 382.516911][T31632] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:29 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x30}}, 0x0) [ 382.533290][T31632] loop5: p3 start 225 is beyond EOD, truncated 04:14:29 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:29 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb"], 0x30}}, 0x0) [ 382.557682][T31632] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:29 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb"], 0x30}}, 0x0) 04:14:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02035500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:29 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb"], 0x30}}, 0x0) 04:14:29 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a7767310000f68890114eb9726358fda3aad815b3b427912434b13b4cd02582515e6c8382207b1aedeb"], 0x30}}, 0x0) 04:14:29 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:29 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:29 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a776731"], 0x30}}, 0x0) 04:14:29 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:29 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:29 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:29 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:29 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:29 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) [ 382.794604][T31674] loop5: p1[EZD] p2 p3 p4 [ 382.801230][T31674] loop5: partition table partially beyond EOD, truncated [ 382.853430][T31674] loop5: p1 start 4098 is beyond EOD, truncated [ 382.870602][T31674] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 382.878291][T31674] loop5: p3 start 225 is beyond EOD, truncated [ 382.884673][T31674] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02045500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:30 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) 04:14:30 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a776731"], 0x30}}, 0x0) 04:14:30 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a776731"], 0x30}}, 0x0) 04:14:30 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) [ 383.089122][T31705] loop5: p1[EZD] p2 p3 p4 [ 383.095887][T31705] loop5: partition table partially beyond EOD, truncated [ 383.107672][T31705] loop5: p1 start 4098 is beyond EOD, truncated [ 383.121085][T31705] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 383.137288][T31705] loop5: p3 start 225 is beyond EOD, truncated [ 383.148994][T31705] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02055500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:30 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a776731"], 0x30}}, 0x0) 04:14:30 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017020000000000000069623a776731"], 0x30}}, 0x0) 04:14:30 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) 04:14:30 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100170200000000"], 0x30}}, 0x0) 04:14:30 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) [ 383.331235][T31743] loop5: p1[EZD] p2 p3 p4 [ 383.335750][T31743] loop5: partition table partially beyond EOD, truncated [ 383.356826][T31743] loop5: p1 start 4098 is beyond EOD, truncated 04:14:30 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) [ 383.375142][T31743] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 383.392160][T31743] loop5: p3 start 225 is beyond EOD, truncated [ 383.406677][T31743] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:30 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) 04:14:30 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02065500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:30 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) 04:14:30 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) 04:14:30 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) 04:14:30 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) 04:14:30 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) 04:14:30 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100"], 0x30}}, 0x0) [ 383.672520][T31775] loop5: p1[EZD] p2 p3 p4 [ 383.676957][T31775] loop5: partition table partially beyond EOD, truncated 04:14:30 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) 04:14:30 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) [ 383.714256][T31775] loop5: p1 start 4098 is beyond EOD, truncated [ 383.748158][T31775] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:30 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) 04:14:30 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) [ 383.789100][T31775] loop5: p3 start 225 is beyond EOD, truncated [ 383.841961][T31775] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02075500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:30 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) 04:14:30 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) 04:14:30 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) 04:14:30 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100000001001702"], 0x30}}, 0x0) 04:14:30 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100170200000000"], 0x30}}, 0x0) 04:14:31 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) 04:14:31 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) 04:14:31 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) 04:14:31 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100170200000000"], 0x30}}, 0x0) 04:14:31 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) 04:14:31 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) [ 384.079553][T31818] loop5: p1[EZD] p2 p3 p4 [ 384.084088][T31818] loop5: partition table partially beyond EOD, truncated [ 384.121247][T31818] loop5: p1 start 4098 is beyond EOD, truncated [ 384.127603][T31818] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 384.135462][T31818] loop5: p3 start 225 is beyond EOD, truncated [ 384.141733][T31818] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02085500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:31 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100"], 0x30}}, 0x0) 04:14:31 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) 04:14:31 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100170200000000"], 0x30}}, 0x0) 04:14:31 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) 04:14:31 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) 04:14:31 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) 04:14:31 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) 04:14:31 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100170200000000"], 0x30}}, 0x0) 04:14:31 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) 04:14:31 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) [ 384.310342][T31852] loop5: p1[EZD] p2 p3 p4 [ 384.314776][T31852] loop5: partition table partially beyond EOD, truncated [ 384.345864][T31852] loop5: p1 start 4098 is beyond EOD, truncated 04:14:31 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) [ 384.389140][T31852] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="020a5500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:31 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100000001001702"], 0x30}}, 0x0) 04:14:31 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100000001001702"], 0x30}}, 0x0) 04:14:31 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:31 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) 04:14:31 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) [ 384.459285][T31852] loop5: p3 start 225 is beyond EOD, truncated [ 384.485002][T31852] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:31 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) 04:14:31 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) 04:14:31 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:31 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) 04:14:31 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100000001001702"], 0x30}}, 0x0) 04:14:31 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) [ 384.651021][T31889] loop5: p1[EZD] p2 p3 p4 [ 384.657746][T31889] loop5: partition table partially beyond EOD, truncated [ 384.696961][T31889] loop5: p1 start 4098 is beyond EOD, truncated [ 384.736594][T31889] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 384.788988][T31889] loop5: p3 start 225 is beyond EOD, truncated [ 384.803889][T31889] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02105500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:31 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000"], 0x30}}, 0x0) 04:14:31 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) 04:14:31 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) 04:14:31 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:31 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) 04:14:32 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) 04:14:32 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) 04:14:32 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:32 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100000000000000014100000001001702"], 0x30}}, 0x0) 04:14:32 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) [ 384.990332][T31926] loop5: p1[EZD] p2 p3 p4 [ 384.994825][T31926] loop5: partition table partially beyond EOD, truncated [ 385.027401][T31926] loop5: p1 start 4098 is beyond EOD, truncated [ 385.047186][T31926] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 385.056604][T31926] loop5: p3 start 225 is beyond EOD, truncated [ 385.063442][T31926] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02125500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:32 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) 04:14:32 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) 04:14:32 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:32 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) 04:14:32 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) [ 385.270178][T31959] loop5: p1[EZD] p2 p3 p4 [ 385.275080][T31959] loop5: partition table partially beyond EOD, truncated [ 385.305883][T31959] loop5: p1 start 4098 is beyond EOD, truncated [ 385.314607][T31959] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 385.322808][T31959] loop5: p3 start 225 is beyond EOD, truncated [ 385.345379][T31959] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02145500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:32 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:32 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000"], 0x30}}, 0x0) 04:14:32 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:32 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) [ 385.574250][T31993] loop5: p1[EZD] p2 p3 p4 [ 385.579129][T31993] loop5: partition table partially beyond EOD, truncated [ 385.602607][T31993] loop5: p1 start 4098 is beyond EOD, truncated [ 385.609505][T31993] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:32 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) [ 385.618567][T31993] loop5: p3 start 225 is beyond EOD, truncated [ 385.632562][T31993] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="021d5500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:32 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:32 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:32 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:32 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:32 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:32 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) [ 385.882489][T32028] loop5: p1[EZD] p2 p3 p4 [ 385.887872][T32028] loop5: partition table partially beyond EOD, truncated [ 385.943704][T32028] loop5: p1 start 4098 is beyond EOD, truncated 04:14:33 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) [ 385.991215][T32028] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 386.009613][T32028] loop5: p3 start 225 is beyond EOD, truncated [ 386.035408][T32028] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02255500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:33 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:33 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:33 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) [ 386.220091][T32064] loop5: p1[EZD] p2 p3 p4 [ 386.225364][T32064] loop5: partition table partially beyond EOD, truncated [ 386.276754][T32064] loop5: p1 start 4098 is beyond EOD, truncated 04:14:33 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) [ 386.325543][T32064] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 386.394577][T32064] loop5: p3 start 225 is beyond EOD, truncated [ 386.412120][T32064] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:33 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:33 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02275500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:33 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000000000001410000000100"], 0x30}}, 0x0) 04:14:33 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) [ 386.632757][T32106] loop5: p1[EZD] p2 p3 p4 [ 386.642300][T32106] loop5: partition table partially beyond EOD, truncated [ 386.657719][T32106] loop5: p1 start 4098 is beyond EOD, truncated [ 386.665543][T32106] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 386.675301][T32106] loop5: p3 start 225 is beyond EOD, truncated [ 386.682165][T32106] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="022c5500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:33 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:33 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) [ 386.870191][T32141] loop5: p1[EZD] p2 p3 p4 [ 386.874930][T32141] loop5: partition table partially beyond EOD, truncated [ 386.927689][T32141] loop5: p1 start 4098 is beyond EOD, truncated [ 386.958811][T32141] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 386.975458][T32141] loop5: p3 start 225 is beyond EOD, truncated [ 386.982474][T32141] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:34 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02645500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:34 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) [ 387.160148][T32175] loop5: p1[EZD] p2 p3 p4 [ 387.165092][T32175] loop5: partition table partially beyond EOD, truncated [ 387.174579][T32175] loop5: p1 start 4098 is beyond EOD, truncated [ 387.192087][T32175] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:34 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 2: syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) [ 387.207409][T32175] loop5: p3 start 225 is beyond EOD, truncated [ 387.214796][T32175] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:34 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02e15500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:34 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) [ 387.502202][T32215] loop5: p1[EZD] p2 p3 p4 [ 387.507312][T32215] loop5: partition table partially beyond EOD, truncated [ 387.515830][T32215] loop5: p1 start 4098 is beyond EOD, truncated [ 387.539596][T32215] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 387.549041][T32215] loop5: p3 start 225 is beyond EOD, truncated [ 387.564118][T32215] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02010500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:34 executing program 0: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 0: 04:14:34 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) [ 387.738258][T32248] loop5: p1 < > p2 p3 p4 [ 387.745076][T32248] loop5: partition table partially beyond EOD, truncated [ 387.759473][T32248] loop5: p1 start 4098 is beyond EOD, truncated [ 387.766586][T32248] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 387.776806][T32248] loop5: p3 start 225 is beyond EOD, truncated 04:14:34 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) [ 387.784014][T32248] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02010f00000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:34 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:34 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f00000007c0)=0xffff, 0x4) bind$can_raw(r0, &(0x7f0000000140), 0x10) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f00000007c0), 0x4) 04:14:34 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:35 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:35 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:35 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:35 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r2, 0x65, 0x2, &(0x7f00000007c0), 0x4) 04:14:35 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:35 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) [ 388.039087][T32286] loop5: p1 < > p2 p3 p4 [ 388.046173][T32286] loop5: partition table partially beyond EOD, truncated [ 388.059150][T32286] loop5: p1 start 