0000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:30 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:30 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:30 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 957.819796] loop2: p234 start 1 is beyond EOD, truncated [ 957.819814] loop2: p235 start 1 is beyond EOD, truncated [ 957.819824] loop2: p236 start 1 is beyond EOD, truncated [ 957.819844] loop2: p237 start 1 is beyond EOD, truncated [ 957.819884] loop2: p238 start 1 is beyond EOD, truncated [ 957.819904] loop2: p239 start 1 is beyond EOD, truncated [ 957.819924] loop2: p240 start 1 is beyond EOD, truncated [ 957.819963] loop2: p241 start 1 is beyond EOD, truncated [ 957.819983] loop2: p242 start 1 is beyond EOD, truncated [ 957.820003] loop2: p243 start 1 is beyond EOD, [ 957.832060] loop4: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 957.834048] truncated [ 957.834064] loop2: p244 start 1 is beyond EOD, truncated [ 957.834109] loop2: p245 start 1 is beyond EOD, truncated [ 957.834124] loop2: p246 start 1 is beyond EOD, truncated [ 957.834169] loop2: p247 start 1 is beyond EOD, truncated [ 957.834229] loop2: p248 start 1 is beyond EOD, truncated [ 957.834249] loop2: p249 start 1 is beyond EOD, truncated [ 957.834330] loop2: p250 start 1 is beyond EOD, truncated [ 957.834350] loop2: p251 start 1 is beyond EOD, truncated [ 957.834370] loop2: p252 start 1 is beyond EOD, truncated [ 957.834390] loop2: p253 start 1 is beyond EOD, truncated [ 957.834410] loop2: p254 start 1 is beyond EOD, truncated [ 957.834430] loop2: p255 start 1 is beyond EOD, truncated ** 29 printk messages dropped ** [ 957.847466] loop1: p32 start 1 is beyond EOD, truncated ** 20 printk messages dropped ** [ 957.849400] loop1: p53 start 1 is beyond EOD, truncated ** 479 printk messages dropped ** [ 958.073392] loop3: p17 start 1 is beyond EOD, truncated 14:39:30 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 252 printk messages dropped ** [ 958.134602] loop4: p17 start 1 is beyond EOD, truncated [ 958.134748] loop4: p18 start 1 is beyond EOD, truncated [ 958.134788] loop4: p19 start 1 is beyond EOD, truncated [ 958.134827] loop4: p20 start 1 is beyond EOD, truncated [ 958.134875] loop4: p21 start 1 is beyond EOD, truncated [ 958.134896] loop4: p22 start 1 is beyond EOD, truncated ** 55 printk messages dropped ** [ 958.136498] loop4: p78 start 1 is beyond EOD, truncated 14:39:30 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:30 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 109 printk messages dropped ** [ 958.162034] loop2: p95 start 1 is beyond EOD, truncated ** 242 printk messages dropped ** [ 958.201591] loop4: p168 start 1 is beyond EOD, truncated [ 958.201621] loop4: p169 start 1 is beyond EOD, truncated [ 958.201650] loop4: p170 start 1 is beyond EOD, truncated 14:39:30 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 321 printk messages dropped ** [ 958.211670] loop3: p235 start 1 is beyond EOD, truncated [ 958.211676] loop3: p236 start 1 is beyond EOD, truncated [ 958.211684] loop3: p237 start 1 is beyond EOD, truncated [ 958.211691] loop3: p238 start 1 is beyond EOD, truncated [ 958.211696] loop3: p239 start 1 is beyond EOD, truncated [ 958.211703] loop3: p240 start 1 is beyond EOD, truncated [ 958.211709] loop3: p241 start 1 is beyond EOD, truncated [ 958.211716] loop3: p242 start 1 is beyond EOD, truncated [ 958.211722] loop3: p243 start 1 is beyond EOD, truncated 14:39:30 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 958.211728] loop3: p244 start 1 is beyond EOD, truncated [ 