4098 is beyond EOD, truncated [ 388.068913][T32286] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 388.076676][T32286] loop5: p3 start 225 is beyond EOD, truncated [ 388.084595][T32286] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02012500000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:35 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x10, r3, 0xf}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 04:14:35 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:35 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:35 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x2}, 0x0, 0x100}) 04:14:35 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:35 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:35 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x1001040, &(0x7f0000000a00)={[{@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'netdevsim\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, ',{+'}}, {@fowner_lt={'fowner<'}}]}) [ 388.199706][T32318] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 388.254028][T32316] loop5: p1 p2 p3 p4 [ 388.268653][T32316] loop5: partition table partially beyond EOD, truncated 04:14:35 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000180)='./file0\x00', r0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2) rmdir(&(0x7f0000000000)='./file0\x00') [ 388.306314][T32316] loop5: p1 start 4098 is beyond EOD, truncated 04:14:35 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='rxrpc_s\x00', &(0x7f00000001c0)='[{\xdf%-:*\x00') 04:14:35 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) [ 388.354881][T32316] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 388.383375][T32316] loop5: p3 start 225 is beyond EOD, truncated [ 388.400335][T32316] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02014200000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:35 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:35 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000100)) 04:14:35 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r2 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, r1, 0x536ae464467e3929, 0x0, 0x0, {0x25, 0x0, 0x6800}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}]}, 0x3c}, 0x1, 0x6000000000000000}, 0x0) 04:14:35 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1ac5e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2) recvfrom$netrom(r0, &(0x7f0000000100)=""/77, 0x4d, 0x10000, 0x0, 0x0) 04:14:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9fe03c6630d698cb89e0bf088ca", 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 04:14:35 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000001000000000000000141000000010017"], 0x30}}, 0x0) 04:14:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x2}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x2}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) 04:14:35 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) poll(&(0x7f0000000080)=[{r0}, {}, {}], 0x3, 0x0) 04:14:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000040)=@mangle={'mangle\x00', 0x64, 0x6, 0x618, 0x310, 0x0, 0x0, 0x0, 0xd0, 0x548, 0x548, 0x548, 0x548, 0x548, 0x6, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a], 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'team_slave_1\x00'}, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00'}}, {{@ipv6={@ipv4={[], [], @multicast2}, @remote, [], [], '\x00', 'bond_slave_0\x00'}, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @dev, @private1, @empty}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@rand_addr=' \x01\x00', @ipv4={[], [], @broadcast}, [], [], 'gre0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@hbh={{0x48, 'hbh\x00'}, {0x0, 0x0, 0x0, [], 0x10}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x678) [ 388.650092][T32380] ldm_validate_privheads(): Disk read failed. [ 388.687632][T32380] loop5: p1 p2 p3 p4 [ 388.705062][T32380] loop5: partition table partially beyond EOD, truncated [ 388.739249][T32380] loop5: p1 start 4098 is beyond EOD, truncated 04:14:35 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uname(&(0x7f00000000c0)=""/46) [ 388.759159][T32380] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 388.779910][T32398] Cannot find add_set index 0 as target 04:14:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0xf}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x5003f00, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x28, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_TARGET_NETNSID={0x8}]}, 0x28}}, 0x0) [ 388.803617][T32405] Cannot find add_set index 0 as target [ 388.815596][T32380] loop5: p3 start 225 is beyond EOD, truncated [ 388.844800][T32380] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015400000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) semop(0x0, &(0x7f0000000200)=[{0x0, 0x0, 0x1000}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) 04:14:36 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000280)={@link_local={0x3}, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "bf6e11", 0x8, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], @echo_request}}}}}, 0x0) [ 389.080958][T32428] loop5: p1[DM] p2 p3 p4 [ 389.090003][T32428] loop5: partition table partially beyond EOD, truncated [ 389.123620][T32428] loop5: p1 start 4098 is beyond EOD, truncated [ 389.131895][T32428] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 389.139587][T32428] loop5: p3 start 225 is beyond EOD, truncated [ 389.146517][T32428] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:36 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYBLOB="3f00fd00e0bbb557f3b0b93742c379983fe48e8739ad15be144a70a053dfcdeb987fbd3c236bfa1c251b4a45bfe30f444dc5e314658f7c945fa4adbb2c9249dd44be32dc79b39812dda876840f3f971dd75e672624fe1584a53a"], 0x0) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200052203, 0x40000000800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 04:14:36 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 04:14:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7499c792bbaf4b06d3585a09a87507ebf4e1404a7844447a48cb0c2136f78627830c2d37104742608d3615d1a04a48dd451cbf291a89b491a151876ff316c5f9dcbb6b946ba8b5822"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 04:14:36 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, &(0x7f0000000940), 0x1001040, &(0x7f0000000a00)={[], [{@obj_user={'obj_user', 0x3d, '0000:00:10.0\x00'}}]}) 04:14:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000780)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000700000004000000d0034800000200000002000000010000e8020000e8020000e802000004"], 0x1) 04:14:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015e00000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x1001040, &(0x7f0000000a00)) [ 389.601466][T32484] loop5: p1 p2 p3 p4 [ 389.605520][T32484] loop5: partition table partially beyond EOD, truncated [ 389.628920][T32484] loop5: p1 start 4098 is beyond EOD, truncated 04:14:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7499c792bbaf4b06d3585a09a87507ebf4e1404a7844447a48cb0c2136f78627830c2d37104742608d3615d1a04a48dd451cbf291a89b491a151876ff316c5f9dcbb6b946ba8b5822"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) [ 389.654513][T32484] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 389.665411][T32484] loop5: p3 start 225 is beyond EOD, truncated 04:14:36 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) sendfile(r1, r0, 0x0, 0x4000000000010043) 04:14:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') lseek(r3, 0x0, 0x4) [ 389.708836][T32484] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:36 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) sendfile(r1, r0, 0x0, 0x4000000000010043) 04:14:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[], 0x2c}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000080), 0x21e, 0x40010002, 0x0) 04:14:37 executing program 1: openat$ptmx(0xffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 04:14:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02016300000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @remote, 0x0, 0x1, 'dh\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000100)=0x68) 04:14:37 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 04:14:37 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x18}], 0x1000000000000308) 04:14:37 executing program 0: socket$inet(0x2, 0x2, 0x0) 04:14:37 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000200)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x2}, 0x1c, &(0x7f00000001c0)=[{&(0x7f00000002c0)="87", 0x1}], 0x1, &(0x7f00000003c0)=[{0xc}, {0xc}], 0x18}, 0x0) 04:14:37 executing program 2: r0 = shmget(0x0, 0x4000, 0x240, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_RMID(r0, 0x0) [ 390.560036][T32542] loop5: p1 p2 p3 p4 [ 390.564857][T32542] loop5: partition table partially beyond EOD, truncated [ 390.578134][T32542] loop5: p1 start 4098 is beyond EOD, truncated [ 390.609051][T32542] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 390.640630][T32542] loop5: p3 start 225 is beyond EOD, truncated 04:14:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/sem\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x60, 0x0) [ 390.662491][T32542] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:37 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x141242, 0x0) r2 = memfd_create(&(0x7f0000000380)='iC\x00\x00\xb6p+\xc2', 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000180)="52e86428f1ee7c8fecf60a8e", 0xc}], 0x1, 0x81809, 0x0) fstat(0xffffffffffffffff, &(0x7f000000c000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0)={0x0, 0x0, r4}, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x15, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20040044) getgroups(0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r4]) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xb}, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = signalfd4(r6, &(0x7f0000000800)={[0x1]}, 0x8, 0x80000) fstat(r7, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', r8, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="5f0000007d010000004a000600020000001002000000060000000000000019000042000000004eb7000006000080000000000a002f6465762f66756c6c0001003a0a002f6465762f66756c6c0002005b250000", @ANYRES32=r3, @ANYRES32=r5, @ANYRES32=r3], 0x5f) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f00000111c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="a60030155f545cbe5b96c345c727d216ebeb2e45a1524c3bb27cf3e67cd6238f5dadc0cd68d3f89f0a88d7146715a3773ada5e2bbdb5cf1c58689ef5f983e60ac85526582c0b610c70"], 0x28a8}, 0x1, 0x0, 0x0, 0x40011}, 0x20000010) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000140)=0x3, 0x4) sendfile(r1, r2, 0x0, 0x2000005) 04:14:37 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) creat(0x0, 0x8c) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x8800) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000240)) 04:14:37 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) shmdt(0x0) 04:14:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="020181ffffff02100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:37 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) creat(0x0, 0x8c) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x8800) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000240)) [ 390.790618][T32569] x_tables: duplicate underflow at hook 2 [ 390.828477][T32569] x_tables: duplicate underflow at hook 2 04:14:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@ipmr_getroute={0x1c, 0x1a, 0x1}, 0x1c}}, 0x0) 04:14:38 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) creat(0x0, 0x8c) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x8800) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000240)) [ 390.910135][T32587] loop5: p1 p2 p3 p4 [ 390.910135][T32587] p2: [ 390.923398][T32587] loop5: partition table partially beyond EOD, truncated [ 390.944001][T32587] loop5: p1 start 4098 is beyond EOD, truncated [ 390.957340][T32587] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 390.987141][T32587] loop5: p3 start 225 is beyond EOD, truncated [ 391.006826][T32587] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 391.014835][T32587] loop5: p5 start 4098 is beyond EOD, truncated [ 391.021715][T32587] loop5: p6 size 1073872896 extends beyond EOD, truncated 04:14:38 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) shmdt(0x0) 04:14:38 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) creat(0x0, 0x8c) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x8800) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000240)) 04:14:38 executing program 0: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) shmdt(0x0) 04:14:38 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:38 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) shmdt(0x0) 04:14:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="020182ffffff02100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 391.570220][T32627] loop5: p1 p2 p3 p4 [ 391.581618][T32627] loop5: partition table partially beyond EOD, truncated 04:14:38 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) creat(0x0, 0x8c) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x8800) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:14:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x40, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x40}}, 0x0) 04:14:38 executing program 0: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) shmdt(0x0) [ 391.629503][T32627] loop5: p1 start 4098 is beyond EOD, truncated 04:14:38 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:38 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) shmdt(0x0) [ 391.711335][T32627] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 391.744538][T32627] loop5: p3 start 225 is beyond EOD, truncated 04:14:38 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) shmdt(0x0) 04:14:38 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) creat(0x0, 0x8c) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x8800) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:14:38 executing program 0: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) r0 = shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x4000) shmdt(r0) [ 391.762014][T32627] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:38 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='net/ip_tables_matches\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:14:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="020185ffffff02100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:39 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) creat(0x0, 0x8c) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x8800) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) 04:14:39 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwrite64(r0, &(0x7f0000000000)="b5", 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000040)={r3, 0x9, 0x0, 0xfffffffffffffffd}) write$P9_RREMOVE(r2, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r2) inotify_init1(0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x4001, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r3, 0x1, 0x23, &(0x7f0000000100)=0x5, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x100a00, r2, 0x9}) 04:14:39 executing program 0: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) r0 = shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x4000) shmdt(r0) 04:14:39 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:39 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) creat(0x0, 0x8c) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) 04:14:39 executing program 0: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) r0 = shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x4000) shmdt(r0) [ 392.080326][T32680] loop5: p1 < > p2 p3 p4 [ 392.091983][T32680] loop5: partition table partially beyond EOD, truncated 04:14:39 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) creat(0x0, 0x8c) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) [ 392.126383][T32680] loop5: p1 start 4098 is beyond EOD, truncated [ 392.146792][T32680] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 392.161325][T32680] loop5: p3 start 225 is beyond EOD, truncated 04:14:39 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) 04:14:39 executing program 1: ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) 04:14:39 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000640)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x14}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x80000020}}], 0x3df, 0x86, 0x0) epoll_create(0x3f) [ 392.176175][T32680] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:39 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwrite64(r0, &(0x7f0000000000)="b5", 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000040)={r3, 0x9, 0x0, 0xfffffffffffffffd}) write$P9_RREMOVE(r2, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r2) inotify_init1(0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x4001, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r3, 0x1, 0x23, &(0x7f0000000100)=0x5, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x100a00, r2, 0x9}) 04:14:39 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) 04:14:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201a5ffffff02100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:39 executing program 1: ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) 04:14:39 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwrite64(r0, &(0x7f0000000000)="b5", 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000040)={r3, 0x9, 0x0, 0xfffffffffffffffd}) write$P9_RREMOVE(r2, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r2) inotify_init1(0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x4001, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r3, 0x1, 0x23, &(0x7f0000000100)=0x5, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x100a00, r2, 0x9}) 04:14:39 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000640)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x14}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x80000020}}], 0x3df, 0x86, 0x0) epoll_create(0x3f) 04:14:39 executing program 0: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwrite64(r0, &(0x7f0000000000)="b5", 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000040)={r3, 0x9, 0x0, 0xfffffffffffffffd}) write$P9_RREMOVE(r2, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r2) inotify_init1(0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x4001, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r3, 0x1, 0x23, &(0x7f0000000100)=0x5, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x100a00, r2, 0x9}) 04:14:39 executing program 1: ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) [ 392.835988][T32728] loop5: p1 p2 p3 p4 [ 392.840852][T32728] loop5: partition table partially beyond EOD, truncated 04:14:39 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) [ 392.892389][T32728] loop5: p1 start 4098 is beyond EOD, truncated [ 392.899152][T32728] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:40 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) 04:14:40 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwrite64(r0, &(0x7f0000000000)="b5", 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000040)={r3, 0x9, 0x0, 0xfffffffffffffffd}) write$P9_RREMOVE(r2, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r2) inotify_init1(0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x4001, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r3, 0x1, 0x23, &(0x7f0000000100)=0x5, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x100a00, r2, 0x9}) 04:14:40 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) [ 392.942584][T32728] loop5: p3 start 225 is beyond EOD, truncated [ 392.959938][T32728] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:40 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) 04:14:40 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) 04:14:40 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/100, 0x64}, {0x0}], 0x2) 04:14:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201a6ffffff02100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:40 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) 04:14:40 executing program 3: 04:14:40 executing program 3: 04:14:40 executing program 0: 04:14:40 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) [ 393.667299][ T310] loop5: p1 p2 p3 p4 [ 393.683158][ T310] loop5: partition table partially beyond EOD, truncated 04:14:40 executing program 3: clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, &(0x7f0000000140)={0x0, 0xfffffc01, 0x0, 0x3, 0xa155}) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) syz_genetlink_get_family_id$ipvs(0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{r2}, {0x77359400}}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:14:40 executing program 0: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwrite64(r0, &(0x7f0000000000)="b5", 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) syz_genetlink_get_family_id$gtp(0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x1b0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r2) inotify_init1(0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x100a00, r2, 0x9}) [ 393.721585][ T310] loop5: p1 start 4098 is beyond EOD, truncated [ 393.752948][ T310] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:40 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14, 0x0, 0x91}) [ 393.770348][ T321] ptrace attach of "/root/syz-executor.3"[8888] was attempted by "/root/syz-executor.3"[321] [ 393.786059][ T310] loop5: p3 start 225 is beyond EOD, truncated [ 393.795380][ T310] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 393.804883][ T321] ptrace attach of "/root/syz-executor.3"[8888] was attempted by "/root/syz-executor.3"[321] 04:14:40 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) 04:14:41 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) 04:14:41 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) 04:14:41 executing program 3: clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, &(0x7f0000000140)={0x0, 0xfffffc01, 0x0, 0x3, 0xa155}) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) syz_genetlink_get_family_id$ipvs(0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{r2}, {0x77359400}}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 04:14:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201a9ffffff02100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:41 executing program 0: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwrite64(r0, &(0x7f0000000000)="b5", 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) syz_genetlink_get_family_id$gtp(0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x1b0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r2) inotify_init1(0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x100a00, r2, 0x9}) 04:14:41 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) 04:14:41 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) [ 394.454937][ T363] ptrace attach of "/root/syz-executor.3"[8888] was attempted by "/root/syz-executor.3"[363] [ 394.520016][ T360] loop5: p1 p2 p3 p4 [ 394.534497][ T360] loop5: partition table partially beyond EOD, truncated [ 394.547447][ T360] loop5: p1 start 4098 is beyond EOD, truncated [ 394.556072][ T360] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:41 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) [ 394.566079][ T360] loop5: p3 start 225 is beyond EOD, truncated [ 394.576682][ T360] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201bfffffff02100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:41 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x91}) 04:14:41 executing program 0: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x0) 04:14:41 executing program 4: [ 394.749943][ T385] loop5: p1 p2 p3 p4 [ 394.754143][ T385] loop5: partition table partially beyond EOD, truncated [ 394.766751][ T385] loop5: p1 start 4098 is beyond EOD, truncated [ 394.774900][ T385] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 394.786860][ T385] loop5: p3 start 225 is beyond EOD, truncated [ 394.793271][ T385] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:42 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:42 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x91}) 04:14:42 executing program 4: 04:14:42 executing program 0: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x0) 04:14:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201eeffffff02100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:42 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x0) 04:14:42 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:42 executing program 4: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x49db, 0x12) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x185, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x0) 04:14:42 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x91}) 04:14:42 executing program 0: [ 395.405180][ T418] Dev loop5: unable to read RDB block 1 [ 395.410985][ T418] loop5: unable to read partition table [ 395.433721][ T418] loop5: partition table beyond EOD, truncated [ 395.446785][ T418] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:14:42 executing program 0: 04:14:42 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14}) 04:14:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201fdffffff02100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:42 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:42 executing program 4: 04:14:42 executing program 3: 04:14:42 executing program 0: 04:14:42 executing program 0: 04:14:42 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14}) 04:14:42 executing program 3: 04:14:42 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040), 0x10) writev(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(0xffffffffffffffff, 0x1) 04:14:42 executing program 4: 04:14:42 executing program 0: 04:14:42 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x14}) [ 395.675390][ T443] loop5: p1 p2 p3 p4 [ 395.685056][ T443] loop5: partition table partially beyond EOD, truncated [ 395.717038][ T443] loop5: p1 start 4098 is beyond EOD, truncated [ 395.724116][ T443] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 395.733465][ T443] loop5: p3 start 225 is beyond EOD, truncated [ 395.740019][ T443] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000400100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:42 executing program 0: 04:14:42 executing program 4: 04:14:42 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040), 0x10) writev(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(0xffffffffffffffff, 0x1) 04:14:42 executing program 1: 04:14:42 executing program 3: 04:14:42 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040), 0x10) writev(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(0xffffffffffffffff, 0x1) 04:14:43 executing program 0: 04:14:43 executing program 3: 04:14:43 executing program 1: 04:14:43 executing program 4: 04:14:43 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) [ 395.979636][ T473] loop5: p1[EZD] p2 p3 p4 [ 395.985612][ T473] loop5: partition table partially beyond EOD, truncated [ 396.008118][ T473] loop5: p1 start 4096 is beyond EOD, truncated [ 396.032684][ T473] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 396.055547][ T473] loop5: p3 start 225 is beyond EOD, truncated [ 396.063767][ T473] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500009400100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:43 executing program 0: 04:14:43 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:43 executing program 1: 04:14:43 executing program 3: 04:14:43 executing program 4: 04:14:43 executing program 4: 04:14:43 executing program 1: 04:14:43 executing program 0: 04:14:43 executing program 4: 04:14:43 executing program 3: 04:14:43 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) [ 396.234631][ T500] loop5: p1[EZD] p2 p3 p4 [ 396.243634][ T500] loop5: partition table partially beyond EOD, truncated [ 396.268579][ T500] loop5: p1 start 4096 is beyond EOD, truncated [ 396.275696][ T500] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:43 executing program 0: 04:14:43 executing program 1: 04:14:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000001100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 396.291812][ T500] loop5: p3 start 225 is beyond EOD, truncated [ 396.298245][ T500] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:43 executing program 4: 04:14:43 executing program 3: 04:14:43 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:43 executing program 1: 04:14:43 executing program 3: 04:14:43 executing program 4: 04:14:43 executing program 0: 04:14:43 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) [ 396.500132][ T523] loop5: p1[EZD] p2 p3 p4 [ 396.504728][ T523] loop5: partition table partially beyond EOD, truncated [ 396.514230][ T523] loop5: p1 start 4097 is beyond EOD, truncated [ 396.528758][ T523] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:43 executing program 1: [ 396.544554][ T523] loop5: p3 start 225 is beyond EOD, truncated [ 396.558460][ T523] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:43 executing program 3: 04:14:43 executing program 4: 04:14:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="020155c0000001100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:43 executing program 0: 04:14:43 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:43 executing program 1: 04:14:43 executing program 3: 04:14:43 executing program 4: 04:14:43 executing program 2: bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040), 0x10) writev(r0, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r0, 0x1) 04:14:43 executing program 0: 04:14:43 executing program 3: 04:14:43 executing program 1: 04:14:43 executing program 1: 04:14:43 executing program 4: [ 396.839742][ T552] loop5: p1[EZD] p2 p3 p4 [ 396.850691][ T552] loop5: partition table partially beyond EOD, truncated [ 396.870907][ T552] loop5: p1 start 4097 is beyond EOD, truncated [ 396.911086][ T552] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 396.956629][ T552] loop5: p3 start 225 is beyond EOD, truncated [ 396.965245][ T552] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500000401100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:44 executing program 0: 04:14:44 executing program 2: bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040), 0x10) writev(r0, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r0, 0x1) 04:14:44 executing program 1: 04:14:44 executing program 4: 04:14:44 executing program 3: 04:14:44 executing program 3: 04:14:44 executing program 1: 04:14:44 executing program 2: bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040), 0x10) writev(r0, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r0, 0x1) 04:14:44 executing program 0: 04:14:44 executing program 4: 04:14:44 executing program 3: [ 397.173411][ T581] loop5: p1[EZD] p2 p3 p4 [ 397.178991][ T581] loop5: partition table partially beyond EOD, truncated [ 397.214004][ T581] loop5: p1 start 4097 is beyond EOD, truncated [ 397.220635][ T581] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 397.228442][ T581] loop5: p3 start 225 is beyond EOD, truncated [ 397.235505][ T581] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015502000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:44 executing program 1: 04:14:44 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:44 executing program 0: 04:14:44 executing program 3: 04:14:44 executing program 4: 04:14:44 executing program 1: 04:14:44 executing program 4: 04:14:44 executing program 0: 04:14:44 executing program 3: 04:14:44 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) [ 397.409791][ T604] loop5: p1[EZD] p2 p3 p4 [ 397.414258][ T604] loop5: partition table partially beyond EOD, truncated [ 397.425511][ T604] loop5: p1 start 4098 is beyond EOD, truncated [ 397.432353][ T604] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 397.441826][ T604] loop5: p3 start 225 is beyond EOD, truncated 04:14:44 executing program 4: [ 397.453462][ T604] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015503000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:44 executing program 1: 04:14:44 executing program 3: 04:14:44 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:44 executing program 0: 04:14:44 executing program 4: 04:14:44 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:44 executing program 3: 04:14:44 executing program 4: 04:14:44 executing program 1: 04:14:44 executing program 0: [ 397.669828][ T629] loop5: p1[EZD] p2 p3 p4 [ 397.675391][ T629] loop5: partition table partially beyond EOD, truncated [ 397.687886][ T629] loop5: p1 start 4098 is beyond EOD, truncated [ 397.698832][ T629] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 397.710325][ T629] loop5: p3 start 225 is beyond EOD, truncated 04:14:44 executing program 0: [ 397.723082][ T629] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015504000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:44 executing program 3: 04:14:44 executing program 4: 04:14:44 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:44 executing program 1: 04:14:44 executing program 0: 04:14:44 executing program 3: 04:14:44 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:44 executing program 4: 04:14:44 executing program 1: 04:14:45 executing program 0: 04:14:45 executing program 3: [ 397.949561][ T656] loop5: p1[EZD] p2 p3 p4 [ 397.954096][ T656] loop5: partition table partially beyond EOD, truncated [ 397.998075][ T656] loop5: p1 start 4098 is beyond EOD, truncated [ 398.005155][ T656] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 398.012998][ T656] loop5: p3 start 225 is beyond EOD, truncated [ 398.023727][ T656] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:45 executing program 1: 04:14:45 executing program 0: 04:14:45 executing program 3: 04:14:45 executing program 4: 04:14:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015505000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:45 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(0xffffffffffffffff, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:45 executing program 0: 04:14:45 executing program 3: 04:14:45 executing program 4: 04:14:45 executing program 1: 04:14:45 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(0xffffffffffffffff, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:45 executing program 1: [ 398.234897][ T681] loop5: p1[EZD] p2 p3 p4 [ 398.239358][ T681] loop5: partition table partially beyond EOD, truncated 04:14:45 executing program 3: 04:14:45 executing program 1: [ 398.277502][ T681] loop5: p1 start 4098 is beyond EOD, truncated 04:14:45 executing program 1: 04:14:45 executing program 4: [ 398.328314][ T681] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 398.364635][ T681] loop5: p3 start 225 is beyond EOD, truncated [ 398.370918][ T681] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015506000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:45 executing program 0: 04:14:45 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(0xffffffffffffffff, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:45 executing program 1: 04:14:45 executing program 3: 04:14:45 executing program 4: 04:14:45 executing program 3: 04:14:45 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:45 executing program 4: 04:14:45 executing program 1: 04:14:45 executing program 0: 04:14:45 executing program 3: [ 398.543892][ T708] loop5: p1[EZD] p2 p3 p4 [ 398.551771][ T708] loop5: partition table partially beyond EOD, truncated [ 398.569959][ T708] loop5: p1 start 4098 is beyond EOD, truncated [ 398.583047][ T708] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 398.595626][ T708] loop5: p3 start 225 is beyond EOD, truncated [ 398.612029][ T708] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015507000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:45 executing program 3: 04:14:45 executing program 4: 04:14:45 executing program 0: 04:14:45 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:45 executing program 1: 04:14:45 executing program 1: 04:14:45 executing program 3: 04:14:45 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:45 executing program 0: 04:14:45 executing program 4: 04:14:45 executing program 0: [ 398.818249][ T733] loop5: p1[EZD] p2 p3 p4 [ 398.824566][ T733] loop5: partition table partially beyond EOD, truncated [ 398.836075][ T733] loop5: p1 start 4098 is beyond EOD, truncated [ 398.849068][ T733] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 398.862899][ T733] loop5: p3 start 225 is beyond EOD, truncated [ 398.869263][ T733] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015508000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:46 executing program 1: 04:14:46 executing program 3: 04:14:46 executing program 0: 04:14:46 executing program 4: 04:14:46 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, 0x0, 0x0) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:46 executing program 1: 04:14:46 executing program 3: 04:14:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5601, &(0x7f0000000000)) 04:14:46 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, 0x0, 0x0) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:46 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$cont(0x7, 0x0, 0x0, 0x0) r2 = getpgid(0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) kcmp(r1, r2, 0x0, r3, r0) 04:14:46 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1f}, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 399.099610][ T758] loop5: p1[EZD] p2 p3 p4 [ 399.099617][ T758] loop5: partition table partially beyond EOD, truncated [ 399.099673][ T758] loop5: p1 start 4098 is beyond EOD, truncated [ 399.099680][ T758] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015509000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:14:46 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, 0x0, 0x0) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) [ 399.099961][ T758] loop5: p3 start 225 is beyond EOD, truncated [ 399.099968][ T758] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 399.200381][ T776] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 04:14:46 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x0}, 0x10) 04:14:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000080)) 04:14:46 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) [ 399.266889][ T787] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 399.279551][ T795] loop5: p1[EZD] p2 p3 p4 [ 399.285251][ T795] loop5: partition table partially beyond EOD, truncated 04:14:46 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) 04:14:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:46 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000050c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)='/', 0x1}], 0x1, 0x2, 0x0, 0x0) 04:14:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) [ 399.349767][ T795] loop5: p1 start 4098 is beyond EOD, truncated [ 399.363551][ T795] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 399.380303][ T795] loop5: p3 start 225 is beyond EOD, truncated [ 399.386615][ T795] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201550a000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:46 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) 04:14:46 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x541b, 0x0) 04:14:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000000e0601"], 0x1c}}, 0x0) 04:14:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:46 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x1) [ 399.576948][ T843] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 399.603506][ T837] loop5: p1[EZD] p2 p3 p4 [ 399.607995][ T837] loop5: partition table partially beyond EOD, truncated 04:14:46 executing program 1: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x10, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r0, 0x4) creat(&(0x7f0000000240)='./bus\x00', 0x0) 04:14:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x240007bd, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) [ 399.624261][ T837] loop5: p1 start 4098 is beyond EOD, truncated [ 399.640482][ T837] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) [ 399.688777][ T837] loop5: p3 start 225 is beyond EOD, truncated [ 399.744674][ T837] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201550b000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) 04:14:46 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, 0x0, 0x0) shutdown(r1, 0x1) 04:14:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:46 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b4b, &(0x7f0000000000)) 04:14:46 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, 0x0, 0x0) shutdown(r1, 0x1) 04:14:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) 04:14:47 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, 0x0, 0x0) shutdown(r1, 0x1) [ 399.975477][ T881] loop5: p1[EZD] p2 p3 p4 [ 399.980418][ T881] loop5: partition table partially beyond EOD, truncated [ 400.014361][ T881] loop5: p1 start 4098 is beyond EOD, truncated [ 400.038044][ T881] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 400.050387][ T881] loop5: p3 start 225 is beyond EOD, truncated [ 400.056604][ T881] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201550c000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b4b, &(0x7f0000000000)) 04:14:47 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840), 0x0) shutdown(r1, 0x1) 04:14:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) 04:14:47 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840), 0x0) shutdown(r1, 0x1) 04:14:47 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, 0x0) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) [ 400.293785][ T919] loop5: p1[EZD] p2 p3 p4 [ 400.298311][ T919] loop5: partition table partially beyond EOD, truncated [ 400.307799][ T919] loop5: p1 start 4098 is beyond EOD, truncated [ 400.318550][ T919] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 400.330200][ T919] loop5: p3 start 225 is beyond EOD, truncated [ 400.336428][ T919] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b4b, &(0x7f0000000000)) 04:14:47 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840), 0x0) shutdown(r1, 0x1) 04:14:47 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, 0x0) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:47 executing program 0: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) 04:14:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201550d000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:47 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r0 = accept(0xffffffffffffffff, 0x0, 0x0) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b4b, &(0x7f0000000000)) 04:14:47 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{0x0}], 0x1) shutdown(r1, 0x1) 04:14:47 executing program 0: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) [ 400.926948][ T956] loop5: p1[EZD] p2 p3 p4 [ 400.943198][ T956] loop5: partition table partially beyond EOD, truncated [ 400.974598][ T956] loop5: p1 start 4098 is beyond EOD, truncated 04:14:48 executing program 0: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) 04:14:48 executing program 1: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x4b4b, &(0x7f0000000000)) [ 401.016280][ T956] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 401.072350][ T956] loop5: p3 start 225 is beyond EOD, truncated [ 401.079141][ T956] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:48 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{0x0}], 0x1) shutdown(r1, 0x1) 04:14:48 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) 04:14:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:48 executing program 1: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x4b4b, &(0x7f0000000000)) 04:14:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201550e000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:48 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{0x0}], 0x1) shutdown(r1, 0x1) 04:14:48 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) 04:14:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:48 executing program 1: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x4b4b, &(0x7f0000000000)) [ 401.789995][ T1007] loop5: p1[EZD] p2 p3 p4 [ 401.813873][ T1007] loop5: partition table partially beyond EOD, truncated 04:14:48 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x4b4b, &(0x7f0000000000)) 04:14:49 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) [ 401.877718][ T1007] loop5: p1 start 4098 is beyond EOD, truncated [ 401.946259][ T1007] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 401.981452][ T1007] loop5: p3 start 225 is beyond EOD, truncated [ 401.987714][ T1007] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:49 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)}], 0x1) shutdown(r1, 0x1) 04:14:49 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, 0x0) 04:14:49 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x4b4b, &(0x7f0000000000)) 04:14:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201550f000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:49 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)}], 0x1) shutdown(r1, 0x1) 04:14:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:49 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, 0x0) 04:14:49 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x4b4b, &(0x7f0000000000)) 04:14:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) [ 402.679516][ T1061] loop5: p1[EZD] p2 p3 p4 [ 402.683956][ T1061] loop5: partition table partially beyond EOD, truncated 04:14:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:49 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b4b, 0x0) 04:14:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:49 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, 0x0) [ 402.728703][ T1061] loop5: p1 start 4098 is beyond EOD, truncated [ 402.756185][ T1061] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:49 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)}], 0x1) shutdown(r1, 0x1) [ 402.780939][ T1061] loop5: p3 start 225 is beyond EOD, truncated [ 402.787598][ T1061] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015510000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:49 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000080)='binfmt_misc\x00', 0x0, 0x0) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, &(0x7f0000000300)) 04:14:49 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b4b, 0x0) 04:14:49 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d7", 0x1}], 0x1) shutdown(r1, 0x1) 04:14:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:50 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d7", 0x1}], 0x1) shutdown(r1, 0x1) 04:14:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(0xffffffffffffffff, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b4b, 0x0) [ 402.949516][ T1096] loop5: p1[EZD] p2 p3 p4 [ 402.958071][ T1096] loop5: partition table partially beyond EOD, truncated [ 402.967964][ T1096] loop5: p1 start 4098 is beyond EOD, truncated [ 402.975020][ T1096] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 402.987662][ T1096] loop5: p3 start 225 is beyond EOD, truncated 04:14:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) accept(r0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) [ 403.010379][ T1096] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015511000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:50 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d7", 0x1}], 0x1) shutdown(r1, 0x1) 04:14:50 executing program 1: perf_event_open(&(0x7f00000010c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet(0x2, 0x3, 0x2) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x2e) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r1 = socket$inet(0x2, 0x0, 0x2) setsockopt$inet_int(r1, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8) open(0x0, 0x0, 0x0) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f00000002c0)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) openat$mice(0xffffffffffffff9c, 0x0, 0x800) 04:14:50 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/162, 0xa2}], 0x1) 04:14:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) accept(r0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:50 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x20) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x18, &(0x7f0000002fc0)=@assoc_value={r2}, 0x8) 04:14:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:50 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(0xffffffffffffffff, 0x1) 04:14:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) accept(r0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:50 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:50 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) [ 403.325814][ T1145] loop5: p1[EZD] p2 p3 p4 [ 403.335020][ T1145] loop5: partition table partially beyond EOD, truncated [ 403.366665][ T1145] loop5: p1 start 4098 is beyond EOD, truncated [ 403.408080][ T1145] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 403.441169][ T1145] loop5: p3 start 225 is beyond EOD, truncated 04:14:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, 0x0, 0x0) 04:14:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015512000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:50 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000080)='binfmt_misc\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r0, 0x400000000000002, 0x0) getdents64(r0, 0x0, 0x0) [ 403.458839][ T1145] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, 0x0, 0x0) [ 403.518694][ T1165] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 04:14:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:50 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000050c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)='/', 0x1}], 0x1, 0x0, 0x0, 0x8) 04:14:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, 0x0, 0x0) [ 403.629512][ T1184] loop5: p1[EZD] p2 p3 p4 [ 403.635346][ T1184] loop5: partition table partially beyond EOD, truncated [ 403.688971][ T1184] loop5: p1 start 4098 is beyond EOD, truncated [ 403.698311][ T1184] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 403.706594][ T1184] loop5: p3 start 225 is beyond EOD, truncated [ 403.713607][ T1184] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:51 