958.211734] loop3: p245 start 1 is beyond EOD, truncated 14:39:30 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 958.211740] loop3: p246 start 1 is beyond EOD, truncated [ 958.211747] loop3: p247 start 1 is beyond EOD, truncated ** 259 printk messages dropped ** [ 958.234269] loop1: p254 start 1 is beyond EOD, truncated [ 958.234290] loop1: p255 start 1 is beyond EOD, truncated [ 958.264375] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 958.515388] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 ** 990 printk messages dropped ** [ 958.808624] loop3: p217 start 1 is beyond EOD, truncated [ 958.808630] loop3: p218 start 1 is beyond EOD, truncated [ 958.808636] loop3: p219 start 1 is beyond EOD, truncated [ 958.808642] loop3: p220 start 1 is beyond EOD, truncated [ 958.808648] loop3: p221 start 1 is beyond EOD, truncated [ 958.808654] loop3: p222 start 1 is beyond EOD, truncated [ 958.808660] loop3: p223 start 1 is beyond EOD, truncated [ 958.808667] loop3: p224 start 1 is beyond EOD, truncated [ 958.808673] loop3: p225 start 1 is beyond EOD, truncated [ 958.808680] loop3: p226 start 1 is beyond EOD, truncated [ 958.808685] loop3: p227 start 1 is beyond EOD, truncated [ 958.808691] loop3: p228 start 1 is beyond EOD, truncated [ 958.808698] loop3: p229 start 1 is beyond EOD, truncated [ 958.808703] loop3: p230 start 1 is beyond EOD, truncated [ 958.808709] loop3: p231 start 1 is beyond EOD, truncated [ 958.808716] loop3: p232 start 1 is beyond EOD, truncated [ 958.808721] loop3: p233 start 1 is beyond EOD, truncated [ 958.808727] loop3: p234 start 1 is beyond EOD, truncated [ 958.808734] loop3: p235 start 1 is beyond EOD, truncated [ 958.808740] loop3: p236 start 1 is beyond EOD, truncated [ 958.808746] loop3: p237 start 1 is beyond EOD, truncated [ 958.808752] loop3: p238 start 1 is beyond EOD, truncated [ 958.808758] loop3: p239 start 1 is beyond EOD, truncated [ 958.808764] loop3: p240 start 1 is beyond EOD, truncated [ 958.808771] loop3: p241 start 1 is beyond EOD, truncated [ 958.808777] loop3: p242 start 1 is beyond EOD, truncated [ 958.808783] loop3: p243 start 1 is beyond EOD, truncated [ 958.808790] loop3: p244 start 1 is beyond EOD, truncated [ 958.808796] loop3: p245 start 1 is beyond EOD, truncated [ 958.808802] loop3: p246 start 1 is beyond EOD, truncated [ 958.808808] loop3: p247 start 1 is beyond EOD, truncated [ 958.808815] loop3: p248 start 1 is beyond EOD, truncated [ 958.808821] loop3: p249 start 1 is beyond EOD, truncated [ 958.808827] loop3: p250 start 1 is beyond EOD, truncated [ 958.808834] loop3: p251 start 1 is beyond EOD, truncated ** 111 printk messages dropped ** [ 958.865472] loop4: p39 start 1 is beyond EOD, truncated ** 127 printk messages dropped ** [ 958.877775] loop4: p117 start 1 is beyond EOD, truncated [ 958.877795] loop4: p118 start 1 is beyond EOD, truncated [ 958.877811] loop4: p119 start 1 is beyond EOD, truncated [ 958.877860] loop4: p120 start 1 is beyond EOD, [ 958.878039] loop2: p121 start 1 is beyond EOD, truncated [ 958.878059] loop2: p122 start 1 is beyond EOD, truncated [ 958.878079] loop2: p123 start 1 is beyond EOD, truncated [ 958.878099] loop2: p124 start 1 is beyond EOD, truncated [ 958.878114] loop2: p125 start 1 is beyond EOD, truncated [ 958.878159] loop2: p126 start 1 is beyond EOD, truncated [ 958.878219] loop2: p127 start 1 is beyond EOD, truncated [ 958.878238] loop2: p128 start 1 is beyond EOD, truncated [ 958.878280] loop2: p129 start 1 is beyond EOD, truncated [ 958.878299] loop2: p130 start 1 is beyond EOD, truncated [ 958.878314] loop2: p131 