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(0xffffffffffffffff, 0x1) 04:14:51 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:51 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2cdab05b591201ac59b700000000000002"], 0x72) write$evdev(r0, &(0x7f0000000040), 0xfd18) 04:14:51 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400), 0x0) 04:14:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015513000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:51 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400), 0x0) [ 404.243467][ T1234] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 404.255939][ T1233] loop5: p1[EZD] p2 p3 p4 [ 404.264798][ T1233] loop5: partition table partially beyond EOD, truncated 04:14:51 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 404.290379][ T1233] loop5: p1 start 4098 is beyond EOD, truncated [ 404.303345][ T1233] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 404.345302][ T1233] loop5: p3 start 225 is beyond EOD, truncated 04:14:51 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="441f0800000000000000000000224633ea672956ae9ba3090000003e04", 0x1d) 04:14:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400), 0x0) [ 404.387049][ T1233] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 404.532961][ T1253] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 04:14:52 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(0xffffffffffffffff, 0x1) 04:14:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = getpgid(0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) kcmp(r1, r2, 0x0, r3, r0) 04:14:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{0x0}], 0x1) 04:14:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015525000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:52 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x5}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0x92) mkdirat$cgroup_root(0xffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsa\x00', 0x181, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x458800, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000010000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff02000000"]}, 0x108) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000050c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) pwritev2(r6, &(0x7f0000000240)=[{&(0x7f0000000000)='/', 0x1}], 0x1, 0x2, 0x0, 0x0) 04:14:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{0x0}], 0x1) 04:14:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) [ 405.089543][ T1294] loop5: p1[EZD] p2 p3 p4 [ 405.093964][ T1294] loop5: partition table partially beyond EOD, truncated [ 405.121680][ T1294] loop5: p1 start 4098 is beyond EOD, truncated 04:14:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{0x0}], 0x1) 04:14:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) [ 405.135846][ T1294] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 405.153331][ T1294] loop5: p3 start 225 is beyond EOD, truncated [ 405.154364][ T1291] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 405.159570][ T1294] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 405.215106][ T1308] sg_write: data in/out 262577/104 bytes for SCSI command 0x1-- guessing data in; [ 405.215106][ T1308] program syz-executor.0 not setting count and/or reply_len properly [ 405.239976][ T1308] sg_write: data in/out 262577/104 bytes for SCSI command 0x1-- guessing data in; [ 405.239976][ T1308] program syz-executor.0 not setting count and/or reply_len properly 04:14:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x36, 0x0, 0x2) 04:14:52 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x0) 04:14:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = gettid() kcmp(r4, r3, 0x0, r0, r0) 04:14:52 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015526000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x5}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f0000001580)=ANY=[@ANYBLOB="00000000d50104000000000100000000000025bd4286be9084baa5b5db0700000068000a01000020763f0362391c57bc2475cc6474c7469fee863a839c92ad97786d22730a7c4b891a5f9b1395cacd8f2a9a8cb0e290476c85f3da616da2f4b8c2ee7a8483a09844916d76155f006d1a000000af031f98e08ad58f03cf8fb1bc78ffb92fb476f701076749d57ddc37ca91ff06e0f9f0f8d14f69eb80dc87145c723d5ecbe556bb39ad383c83dedcff639bb9a84e70ab0e2f075fe8f6333ee4e7e980b7fc8dbb7dcf9cc40c9428a2120f2330f74791a20cde9f37d4068616b45d55666449c974cb453fe350fac63b661e6b6356b80e197ddc37467d49eb5db0c9af11c9d6bc5b073843c3144932de0c6055fa8a1a39860bc22202ac2431802bb4dea34baaff06b4789462abf2346c7593cc50a92aba540aa4b51dd36f52c2a6f4b1adb7f67c3d43464604c6ea90f36b0500e7b948a510fd28e57b6316c56861a22e1fb26ad126b174a11f38408feb2c8dc8469518a92b9629392101c2086dd921efff2bbf6cb5464856358a00000000000000000000000000000000000000000000000057533f2cfa4de90b1db2056815fcd8b797763e27fa35a6fb004af11be890a9390f9ae9340e098718ffd3f658e9434cf0821f4f224a5e667a978add6d7a4bd6bf429e5b0581890750fedba5407c52b05adb8cda8e9639a5cb98399137c8f59c63b8c242cad169"], 0x92) mkdirat$cgroup_root(0xffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsa\x00', 0x181, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x458800, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000010000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff02000000"]}, 0x108) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000050c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) pwritev2(r6, &(0x7f0000000240)=[{&(0x7f0000000000)='/', 0x1}], 0x1, 0x2, 0x0, 0x0) 04:14:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800e00010069703665727370616e00000014000280060003003000000008000100", @ANYRES32=r2, @ANYBLOB="5ca504a256ad6e886be26121cecdc16e36fcd0a9059f6639"], 0x48}}, 0x0) [ 405.918541][ T1346] sg_write: data in/out 262577/104 bytes for SCSI command 0x1-- guessing data in; [ 405.918541][ T1346] program syz-executor.0 not setting count and/or reply_len properly 04:14:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x5603, &(0x7f0000000000)) [ 405.971672][ T1348] loop5: p1[EZD] p2 p3 p4 [ 405.976202][ T1348] loop5: partition table partially beyond EOD, truncated [ 405.988727][ T1348] loop5: p1 start 4098 is beyond EOD, truncated [ 405.995573][ T1348] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 406.004551][ T1348] loop5: p3 start 225 is beyond EOD, truncated [ 406.011176][ T1348] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:53 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:53 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000010c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$inet(0x2, 0x3, 0x2) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x2e) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000200)={0x0, {{0x2, 0x0, @rand_addr=0x64010102}}}, 0x88) open(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f00000002c0)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) openat$mice(0xffffffffffffff9c, 0x0, 0x800) recvfrom$inet6(r0, &(0x7f00000000c0)=""/127, 0x7f, 0x0, &(0x7f0000000180)={0xa, 0x4e22, 0x80000000, @private2={0xfc, 0x2, [], 0x1}, 0x14c5}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 406.031806][ T1365] batman_adv: Cannot find parent device 04:14:53 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x0) 04:14:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015548000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000001400)=[{&(0x7f00000010c0)=""/247, 0xf7}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x4) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(r0, r1) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x0) 04:14:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:53 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:53 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000010c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$inet(0x2, 0x3, 0x2) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x2e) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000200)={0x0, {{0x2, 0x0, @rand_addr=0x64010102}}}, 0x88) open(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f00000002c0)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) openat$mice(0xffffffffffffff9c, 0x0, 0x800) recvfrom$inet6(r0, &(0x7f00000000c0)=""/127, 0x7f, 0x0, &(0x7f0000000180)={0xa, 0x4e22, 0x80000000, @private2={0xfc, 0x2, [], 0x1}, 0x14c5}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 04:14:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) [ 406.793290][ T1413] loop5: p1[EZD] p2 p3 p4 [ 406.798614][ T1413] loop5: partition table partially beyond EOD, truncated 04:14:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:54 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f00000010c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$inet(0x2, 0x3, 0x2) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x2e) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000200)={0x0, {{0x2, 0x0, @rand_addr=0x64010102}}}, 0x88) open(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f00000002c0)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) openat$mice(0xffffffffffffff9c, 0x0, 0x800) recvfrom$inet6(r0, &(0x7f00000000c0)=""/127, 0x7f, 0x0, &(0x7f0000000180)={0xa, 0x4e22, 0x80000000, @private2={0xfc, 0x2, [], 0x1}, 0x14c5}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 406.846305][ T1413] loop5: p1 start 4098 is beyond EOD, truncated [ 406.856227][ T1413] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 406.873826][ T1413] loop5: p3 start 225 is beyond EOD, truncated [ 406.880234][ T1413] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:54 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:54 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000080)="d730", 0xfffffee6}], 0xe3) shutdown(r1, 0x0) 04:14:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201554c000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:14:54 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x560e, &(0x7f0000000000)) 04:14:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:54 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 407.749676][ T1489] loop5: p1[EZD] p2 p3 p4 [ 407.761522][ T1489] loop5: partition table partially beyond EOD, truncated [ 407.783751][ T1489] loop5: p1 start 4098 is beyond EOD, truncated [ 407.791616][ T1489] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 407.815666][ T1489] loop5: p3 start 225 is beyond EOD, truncated [ 407.831291][ T1489] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:14:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201555c000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:55 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) [ 408.070153][ T1534] loop5: p1[EZD] p2 p3 p4 [ 408.074575][ T1534] loop5: partition table partially beyond EOD, truncated [ 408.098831][ T1534] loop5: p1 start 4098 is beyond EOD, truncated [ 408.105638][ T1534] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 408.115281][ T1534] loop5: p3 start 225 is beyond EOD, truncated [ 408.122020][ T1534] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015560000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:55 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:14:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:14:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x560e, &(0x7f0000000000)) 04:14:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) [ 408.599384][ T1573] loop5: p1[EZD] p2 p3 p4 [ 408.603875][ T1573] loop5: partition table partially beyond EOD, truncated [ 408.618825][ T1573] loop5: p1 start 4098 is beyond EOD, truncated [ 408.632778][ T1573] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:14:55 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 408.647740][ T1573] loop5: p3 start 225 is beyond EOD, truncated 04:14:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f0000000080)=""/77, 0x4d) 04:14:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) [ 408.671922][ T1573] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:55 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f0000000080)=""/77, 0x4d) 04:14:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015568000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) dup2(r0, r0) [ 408.889488][ T1621] loop5: p1[EZD] p2 p3 p4 [ 408.894165][ T1621] loop5: partition table partially beyond EOD, truncated [ 408.902245][ T1621] loop5: p1 start 4098 is beyond EOD, truncated [ 408.908797][ T1621] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 408.917303][ T1621] loop5: p3 start 225 is beyond EOD, truncated [ 408.924367][ T1621] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:56 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f0000000080)=""/77, 0x4d) 04:14:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x560e, &(0x7f0000000000)) 04:14:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201556c000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:56 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:14:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) 04:14:56 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) 04:14:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) [ 409.479158][ T1681] loop5: p1[EZD] p2 p3 p4 [ 409.485892][ T1681] loop5: partition table partially beyond EOD, truncated [ 409.504982][ T1681] loop5: p1 start 4098 is beyond EOD, truncated 04:14:56 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) 04:14:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) [ 409.538140][ T1681] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 409.571758][ T1681] loop5: p3 start 225 is beyond EOD, truncated [ 409.593457][ T1681] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x560e, &(0x7f0000000000)) 04:14:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:14:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) 04:14:57 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015574000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) 04:14:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) read$snapshot(r0, &(0x7f0000000080)=""/77, 0x4d) 04:14:57 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 410.289445][ T1744] loop5: p1[EZD] p2 p3 p4 [ 410.293993][ T1744] loop5: partition table partially beyond EOD, truncated [ 410.307888][ T1744] loop5: p1 start 4098 is beyond EOD, truncated [ 410.322812][ T1744] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 410.331332][ T1744] loop5: p3 start 225 is beyond EOD, truncated 04:14:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) read$snapshot(r0, &(0x7f0000000080)=""/77, 0x4d) 04:14:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) 04:14:57 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 410.355635][ T1744] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:58 executing program 0: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x560e, &(0x7f0000000000)) 04:14:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) read$snapshot(r0, &(0x7f0000000080)=""/77, 0x4d) 04:14:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201557a000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:58 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:14:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) 04:14:58 executing program 0: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x560e, &(0x7f0000000000)) 04:14:58 executing program 0: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x560e, &(0x7f0000000000)) 04:14:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) 04:14:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4088, 0xff8}], 0x1, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:14:58 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 411.199180][ T1809] loop5: p1[EZD] p2 p3 p4 [ 411.212513][ T1809] loop5: partition table partially beyond EOD, truncated [ 411.225949][ T1809] loop5: p1 start 4098 is beyond EOD, truncated [ 411.233697][ T1809] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 411.242078][ T1809] loop5: p3 start 225 is beyond EOD, truncated 04:14:58 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x560e, &(0x7f0000000000)) [ 411.250326][ T1809] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:58 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:59 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x560e, &(0x7f0000000000)) 04:14:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015588000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:14:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadf, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) 04:14:59 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:14:59 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x560e, &(0x7f0000000000)) 04:14:59 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:14:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) [ 412.081419][ T1873] loop5: p1[EZD] p2 p3 p4 [ 412.092181][ T1873] loop5: partition table partially beyond EOD, truncated [ 412.103544][ T1873] loop5: p1 start 4098 is beyond EOD, truncated 04:14:59 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:14:59 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:14:59 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x560e, 0x0) [ 412.145931][ T1873] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 412.187515][ T1873] loop5: p3 start 225 is beyond EOD, truncated [ 412.207701][ T1873] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:14:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:14:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) 04:14:59 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x560e, 0x0) 04:14:59 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:14:59 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:14:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201558a000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:14:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) 04:15:00 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:15:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) 04:15:00 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:15:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x560e, 0x0) [ 412.983876][ T1953] loop5: p1[EZD] p2 p3 p4 [ 412.990543][ T1953] loop5: partition table partially beyond EOD, truncated [ 413.007768][ T1953] loop5: p1 start 4098 is beyond EOD, truncated [ 413.016714][ T1953] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 413.024746][ T1953] loop5: p3 start 225 is beyond EOD, truncated 04:15:00 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) [ 413.038007][ T1953] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:15:00 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:15:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) 04:15:00 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0x10, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0c480e000d000000e8bd6efb250709000e000100240d48ff050005001201", 0x2e}], 0x1}, 0x0) 04:15:00 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:15:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201558c000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) [ 413.762474][ T2009] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 04:15:00 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:15:00 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 413.822651][ T2009] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.830201][ T2009] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.852268][ T2011] loop5: p1[EZD] p2 p3 p4 [ 413.865787][ T2011] loop5: partition table partially beyond EOD, truncated 04:15:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) [ 413.915395][ T2011] loop5: p1 start 4098 is beyond EOD, truncated [ 413.926378][ T2009] device bridge0 entered promiscuous mode [ 413.949855][ T2011] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:15:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:15:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) [ 413.996973][ T2011] loop5: p3 start 225 is beyond EOD, truncated [ 414.035944][ T2011] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 414.148741][ T2036] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 414.160018][ T2036] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.167153][ T2036] bridge0: port 2(bridge_slave_1) entered forwarding state [ 414.174426][ T2036] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.181520][ T2036] bridge0: port 1(bridge_slave_0) entered forwarding state 04:15:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:15:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) 04:15:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:15:01 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:15:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0ee8679b1b5b4d", 0x8}], 0x1) 04:15:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015590000002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) 04:15:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:15:01 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000050c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) fchown(r0, 0x0, 0x0) [ 414.732775][ T2067] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 414.759746][ T2063] loop5: p1[EZD] p2 p3 p4 [ 414.764399][ T2063] loop5: partition table partially beyond EOD, truncated 04:15:01 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:15:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015541010002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 414.791910][ T2063] loop5: p1 start 4098 is beyond EOD, truncated [ 414.803889][ T2063] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 414.811964][ T2063] loop5: p3 start 225 is beyond EOD, truncated [ 414.818345][ T2063] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) [ 414.953203][ T2087] loop5: p1[EZD] p2 p3 p4 [ 414.966169][ T2087] loop5: partition table partially beyond EOD, truncated [ 414.980483][ T2087] loop5: p1 start 4098 is beyond EOD, truncated [ 414.987058][ T2087] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 414.991609][ T2083] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 415.003316][ T2087] loop5: p3 start 225 is beyond EOD, truncated [ 415.016659][ T2087] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 415.168867][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 04:15:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:15:02 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) r1 = dup2(r0, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:15:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x80, 0x87}, [@NDA_LLADDR={0xa, 0x2, @link_local}]}, 0x28}}, 0x0) 04:15:02 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) 04:15:02 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:15:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015504020002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:15:02 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(0xffffffffffffffff, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) [ 415.613058][ T2120] loop5: p1[EZD] p2 p3 p4 [ 415.623516][ T2120] loop5: partition table partially beyond EOD, truncated 04:15:02 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4bfa, &(0x7f0000000000)) 04:15:02 executing program 1: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:02 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) 04:15:02 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4bfa, &(0x7f0000000000)) [ 415.657691][ T2122] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 415.686637][ T2120] loop5: p1 start 4098 is beyond EOD, truncated 04:15:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=""/210, 0xd2}], 0x1) 04:15:02 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(0xffffffffffffffff, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) [ 415.735518][ T2120] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 415.754859][ T2120] loop5: p3 start 225 is beyond EOD, truncated 04:15:02 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4bfa, &(0x7f0000000000)) 04:15:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) write$evdev(r0, &(0x7f0000000040), 0xfd18) 04:15:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, 0x0, 0x0) [ 415.822766][ T2120] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 415.839413][ T2150] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 04:15:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, 0x0, 0x0) 04:15:03 executing program 1: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(0xffffffffffffffff, r0) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:15:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="020155cf020002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:03 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4bfa, &(0x7f0000000000)) 04:15:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, 0x0, 0x0) 04:15:03 executing program 0: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x4bfa, &(0x7f0000000000)) 04:15:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, 0xffffffffffffffff) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:15:03 executing program 2: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 416.077404][ T2186] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 416.104295][ T2196] loop5: p1[EZD] p2 p3 p4 [ 416.111105][ T2196] loop5: partition table partially beyond EOD, truncated 04:15:03 executing program 1: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 416.146690][ T2196] loop5: p1 start 4098 is beyond EOD, truncated 04:15:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, 0xffffffffffffffff) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:15:03 executing program 0: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x4bfa, &(0x7f0000000000)) 04:15:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400), 0x0) [ 416.190945][ T2196] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:15:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, 0xffffffffffffffff) read$snapshot(r1, &(0x7f0000000080)=""/77, 0x4d) 04:15:03 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x48) [ 416.242419][ T2196] loop5: p3 start 225 is beyond EOD, truncated [ 416.262017][ T2196] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500030002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400), 0x0) 04:15:03 executing program 2: r0 = socket(0x10, 0x80002, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r4 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000000701000000001b00000000000f060008000100", @ANYRES32=r4], 0x1c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) 04:15:03 executing program 0: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x4bfa, &(0x7f0000000000)) 04:15:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) dup2(r0, r0) read$snapshot(0xffffffffffffffff, &(0x7f0000000080)=""/77, 0x4d) [ 416.352815][ T2233] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 04:15:03 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:15:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400), 0x0) 04:15:03 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x4bfa, &(0x7f0000000000)) 04:15:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) dup2(r0, r0) read$snapshot(0xffffffffffffffff, &(0x7f0000000080)=""/77, 0x4d) [ 416.496292][ T2269] kvm [2265]: vcpu0, guest rIP: 0xca ignored wrmsr: 0x11e data 0x264 [ 416.529112][ T2272] loop5: p1[EZD] p2 p3 p4 [ 416.537693][ T2272] loop5: partition table partially beyond EOD, truncated 04:15:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{0x0}], 0x1) 04:15:03 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000000c0)) [ 416.553369][ T2269] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 416.583669][ T2272] loop5: p1 start 4098 is beyond EOD, truncated 04:15:03 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x4bfa, &(0x7f0000000000)) [ 416.621668][ T2272] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 416.664171][ T2272] loop5: p3 start 225 is beyond EOD, truncated [ 416.681368][ T2272] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 416.701172][ T5040] loop5: p1[EZD] p2 p3 p4 04:15:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0201554e030002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) dup2(r0, r0) read$snapshot(0xffffffffffffffff, &(0x7f0000000080)=""/77, 0x4d) 04:15:03 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:15:03 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x4bfa, &(0x7f0000000000)) 04:15:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{0x0}], 0x1) 04:15:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x14, r1, 0x917, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) [ 416.708474][ T5040] loop5: partition table partially beyond EOD, truncated [ 416.715678][ T5040] loop5: p1 start 4098 is beyond EOD, truncated [ 416.722535][ T5040] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 416.731622][ T5040] loop5: p3 start 225 is beyond EOD, truncated [ 416.737917][ T5040] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x9c}}, 0x0) readv(r1, &(0x7f0000000400)=[{0x0}], 0x1) 04:15:03 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4bfa, 0x0) 04:15:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0ee8679b1b3841", 0x8}], 0x1) 04:15:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, r0) read$snapshot(r1, 0x0, 0x0) [ 416.850619][ T2316] kvm [2311]: vcpu0, guest rIP: 0xca ignored wrmsr: 0x11e data 0x264 [ 416.864789][ T2338] loop5: p1[EZD] p2 p3 p4 [ 416.872680][ T2338] loop5: partition table partially beyond EOD, truncated [ 416.893141][ T2338] loop5: p1 start 4098 is beyond EOD, truncated 04:15:03 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 416.901271][ T2338] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 416.916638][ T2338] loop5: p3 start 225 is beyond EOD, truncated [ 416.923073][ T2338] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4bfa, 0x0) [ 416.966296][ T2316] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 04:15:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015571030002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 04:15:04 executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4080) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) 04:15:04 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:04 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:15:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4bfa, 0x0) [ 417.113141][ T2388] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 417.117541][ T2382] kvm [2378]: vcpu0, guest rIP: 0xca ignored wrmsr: 0x11e data 0x264 04:15:04 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b31, &(0x7f0000000000)) [ 417.159006][ T2386] loop5: p1[EZD] p2 p3 p4 [ 417.163591][ T2386] loop5: partition table partially beyond EOD, truncated [ 417.171824][ T2382] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 417.180368][ T2386] loop5: p1 start 4098 is beyond EOD, truncated [ 417.188284][ T2386] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:15:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:15:04 executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4080) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 417.223808][ T2386] loop5: p3 start 225 is beyond EOD, truncated [ 417.231602][ T2386] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_OPENQRY(r0, 0x4b2f, &(0x7f0000000000)) 04:15:04 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 417.275258][ T2408] kvm [2407]: vcpu0, guest rIP: 0xca ignored wrmsr: 0x11e data 0x264 [ 417.296780][ T2408] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 04:15:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015574030002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 417.394338][ T2423] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 417.459026][ T2430] loop5: p1[EZD] p2 p3 p4 [ 417.464326][ T2430] loop5: partition table partially beyond EOD, truncated [ 417.471915][ T2430] loop5: p1 start 4098 is beyond EOD, truncated [ 417.489232][ T2430] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 417.501463][ T2430] loop5: p3 start 225 is beyond EOD, truncated [ 417.513634][ T2430] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x1fffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, 0x0, 0x0) 04:15:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:15:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000000200)=""/201, 0x13f) 04:15:05 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:05 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[@ANYRES64=r1, @ANYRES64=r1, @ANYBLOB="7ab744f52ab5"]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)) 04:15:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015576030002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 418.091574][ T2470] kvm [2460]: vcpu0, guest rIP: 0xca ignored wrmsr: 0x11e data 0x264 [ 418.115312][ T2483] overlayfs: maximum fs stacking depth exceeded [ 418.128926][ T2467] loop5: p1[EZD] p2 p3 p4 [ 418.133409][ T2467] loop5: partition table partially beyond EOD, truncated 04:15:05 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) write(r0, 0x0, 0x0) [ 418.142963][ T2466] overlayfs: maximum fs stacking depth exceeded [ 418.147161][ T2467] loop5: p1 start 4098 is beyond EOD, truncated [ 418.163827][ T2467] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:15:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x1, 0x8010800000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280), 0x98) 04:15:05 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:05 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) socket$inet6_tcp(0xa, 0x1, 0x0) 04:15:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 418.235633][ T2467] loop5: p3 start 225 is beyond EOD, truncated [ 418.262230][ T2467] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:05 executing program 1: socket$inet6(0xa, 0x0, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 