start 1 is beyond EOD, truncated [ 958.878359] loop2: p132 start 1 is beyond EOD, truncated [ 958.878374] loop2: p133 start 1 is beyond EOD, truncated [ 958.878420] loop2: p134 start 1 is beyond EOD, truncated [ 958.878439] loop2: p135 start 1 is beyond EOD, truncated [ 958.878480] loop2: p136 start 1 is beyond EOD, truncated [ 958.878499] loop2: p137 start 1 is beyond EOD, truncated [ 958.878514] loop2: p138 start 1 is beyond EOD, truncated [ 958.878572] loop2: p139 start 1 is beyond EOD, truncated [ 958.878578] loop2: p140 start 1 is beyond EOD, truncated 14:39:31 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0x0, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:31 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:31 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:31 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000e95fe0), 0x20) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000140), 0x391, 0x0) 14:39:31 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:31 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 958.878584] loop2: p141 start 1 is beyond EOD, truncated [ 958.878594] loop2: p142 start 1 is beyond EOD, truncated [ 958.878649] loop2: p143 start 1 is beyond EOD, truncated [ 958.878664] loop2: p144 start 1 is beyond EOD, truncated 14:39:31 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x0) [ 958.878709] loop2: p145 start 1 is beyond EOD, truncated [ 958.878724] loop2: p146 start 1 is beyond EOD, truncated ** 87 printk messages dropped ** [ 958.882655] loop4: p160 start 1 is beyond EOD, truncated 14:39:31 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:31 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 415 printk messages dropped ** [ 958.935341] loop1: p250 start 1 is beyond EOD, truncated [ 958.935347] loop1: p251 start 1 is beyond EOD, truncated 14:39:31 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x0) ** 5 printk messages dropped ** [ 959.222816] loop1: p1 start 1 is beyond EOD, truncated ** 12 printk messages dropped ** [ 959.223896] loop1: p14 start 1 is beyond EOD, truncated ** 182 printk messages dropped ** [ 959.225257] loop1: p197 start 1 is beyond EOD, truncated ** 80 printk messages dropped ** [ 959.412460] loop3: p19 start 1 is beyond EOD, truncated 14:39:31 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 475 printk messages dropped ** [ 959.475088] loop5: p237 start 1 is beyond EOD, truncated [ 959.475108] loop5: p238 start 1 is beyond EOD, truncated [ 959.475146] loop5: p239 start 1 is beyond EOD, truncated [ 959.475216] loop5: p240 start 1 is beyond EOD, truncated [ 959.475236] loop5: p241 start 1 is beyond EOD, truncated [ 959.475257] loop5: p242 start 1 is beyond EOD, truncated [ 959.475277] loop5: p243 start 1 is beyond EOD, truncated [ 959.475297] loop5: p244 start 1 is beyond EOD, truncated [ 959.475318] loop5: p245 start 1 is beyond EOD, truncated [ 959.475338] loop5: p246 start 1 is beyond EOD, truncated 14:39:32 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x0) ** 10 printk messages dropped ** [ 959.498957] loop2: p1 start 1 is beyond EOD, truncated ** 509 printk messages dropped ** [ 959.962400] loop0: p1 start 1 is beyond EOD, truncated [ 959.962500] loop0: p2 size 2 extends beyond EOD, truncated [ 959.969311] loop0: p3 start 201 is beyond EOD, truncated [ 959.969350] loop0: p4 start 301 is beyond EOD, truncated [ 959.969369] loop0: p5 start 1 is beyond EOD, truncated [ 959.969389] loop0: p6 start 1 is beyond EOD, truncated [ 959.969409] loop0: p7 start 1 is beyond EOD, truncated [ 959.969428] loop0: p8 start 1 is beyond EOD, truncated [ 959.969448] loop0: p9 start 1 is beyond EOD, truncated [ 959.969499] loop0: p10 start 1 is beyond EOD, truncated [ 959.969518] loop0: p11 start 1 is beyond EOD, truncated [ 959.969533] loop0: p12 start 1 is beyond EOD, truncated [ 959.969578] loop0: p13 start 1 is beyond EOD, truncated [ 959.969597] loop0: p14 start 1 is beyond EOD, truncated [ 959.969612] loop0: p15 start 1 is beyond EOD, truncated [ 959.969657] loop0: p16 start 1 is beyond EOD, truncated [ 959.969672] loop0: p17 start 1 is beyond EOD, truncated [ 959.969717] loop0: p18 start 1 is beyond EOD, truncated [ 959.969733] loop0: p19 start 1 is beyond EOD, truncated [ 959.969778] loop0: p20 start 1 is beyond EOD, truncated [ 959.969797] loop0: p21 start 1 is beyond EOD, truncated [ 959.969839] loop0: p22 start 1 is beyond EOD, truncated [ 959.969858] loop0: p23 start 1 is beyond EOD, truncated [ 959.969877] loop0: p24 start 1 is beyond EOD, truncated [ 959.969919] loop0: p25 start 1 is beyond EOD, truncated [ 959.969938] loop0: p26 start 1 is beyond EOD, truncated [ 959.969957] loop0: p27 start 1 is beyond EOD, truncated [ 959.969999] loop0: p28 start 1 is beyond EOD, truncated [ 959.970109] loop0: p29 start 1 is beyond EOD, truncated [ 959.970148] loop0: p30 start 1 is beyond EOD, truncated [ 959.970167] loop0: p31 start 1 is beyond EOD, truncated [ 959.970187] loop0: p32 start 1 is beyond EOD, truncated [ 959.970229] loop0: p33 start 1 is beyond EOD, truncated [ 959.970248] loop0: p34 start 1 is beyond EOD, truncated [ 959.970268] loop0: p35 start 1 is beyond EOD, truncated [ 959.970287] loop0: p36 start 1 is beyond EOD, truncated [ 959.970307] loop0: p37 start 1 is beyond EOD, truncated [ 959.970323] loop0: p38 start 1 is beyond EOD, truncated [ 959.970369] loop0: p39 start 1 is beyond EOD, truncated [ 959.970389] loop0: p40 start 1 is beyond EOD, truncated [ 959.970408] loop0: p41 start 1 is beyond EOD, truncated ** 97 printk messages dropped ** [ 959.973216] loop0: p139 start 1 is beyond EOD, truncated ** 117 printk messages dropped ** [ 960.185107] loop1: p1 start 1 is beyond EOD, truncated [ 960.185115] loop1: p2 size 2 extends beyond EOD, truncated [ 960.186015] loop1: p3 start 201 is beyond EOD, truncated [ 960.186024] loop1: p4 start 301 is beyond EOD, truncated [ 960.186031] loop1: p5 start 1 is beyond EOD, truncated [ 960.186038] loop1: p6 start 1 is beyond EOD, truncated [ 960.186044] loop1: p7 start 1 is beyond EOD, truncated [ 960.186051] loop1: p8 start 1 is beyond EOD, truncated [ 960.186065] loop1: p9 start 1 is beyond EOD, truncated [ 960.186072] loop1: p10 start 1 is beyond EOD, truncated [ 960.186079] loop1: p11 start 1 is beyond EOD, truncated [ 960.186086] loop1: p12 start 1 is beyond EOD, truncated [ 960.186092] loop1: p13 start 1 is beyond EOD, truncated [ 960.186099] loop1: p14 start 1 is beyond EOD, truncated [ 960.186106] loop1: p15 start 1 is beyond EOD, truncated [ 960.186113] loop1: p16 start 1 is beyond EOD, truncated [ 960.186119] loop1: p17 start 1 is beyond EOD, truncated [ 960.186126] loop1: p18 start 1 is beyond EOD, truncated 14:39:32 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0x0, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:32 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x0) 14:39:32 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0), 0x20) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) 14:39:32 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:32 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:32 