418.324619][ T2521] kvm [2518]: vcpu0, guest rIP: 0xca ignored wrmsr: 0x11e data 0x264 04:15:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015580030002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:05 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:05 executing program 4: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/key-users\x00', 0x0, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/220, 0xdc}], 0x1) bind$packet(0xffffffffffffffff, 0x0, 0x0) 04:15:05 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0xf000, 0x46, 0x0, &(0x7f0000000100)="4d50b441e692763513ef874565580000ff0d00000000122e25d386dd227dcb6470faa27ed2a0ff3862c8112b9bd19802e274d7b70fe661176f27007b9631b3a0291d70d5f32d", 0x0, 0x3fb, 0x0, 0x66, 0xffffff02, &(0x7f0000000000), &(0x7f0000000380)="7045502c9fe7d72a5d725d07000000840c0fa18b214f01adde5b220866f34723aefcc876df83a6915a0a9aed8abea8fce9dca40354f218178eedfd571140c75e8aaafa38e2ecaa6ebfc27f5dc7301c0a85450d3cfc4ceee8968d0ab47f1d829da06a01f82ec4f14d3c692a59db27ece44a0e029488462d11e930e90d5deafb1b5af71d3cd3c053aa34bc8d000000"}, 0x40) 04:15:05 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "549b2241f34d761e"}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000240)={'icmp\x00'}, &(0x7f0000000280)=0x1e) syz_usb_control_io(0xffffffffffffffff, 0x0, &(0x7f0000000b00)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={0x40, 0x19, 0x2, "10e4"}, 0x0, 0x0, 0x0, 0x0}) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) [ 418.435488][ T2535] kvm [2534]: vcpu0, guest rIP: 0xca ignored wrmsr: 0x11e data 0x264 04:15:05 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:05 executing program 1: socket$inet6(0xa, 0x0, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:15:05 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x2, 0xe, 0x0, &(0x7f0000000100)="4d50b441e692763513ef87456558", 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)='p'}, 0x40) 04:15:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000200)={0x16, 0x0, 0x0}) 04:15:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 418.568776][ T2546] loop5: p1[EZD] p2 p3 p4 [ 418.575040][ T2546] loop5: partition table partially beyond EOD, truncated [ 418.605544][ T2546] loop5: p1 start 4098 is beyond EOD, truncated 04:15:05 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 418.628364][ T2546] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 418.678144][ T2564] kvm [2563]: vcpu0, guest rIP: 0xca ignored wrmsr: 0x11e data 0x264 [ 418.687039][ T2546] loop5: p3 start 225 is beyond EOD, truncated [ 418.718150][ T2546] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:05 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="020155a6030002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote={{}, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, @time, {}, {}, @queue={0x3}}}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() tkill(r3, 0x2f) 04:15:05 executing program 1: socket$inet6(0xa, 0x0, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:15:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 418.927201][ T2605] kvm [2598]: vcpu0, guest rIP: 0xca ignored wrmsr: 0x11e data 0x264 [ 418.937249][ T5040] loop5: p1[EZD] p2 p3 p4 [ 418.946761][ T5040] loop5: partition table partially beyond EOD, truncated [ 418.968055][ T5040] loop5: p1 start 4098 is beyond EOD, truncated [ 418.976750][ T5040] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 418.991594][ T5040] loop5: p3 start 225 is beyond EOD, truncated [ 418.997979][ T5040] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 419.006855][ T2601] loop5: p1[EZD] p2 p3 p4 [ 419.011562][ T2601] loop5: partition table partially beyond EOD, truncated [ 419.018887][ T2601] loop5: p1 start 4098 is beyond EOD, truncated 04:15:06 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "549b2241f34d761e"}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000240)={'icmp\x00'}, &(0x7f0000000280)=0x1e) syz_usb_control_io(0xffffffffffffffff, 0x0, &(0x7f0000000b00)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={0x40, 0x19, 0x2, "10e4"}, 0x0, 0x0, 0x0, 0x0}) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 04:15:06 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote={{}, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, @time, {}, {}, @queue={0x3}}}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() tkill(r3, 0x2f) 04:15:06 executing program 1: socket$inet6(0xa, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:15:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 419.025256][ T2601] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 419.032813][ T2601] loop5: p3 start 225 is beyond EOD, truncated [ 419.039072][ T2601] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote={{}, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, @time, {}, {}, @queue={0x3}}}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() tkill(r3, 0x2f) 04:15:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015502040002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:06 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:06 executing program 1: socket$inet6(0xa, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 419.212801][ T2639] kvm [2627]: vcpu0, guest rIP: 0xca ignored wrmsr: 0x11e data 0x264 04:15:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) 04:15:06 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) r1 = socket$inet(0x2, 0x6, 0xd5) getsockopt$inet_opts(r1, 0x0, 0x10, &(0x7f0000000900)=""/4096, &(0x7f00000000c0)=0x1000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000000c0)='./file0\x00') 04:15:06 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 419.316738][ T2656] loop5: p1[EZD] p2 p3 p4 [ 419.323853][ T2656] loop5: partition table partially beyond EOD, truncated [ 419.338871][ T2656] loop5: p1 start 4098 is beyond EOD, truncated [ 419.351791][ T2656] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 419.368260][ T2656] loop5: p3 start 225 is beyond EOD, truncated [ 419.413796][ T2656] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:06 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "549b2241f34d761e"}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000240)={'icmp\x00'}, &(0x7f0000000280)=0x1e) syz_usb_control_io(0xffffffffffffffff, 0x0, &(0x7f0000000b00)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={0x40, 0x19, 0x2, "10e4"}, 0x0, 0x0, 0x0, 0x0}) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 04:15:06 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:06 executing program 1: socket$inet6(0xa, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:15:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015506040002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:06 executing program 4: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/key-users\x00', 0x0, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/220, 0xdc}], 0x1) 04:15:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}, 0x1}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f00000003c0)=ANY=[@ANYBLOB]) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x300, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) ioctl$HIDIOCGFEATURE(0xffffffffffffffff, 0xc0404807, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 04:15:06 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:06 executing program 4: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/key-users\x00', 0x0, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/220, 0xdc}], 0x1) [ 419.794397][ T2712] loop5: p1[EZD] p2 p3 p4 [ 419.801042][ T2712] loop5: partition table partially beyond EOD, truncated [ 419.813383][ T2705] dump_vmcs: 7 callbacks suppressed [ 419.813388][ T2705] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 04:15:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="b702000014000000bfa300000000000007030000b8feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000014009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f852b315f933eda4cba18ad181867514fe60077d4dd90123d3ee7cfbe0000000000000000fbdfd43307cd29a4ce6be614c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f896702e16cf8db9068a9e0000000000000000000000000000000000000000000000000000000000000018287ba798807cf077cc420efca6785deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1ebb5eb71e4df68814ab8242a5588437ea8ac75210bac458662e2bfd0c41f615df64ae01130f26069d2a263dff7f74ac5dbce618e879b5c13f1f6cccaec453be2a520b12a99b20ab3dc2a70085edba2b45cc215e1faa47db10278339b2d6bb4b60070200bc4bdad060a99e0a08e6fda3ade951df3ef7ca9c73286efe15c9effe55d57a0d94fdb50960a5348c9d30cdbb4b7268d8efbce9e2cbb65c4c32113af7ff5b12def5af4688d2cb1804fbec4a5f2ed81c6d596122c01acf9c61d3935e913ce628c975c164439875d3b688974387faa035e4a4dd48e5e9973f0c53662190590241eba8514dea780e372a18f6f45066eebfff7ddb674f807eb3c22578953362140d12f607992e978d741edc2f960a2c81efdd3953c4fe5a8ac4195d2d28de491d671f472be470f06960ddde2d4ab5593df9ee0d97c1028dc4b442869f61abe1a91b8c646d2ed8d27a9b4a11ad3abb9e6e24e58e587d4dd67b490550f1a9782d5e37a13a75b4b4eba291d2161f37b9c9d6c219ef8be0c6f411153e4e7e1653b705b21db96ec01018ef51dfb744bba5e9ee736a1bf0861e2efa523c7142342e07824168fcb8428940e91c52eb27f56e2d14231f790e7cb5897776ac97aea9c5b4837a6b9338c43002006a25c03c6fee000047e813e3762571fff6f2abbbc3a7378036cc0fc0e727c4bbc3d1155f28a23afc2dde1ff2363d8c1bf6bdb6329583d41920d726e03fc4fe0eafe910294e9a31d33b073ce672ac2a2eed8524b52acac12486f2beb4b9c4ac1cccd9df88801888427fbd3cdb10d6c00c6de69550e2e2c58241a1d67e2923966f707c579751c307743b62"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x2, 0xe, 0x0, &(0x7f0000000100)="4d50b441e692763513ef87456558", 0x0, 0x0, 0x0, 0x0, 0xb8, 0x0, &(0x7f0000000380)='p'}, 0x40) [ 419.838929][ T2712] loop5: p1 start 4098 is beyond EOD, truncated [ 419.864548][ T2712] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 419.887761][ T2712] loop5: p3 start 225 is beyond EOD, truncated 04:15:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}, 0x1}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f00000003c0)=ANY=[@ANYBLOB]) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x300, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) ioctl$HIDIOCGFEATURE(0xffffffffffffffff, 0xc0404807, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 04:15:07 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x4600, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 419.894306][ T2712] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:07 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 420.074766][ T2746] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 04:15:07 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "549b2241f34d761e"}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000240)={'icmp\x00'}, &(0x7f0000000280)=0x1e) syz_usb_control_io(0xffffffffffffffff, 0x0, &(0x7f0000000b00)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={0x40, 0x19, 0x2, "10e4"}, 0x0, 0x0, 0x0, 0x0}) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 04:15:07 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500050002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@noattr2='noattr2'}, {@prjquota='prjquota'}]}) 04:15:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}, 0x1}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f00000003c0)=ANY=[@ANYBLOB]) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x300, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xb3550aa4ba878254}, 0x9c) ioctl$HIDIOCGFEATURE(0xffffffffffffffff, 0xc0404807, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 04:15:07 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:15:07 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 420.377058][ T2765] loop5: p1[EZD] p2 p3 p4 [ 420.381833][ T2762] XFS (loop4): Invalid superblock magic number [ 420.399512][ T2765] loop5: partition table partially beyond EOD, truncated [ 420.413231][ T2766] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 04:15:07 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x2, 0x46, 0x0, &(0x7f0000000100)="4d50b441e692763513ef874565580000ff0d00000000122e25d386dd227dcb6470faa27ed2a0ff3862c8112b9bd19802e274d7b70fe661176f27007b9631b3a0291d70d5f32d", 0x0, 0x3fb, 0x0, 0x66, 0xffffff02, &(0x7f0000000000), &(0x7f0000000380)="7045502c9fe7d72a5d725d07000000840c0fa18b214f01adde5b220866f34723aefcc876df83a6915a0a9aed8abea8fce9dca40354f218178eedfd571140c75e8aaafa38e2ecaa6ebfc27f5dc7301c0a85450d3cfc4ceee8968d0ab47f1d829da06a01f82ec4f14d3c692a59db27ece44a0e029488462d11e930e90d5deafb1b5af71d3cd3c053aa34bc8d000000"}, 0x40) 04:15:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@noattr2='noattr2'}, {@prjquota='prjquota'}]}) [ 420.451995][ T2765] loop5: p1 start 4098 is beyond EOD, truncated 04:15:07 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x38, 0x46, 0x0, &(0x7f0000000100)="4d50b441e692763513ef874565580000ff0d00000000122e25d386dd227dcb6470faa27ed2a0ff3862c8112b9bd19802e274d7b70fe661176f27007b9631b3a0291d70d5f32d", 0x0, 0x3fb, 0x0, 0x66, 0xffffff02, &(0x7f0000000000), &(0x7f0000000380)="7045502c9fe7d72a5d725d07000000840c0fa18b214f01adde5b220866f34723aefcc876df83a6915a0a9aed8abea8fce9dca40354f218178eedfd571140c75e8aaafa38e2ecaa6ebfc27f5dc7301c0a85450d3cfc4ceee8968d0ab47f1d829da06a01f82ec4f14d3c692a59db27ece44a0e029488462d11e930e90d5deafb1b5af71d3cd3c053aa34bc8d000000"}, 0x40) 04:15:07 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:15:07 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 420.499551][ T2765] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 420.527117][ T2765] loop5: p3 start 225 is beyond EOD, truncated [ 420.536181][ T2765] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 420.658962][ T2801] XFS (loop4): Invalid superblock magic number [ 420.660947][ T2802] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 04:15:07 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "549b2241f34d761e"}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000240)={'icmp\x00'}, &(0x7f0000000280)=0x1e) syz_usb_control_io(0xffffffffffffffff, 0x0, &(0x7f0000000b00)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={0x40, 0x19, 0x2, "10e4"}, 0x0, 0x0, 0x0, 0x0}) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snd/seq\x00', 0x2) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 04:15:07 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f00000000c0)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) syz_genetlink_get_family_id$ipvs(0x0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'michael_mic-generic\x00'}}) 04:15:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500060002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:07 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:15:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@noattr2='noattr2'}, {@prjquota='prjquota'}]}) 04:15:08 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 420.998956][ T2832] loop5: p1[EZD] p2 p3 p4 [ 421.003539][ T2832] loop5: partition table partially beyond EOD, truncated [ 421.040935][ T2836] XFS (loop4): Invalid superblock magic number [ 421.048159][ T2833] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 421.060836][ T2832] loop5: p1 start 4098 is beyond EOD, truncated [ 421.067287][ T2832] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:15:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@noattr2='noattr2'}, {@prjquota='prjquota'}]}) 04:15:08 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:15:08 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 421.104113][ T2832] loop5: p3 start 225 is beyond EOD, truncated [ 421.124801][ T2832] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015504060002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:08 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 421.282215][ T2865] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 421.297966][ T2868] XFS (loop4): Invalid superblock magic number [ 421.328890][ T2882] loop5: p1[EZD] p2 p3 p4 [ 421.339740][ T2882] loop5: partition table partially beyond EOD, truncated [ 421.354666][ T2882] loop5: p1 start 4098 is beyond EOD, truncated [ 421.368735][ T2882] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 421.383500][ T2882] loop5: p3 start 225 is beyond EOD, truncated [ 421.405050][ T2882] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:08 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "549b2241f34d761e"}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000240)={'icmp\x00'}, &(0x7f0000000280)=0x1e) syz_usb_control_io(0xffffffffffffffff, 0x0, &(0x7f0000000b00)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={0x40, 0x19, 0x2, "10e4"}, 0x0, 0x0, 0x0, 0x0}) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snd/seq\x00', 0x2) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 04:15:08 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 421.576005][ T2903] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 04:15:09 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0x0], 