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0x0, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 960.186133] loop1: p19 start 1 is beyond EOD, truncated [ 960.186140] loop1: p20 start 1 is beyond EOD, truncated [ 960.186146] loop1: p21 start 1 is beyond EOD, truncated [ 960.186153] loop1: p22 start 1 is beyond EOD, truncated [ 960.186160] loop1: p23 start 1 is beyond EOD, truncated 14:39:32 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000140), 0x391, 0x0) 14:39:32 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:32 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 960.186166] loop1: p24 start 1 is beyond EOD, truncated ** 488 printk messages dropped ** [ 960.327524] loop2: p1 start 1 is beyond EOD, truncated [ 960.327562] loop2: p2 size 2 extends beyond EOD, truncated 14:39:32 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) [ 960.335077] loop5: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 14:39:32 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 253 printk messages dropped ** [ 960.369986] loop2: p217 start 1 is beyond EOD, truncated [ 960.370386] loop2: p218 start 1 is beyond EOD, truncated [ 960.370442] loop2: p219 start 1 is beyond EOD, truncated [ 960.370462] loop2: p220 start 1 is beyond EOD, truncated [ 960.370482] loop2: p221 start 1 is beyond EOD, truncated [ 960.370502] loop2: p222 start 1 is beyond EOD, truncated 14:39:32 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) [ 960.370522] loop2: p223 start 1 is beyond EOD, truncated ** 633 printk messages dropped ** [ 960.568436] loop1: p105 start 1 is beyond EOD, truncated [ 960.568443] loop1: p106 start 1 is beyond EOD, truncated [ 960.568449] loop1: p107 start 1 is beyond EOD, truncated [ 960.568456] loop1: p108 start 1 is beyond EOD, truncated [ 960.568463] loop1: p109 start 1 is beyond EOD, truncated [ 960.568469] loop1: p110 start 1 is beyond EOD, truncated ** 12 printk messages dropped ** [ 960.568561] loop1: p123 start 1 is beyond EOD, truncated ** 176 printk messages dropped ** [ 960.574295] loop3: p44 start 1 is beyond EOD, truncated ** 60 printk messages dropped ** [ 960.574828] loop3: p105 start 1 is beyond EOD, truncated [ 960.574834] loop3: p106 start 1 is beyond EOD, truncated [ 960.574841] loop3: p107 start 1 is beyond EOD, truncated [ 960.574847] loop3: p108 start 1 is beyond EOD, truncated [ 960.574854] loop3: p109 start 1 is beyond EOD, truncated [ 960.574860] loop3: p110 start 1 is beyond EOD, truncated [ 960.574867] loop3: p111 start 1 is beyond EOD, truncated [ 960.574873] loop3: p112 start 1 is beyond EOD, truncated [ 960.574883] loop3: p113 start 1 is beyond EOD, truncated [ 960.574890] loop3: p114 start 1 is beyond EOD, truncated [ 960.574897] loop3: p115 start 1 is beyond EOD, truncated [ 960.574903] loop3: p116 start 1 is beyond EOD, truncated [ 960.574910] loop3: p117 start 1 is beyond EOD, truncated [ 960.574916] loop3: p118 start 1 is beyond EOD, truncated [ 960.574923] loop3: p119 start 1 is beyond EOD, truncated [ 960.574929] loop3: p120 start 1 is beyond EOD, truncated [ 960.574935] loop3: p121 start 1 is beyond EOD, truncated [ 960.574941] loop3: p122 start 1 is beyond EOD, truncated [ 960.574947] loop3: p123 start 1 is beyond EOD, truncated [ 960.574953] loop3: p124 start 1 is beyond EOD, truncated [ 960.574960] loop3: p125 start 1 is beyond EOD, truncated [ 960.574969] loop3: p126 start 1 is beyond EOD, truncated [ 960.574975] loop3: p127 start 1 is beyond EOD, truncated [ 960.574982] loop3: p128 start 1 is beyond EOD, truncated ** 55 printk messages dropped ** [ 960.575348] loop3: p184 start 1 is beyond EOD, truncated ** 