0x1}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000000)={0x0, {{0x2, 0x4e24, @multicast2}}}, 0x88) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) wait4(0x0, 0x0, 0x0, 0x0) 04:15:09 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:09 executing program 4: syz_mount_image$xfs(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@noattr2='noattr2'}, {@prjquota='prjquota'}]}) 04:15:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500070002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:09 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:15:09 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "549b2241f34d761e"}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000240)={'icmp\x00'}, &(0x7f0000000280)=0x1e) syz_usb_control_io(0xffffffffffffffff, 0x0, &(0x7f0000000b00)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={0x40, 0x19, 0x2, "10e4"}, 0x0, 0x0, 0x0, 0x0}) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snd/seq\x00', 0x2) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 04:15:09 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:09 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0x0], 0x1}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000000)={0x0, {{0x2, 0x4e24, @multicast2}}}, 0x88) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) wait4(0x0, 0x0, 0x0, 0x0) [ 422.259449][ T2923] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 422.278810][ T2924] loop5: p1[EZD] p2 p3 p4 [ 422.283559][ T2924] loop5: partition table partially beyond EOD, truncated 04:15:09 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:15:09 executing program 4: syz_mount_image$xfs(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@noattr2='noattr2'}, {@prjquota='prjquota'}]}) [ 422.311931][ T2924] loop5: p1 start 4098 is beyond EOD, truncated [ 422.318290][ T2924] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 422.327804][ T2924] loop5: p3 start 225 is beyond EOD, truncated [ 422.334675][ T2924] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:09 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:09 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 422.454846][ T2952] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 04:15:09 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:15:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="02015500090002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:09 executing program 4: syz_mount_image$xfs(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@noattr2='noattr2'}, {@prjquota='prjquota'}]}) 04:15:09 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:15:09 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "549b2241f34d761e"}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000240)={'icmp\x00'}, &(0x7f0000000280)=0x1e) syz_usb_control_io(0xffffffffffffffff, 0x0, &(0x7f0000000b00)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={0x40, 0x19, 0x2, "10e4"}, 0x0, 0x0, 0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) [ 422.683004][ T2975] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 422.719163][ T2978] loop5: p1[EZD] p2 p3 p4 [ 422.723629][ T2978] loop5: partition table partially beyond EOD, truncated 04:15:09 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:15:09 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 422.742708][ T2978] loop5: p1 start 4098 is beyond EOD, truncated [ 422.752240][ T2978] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 422.770327][ T2978] loop5: p3 start 225 is beyond EOD, truncated [ 422.776615][ T2978] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:12 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0x0], 0x1}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000000)={0x0, {{0x2, 0x4e24, @multicast2}}}, 0x88) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) wait4(0x0, 0x0, 0x0, 0x0) 04:15:12 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:15:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@noattr2='noattr2'}, {@prjquota='prjquota'}]}) 04:15:12 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:15:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="020155000a0002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:12 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "549b2241f34d761e"}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000240)={'icmp\x00'}, &(0x7f0000000280)=0x1e) syz_usb_control_io(0xffffffffffffffff, 0x0, &(0x7f0000000b00)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={0x40, 0x19, 0x2, "10e4"}, 0x0, 0x0, 0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 04:15:12 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:15:12 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0x0], 0x1}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000000)={0x0, {{0x2, 0x4e24, @multicast2}}}, 0x88) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) wait4(0x0, 0x0, 0x0, 0x0) 04:15:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@noattr2='noattr2'}, {@prjquota='prjquota'}]}) [ 425.475958][ T3028] dump_vmcs: 1 callbacks suppressed [ 425.475963][ T3028] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 04:15:12 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 425.532821][ T3032] loop5: p1[EZD] p2 p3 p4 [ 425.544704][ T3032] loop5: partition table partially beyond EOD, truncated 04:15:12 executing program 2: socket$inet6(0xa, 0x3, 0x3c) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 425.582532][ T3032] loop5: p1 start 4098 is beyond EOD, truncated [ 425.616176][ T3032] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:15:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@noattr2='noattr2'}, {@prjquota='prjquota'}]}) 04:15:12 executing program 2: socket$inet6(0xa, 0x3, 0x3c) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:12 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 425.650734][ T3032] loop5: p3 start 225 is beyond EOD, truncated [ 425.658450][ T3051] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 425.675074][ T3032] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="020155410a0002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:12 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:15:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:15:13 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "549b2241f34d761e"}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000240)={'icmp\x00'}, &(0x7f0000000280)=0x1e) syz_usb_control_io(0xffffffffffffffff, 0x0, &(0x7f0000000b00)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={0x40, 0x19, 0x2, "10e4"}, 0x0, 0x0, 0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 04:15:13 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 425.918937][ T3079] loop5: p1[EZD] p2 p3 p4 [ 425.923566][ T3079] loop5: partition table partially beyond EOD, truncated [ 425.941969][ T3079] loop5: p1 start 4098 is beyond EOD, truncated [ 425.955953][ T3079] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 425.964297][ T3079] loop5: p3 start 225 is beyond EOD, truncated [ 425.995172][ T3079] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:15 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0x0], 0x1}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000000)={0x0, {{0x2, 0x4e24, @multicast2}}}, 0x88) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 04:15:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:15:15 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:15:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="020155420a0002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 04:15:15 executing program 2: socket$inet6(0xa, 0x3, 0x3c) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:15:15 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, "549b2241f34d761e"}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000240)={'icmp\x00'}, &(0x7f0000000280)=0x1e) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 04:15:15 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:15:15 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0x0], 0x1}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000000)={0x0, {{0x2, 0x4e24, @multicast2}}}, 0x88) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 428.628725][ T3115] loop5: p1[EZD] p2 p3 p4 [ 428.634315][ T3115] loop5: partition table partially beyond EOD, truncated [ 428.659420][ T3115] loop5: p1 start 4098 is beyond EOD, truncated 04:15:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 428.703074][ T3115] loop5: p2 size 1073872896 extends beyond EOD, truncated 04:15:15 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:15:15 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0x0], 0x1}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000000)={0x0, {{0x2, 0x4e24, @multicast2}}}, 0x88) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 428.756659][ T3115] loop5: p3 start 225 is beyond EOD, truncated 04:15:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@noattr2='noattr2'}]}) [ 428.816839][ T3115] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:15 executing program 1: socket$inet6(0xa, 0x3, 0x3c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:15:16 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0x0], 0x1}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000000)={0x0, {{0x2, 0x4e24, @multicast2}}}, 0x88) tkill(r1, 0x3c) wait4(0x0, 0x0, 0x0, 0x0) 04:15:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="020155430a0002100000ff45ac0000ffffff8100080000000000000002400000000062000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 428.994254][ T3145] XFS (loop4): Invalid superblock magic number 04:15:16 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0x0], 0x1}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000000)={0x0, {{0x2, 0x4e24, @multicast2}}}, 0x88) tkill(r1, 0x3c) wait4(0x0, 0x0, 0x0, 0x0) [ 429.118514][ T3166] loop5: p1[EZD] p2 p3 p4 [ 429.123009][ T3166] loop5: partition table partially beyond EOD, truncated [ 429.137005][ T3166] loop5: p1 start 4098 is beyond EOD, truncated [ 429.149874][ T3166] loop5: p2 size 1073872896 extends beyond EOD, truncated [ 429.181847][ T3166] loop5: p3 start 225 is beyond EOD, truncated [ 429.217055][ T3166] loop5: p4 size 3657465856 extends beyond EOD, truncated 04:15:16 executing program 2: socket$inet6(0xa, 0x3, 0x3c) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b9800000c02e0f0178000f309a0900000065002e41ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f0138360f06ed", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x7, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 433.014431][ T3117] ================================================================== [ 433.022553][ T3117] BUG: KCSAN: data-race in snd_seq_check_queue / snd_seq_control_queue [ 433.030771][ T3117] [ 433.033136][ T3117] write to 0xffff8880a3d5cf64 of 1 bytes by interrupt on cpu 1: [ 433.040751][ T3117] snd_seq_check_queue+0x251/0x290 [ 433.045836][ T3117] snd_seq_timer_interrupt+0x228/0x240 [ 433.051310][ T3117] snd_timer_interrupt+0xa7c/0xb50 [ 433.056410][ T3117] snd_hrtimer_callback+0x13a/0x220 [ 433.061593][ T3117] __run_hrtimer+0x154/0x4b0 [ 433.066169][ T3117] hrtimer_interrupt+0x37c/0xa40 [ 433.071624][ T3117] __sysvec_apic_timer_interrupt+0xa3/0x280 [ 433.077491][ T3117] asm_call_on_stack+0xf/0x20 [ 433.082145][ T3117] sysvec_apic_timer_interrupt+0x80/0xd0 [ 433.087779][ T3117] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 433.093810][ T3117] __sanitizer_cov_trace_pc+0x0/0x60 [ 433.099097][ T3117] tomoyo_path_matches_pattern+0x15/0x120 [ 433.104885][ T3117] tomoyo_check_path_acl+0x9b/0xe0 [ 433.109966][ T3117] tomoyo_check_acl+0xcc/0x220 [ 433.114711][ T3117] tomoyo_check_open_permission+0x17f/0x370 [ 433.120584][ T3117] tomoyo_file_open+0xd0/0xe0 [ 433.125758][ T3117] security_file_open+0x3f/0x90 [ 433.130584][ T3117] do_dentry_open+0x27c/0x8e0 [ 433.135249][ T3117] vfs_open+0x43/0x50 [ 433.139201][ T3117] path_openat+0x185f/0x20e0 [ 433.143787][ T3117] do_filp_open+0xbd/0x1d0 [ 433.148199][ T3117] do_sys_openat2+0x33c/0x4a0 [ 433.152848][ T3117] __x64_sys_open+0xe2/0x110 [ 433.157410][ T3117] do_syscall_64+0x51/0xb0 [ 433.161818][ T3117] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 433.167780][ T3117] [ 433.170090][ T3117] read to 0xffff8880a3d5cf64 of 1 bytes by task 3117 on cpu 0: [ 433.177606][ T3117] snd_seq_control_queue+0x4f2/0x550 [ 433.182884][ T3117] event_input_timer+0x1e/0x30 [ 433.187664][ T3117] snd_seq_deliver_single_event+0x31b/0x4f0 [ 433.193534][ T3117] snd_seq_deliver_event+0x192/0x4a0 [ 433.198795][ T3117] snd_seq_dispatch_event+0x14c/0x270 [ 433.204166][ T3117] snd_seq_check_queue+0xfe/0x290 [ 433.209162][ T3117] snd_seq_enqueue_event+0x275/0x2b0 [ 433.214419][ T3117] snd_seq_client_enqueue_event+0x206/0x2a0 [ 433.220293][ T3117] snd_seq_write+0x435/0x550 [ 433.224885][ T3117] vfs_write+0x1d6/0x690 [ 433.229098][ T3117] ksys_write+0xce/0x180 [ 433.233321][ T3117] __x64_sys_write+0x3e/0x50 [ 433.237902][ T3117] do_syscall_64+0x51/0xb0 [ 433.242294][ T3117] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 433.248154][ T3117] [ 433.250455][ T3117] Reported by Kernel Concurrency Sanitizer on: [ 433.256582][ T3117] CPU: 0 PID: 3117 Comm: syz-executor.0 Not tainted 5.8.0-syzkaller #0 [ 433.264876][ T3117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.275011][ T3117] ================================================================== [ 433.283051][ T3117] Kernel panic - not syncing: panic_on_warn set ... [ 433.289699][ T3117] CPU: 0 PID: 3117 Comm: syz-executor.0 Not tainted 5.8.0-syzkaller #0 [ 433.297915][ T3117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.307945][ T3117] Call Trace: [ 433.312610][ T3117] dump_stack+0x10f/0x19d [ 433.317021][ T3117] panic+0x207/0x64a [ 433.320890][ T3117] ? vprintk_emit+0x44a/0x4f0 [ 433.325584][ T3117] kcsan_report+0x684/0x690 [ 433.330283][ T3117] ? kcsan_setup_watchpoint+0x41e/0x4a0 [ 433.336275][ T3117] ? snd_seq_control_queue+0x4f2/0x550 [ 433.341722][ T3117] ? event_input_timer+0x1e/0x30 [ 433.346633][ T3117] ? snd_seq_deliver_single_event+0x31b/0x4f0 [ 433.352683][ T3117] ? snd_seq_deliver_event+0x192/0x4a0 [ 433.358116][ T3117] ? snd_seq_dispatch_event+0x14c/0x270 [ 433.363639][ T3117] ? snd_seq_check_queue+0xfe/0x290 [ 433.368817][ T3117] ? snd_seq_enqueue_event+0x275/0x2b0 [ 433.374507][ T3117] ? snd_seq_client_enqueue_event+0x206/0x2a0 [ 433.380544][ T3117] ? snd_seq_write+0x435/0x550 [ 433.385300][ T3117] ? vfs_write+0x1d6/0x690 [ 433.389701][ T3117] ? ksys_write+0xce/0x180 [ 433.394192][ T3117] ? __x64_sys_write+0x3e/0x50 [ 433.398950][ T3117] ? do_syscall_64+0x51/0xb0 [ 433.403564][ T3117] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 433.409621][ T3117] ? __schedule+0x3c5/0x590 [ 433.414881][ T3117] kcsan_setup_watchpoint+0x41e/0x4a0 [ 433.420234][ T3117] snd_seq_control_queue+0x4f2/0x550 [ 433.425528][ T3117] ? preempt_count_add+0x4e/0x90 [ 433.430455][ T3117] ? snd_seq_system_notify+0xa0/0xa0 [ 433.435719][ T3117] event_input_timer+0x1e/0x30 [ 433.440455][ T3117] snd_seq_deliver_single_event+0x31b/0x4f0 [ 433.446585][ T3117] ? snd_seq_cell_free+0x1f1/0x220 [ 433.451777][ T3117] snd_seq_deliver_event+0x192/0x4a0 [ 433.457133][ T3117] ? preempt_count_add+0x4e/0x90 [ 433.462050][ T3117] ? preempt_count_add+0x4e/0x90 [ 433.466963][ T3117] ? _raw_spin_unlock_irqrestore+0x53/0x70 [ 433.472757][ T3117] snd_seq_dispatch_event+0x14c/0x270 [ 433.478124][ T3117] ? preempt_count_add+0x4e/0x90 [ 433.483046][ T3117] ? _raw_spin_unlock_irqrestore+0x53/0x70 [ 433.488917][ T3117] ? snd_seq_prioq_cell_out+0x1da/0x1f0 [ 433.494439][ T3117] snd_seq_check_queue+0xfe/0x290 [ 433.499872][ T3117] ? snd_seq_event_dup+0x3c3/0x410 [ 433.504958][ T3117] snd_seq_enqueue_event+0x275/0x2b0 [ 433.510363][ T3117] snd_seq_client_enqueue_event+0x206/0x2a0 [ 433.516515][ T3117] snd_seq_write+0x435/0x550 [ 433.521080][ T3117] ? snd_seq_read+0x420/0x420 [ 433.525737][ T3117] vfs_write+0x1d6/0x690 [ 433.529990][ T3117] ? __fget_light+0x219/0x260 [ 433.534712][ T3117] ? set_normalized_timespec64+0x104/0x130 [ 433.540494][ T3117] ksys_write+0xce/0x180 [ 433.544713][ T3117] __x64_sys_write+0x3e/0x50 [ 433.549336][ T3117] do_syscall_64+0x51/0xb0 [ 433.553848][ T3117] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 433.559723][ T3117] RIP: 0033:0x45cc79 [ 433.563594][ T3117] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 433.584137][ T3117] RSP: 002b:00007fb7246e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 433.592548][ T3117] RAX: ffffffffffffffda RBX: 0000000000038940 RCX: 000000000045cc79 [ 433.600517][ T3117] RDX: 00000000fffffee4 RSI: 00000000200000c0 RDI: 0000000000000003 [ 433.608574][ T3117] RBP: 000000000078bf40 R08: 0000000000000000 R09: 0000000000000000 [ 433.616629][ T3117] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bf0c [ 433.624595][ T3117] R13: 00007ffe1fc381bf R14: 00007fb7246e89c0 R15: 000000000078bf0c [ 433.633874][ T3117] Kernel Offset: disabled [ 433.638425][ T3117] Rebooting in 86400 seconds..