177 printk messages dropped ** [ 960.887860] loop0: p106 start 1 is beyond EOD, truncated [ 960.887889] loop0: p107 start 1 is beyond EOD, truncated [ 960.887909] loop0: p108 start 1 is beyond EOD, truncated [ 960.887928] loop0: p109 start 1 is beyond EOD, truncated [ 960.887948] loop0: p110 start 1 is beyond EOD, truncated [ 960.887967] loop0: p111 start 1 is beyond EOD, truncated [ 960.887987] loop0: p112 start 1 is beyond EOD, truncated [ 960.888020] loop0: p113 start 1 is beyond EOD, truncated 14:39:33 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:33 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:33 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:33 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) 14:39:33 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:33 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000e95fe0), 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x0) [ 960.888049] loop0: p114 start 1 is beyond EOD, truncated [ 960.888068] loop0: p115 start 1 is beyond EOD, truncated [ 960.888087] loop0: p116 start 1 is beyond EOD, truncated [ 960.888108] loop0: p117 start 1 is beyond EOD, truncated [ 960.888140] loop0: p118 start 1 is beyond EOD, truncated [ 960.888177] loop0: p119 start 1 is beyond EOD, truncated [ 960.888218] loop0: p120 start 1 is beyond EOD, truncated 14:39:33 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) [ 960.888237] loop0: p121 start 1 is beyond EOD, truncated [ 960.888252] loop0: p122 start 1 is beyond EOD, truncated [ 960.888298] loop0: p123 start 1 is beyond EOD, truncated 14:39:33 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:33 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = dup(r0) exit(0x0) write$P9_RSTATFS(r1, 0x0, 0x0) ** 363 printk messages dropped ** [ 961.075578] loop3: p162 start 1 is beyond EOD, truncated ** 131 printk messages dropped ** [ 961.076537] loop1: p163 start 1 is beyond EOD, truncated 14:39:33 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) 14:39:33 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:33 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) [ 961.076543] loop1: p164 start 1 is beyond EOD, truncated [ 961.076549] loop1: p165 start 1 is beyond EOD, truncated [ 961.076556] loop1: p166 start 1 is beyond EOD, truncated [ 961.076562] loop1: p167 start 1 is beyond EOD, truncated [ 961.076568] loop1: p168 start 1 is beyond EOD, truncated [ 961.076574] loop1: p169 start 1 is beyond EOD, truncated ** 10 printk messages dropped ** [ 961.076646] loop1: p180 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 961.076660] loop1: p182 start 1 is beyond EOD, truncated ** 237 printk messages dropped ** [ 961.151323] loop2: p107 start 1 is beyond EOD, truncated [ 961.151339] loop2: p108 start 1 is beyond EOD, truncated [ 961.151374] loop2: p109 start 1 is beyond EOD, truncated [ 961.151393] loop2: p110 start 1 is beyond EOD, truncated [ 961.151434] loop2: p111 start 1 is beyond EOD, truncated [ 961.151453] loop2: p112 start 1 is beyond EOD, truncated [ 961.151474] loop2: p113 start 1 is beyond EOD, truncated [ 961.151493] loop2: p114 start 1 is beyond EOD, truncated [ 961.151535] loop2: p115 start 1 is beyond EOD, truncated [ 961.151554] loop2: p116 start 1 is beyond EOD, truncated [ 961.151573] loop2: p117 start 1 is beyond EOD, truncated [ 961.151647] loop2: p118 start 1 is beyond EOD, truncated [ 961.151666] loop2: p119 start 1 is beyond EOD, truncated [ 961.151708] loop2: p120 start 1 is beyond EOD, truncated [ 961.151726] loop2: p121 start 1 is beyond EOD, truncated [ 961.151769] loop2: p122 start 1 is beyond EOD, truncated [ 961.151788] loop2: p123 start 1 is beyond EOD, truncated [ 961.151806] loop2: p124 start 1 is beyond EOD, truncated [ 961.151848] loop2: p125 start 1 is beyond EOD, truncated [ 961.151869] loop2: p126 start 1 is beyond EOD, truncated [ 961.151888] loop2: p127 start 1 is beyond EOD, truncated [ 961.151908] loop2: p128 start 1 is beyond EOD, truncated [ 961.151927] loop2: p129 start 1 is beyond EOD, truncated [ 961.151942] loop2: p130 start 1 is beyond EOD, truncated [ 961.151987] loop2: p131 start 1 is beyond EOD, truncated [ 961.152007] loop2: p132 start 1 is beyond EOD, truncated [ 961.152021] loop2: p133 start 1 is beyond EOD, truncated ** 36 printk messages dropped ** [ 961.153094] loop2: p170 start 1 is beyond EOD, truncated ** 197 printk messages dropped ** [ 961.355151] loop3: p19 start 1 is beyond EOD, [ 961.355154] loop1: p61 start 1 is beyond EOD, [ 961.355155] truncated [ 961.355156] truncated [ 961.355159] loop3: p20 start 1 is beyond EOD, [ 961.355162] loop1: p62 start 1 is beyond EOD, [ 961.355164] truncated [ 961.355165] truncated [ 961.355168] loop3: p21 start 1 is beyond EOD, [ 961.355171] loop1: p63 start 1 is beyond EOD, [ 961.355172] truncated [ 961.355173] truncated [ 961.355176] loop3: p22 start 1 is beyond EOD, 14:39:34 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) 14:39:34 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:34 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0), 0x20) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) 14:39:34 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:34 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:34 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) [ 961.355179] loop1: p64 start 1 is beyond EOD, [ 961.355180] truncated [ 961.355181] truncated [ 961.355184] loop3: p23 start 1 is beyond EOD, [ 961.355187] loop1: p65 start 1 is beyond EOD, [ 961.355188] truncated [ 961.355190] truncated [ 961.355193] loop3: p24 start 1 is beyond EOD, [ 961.355196] loop1: p66 start 1 is beyond EOD, [ 961.355197] truncated 14:39:34 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 961.355198] truncated [ 961.355202] loop3: p25 start 1 is beyond EOD, [ 961.355204] loop1: p67 start 1 is beyond EOD, [ 961.355206] truncated [ 961.355207] truncated [ 961.355210] loop3: p26 start 1 is beyond EOD, 14:39:34 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) ** 371 printk messages dropped ** [ 961.356090] loop1: p164 start 1 is beyond EOD, truncated [ 961.356096] loop1: p165 start 1 is beyond EOD, truncated ** 18 printk messages dropped ** [ 961.356183] loop1: p177 start 1 is beyond EOD, [ 961.356184] truncated [ 961.356185] truncated [ 961.356188] loop3: p129 start 1 is beyond EOD, [ 961.356191] loop1: p178 start 1 is beyond EOD, [ 961.356193] truncated [ 961.356194] truncated [ 961.356197] loop3: p130 start 1 is beyond EOD, [ 961.356200] loop1: p179 start 1 is beyond EOD, [ 961.356201] truncated [ 961.356202] truncated [ 961.356205] loop3: p131 start 1 is beyond EOD, [ 961.356208] loop1: p180 start 1 is beyond EOD, ** 108 printk messages dropped ** [ 961.356458] truncated ** 26 printk messages dropped ** [ 961.356515] loop1: p214 start 1 is beyond EOD, ** 130 printk messages dropped ** [ 961.356773] loop3: p198 start 1 is beyond EOD, ** 46 printk messages dropped ** [ 961.356908] loop3: p218 start 1 is beyond EOD, truncated 14:39:34 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x0, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:34 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:34 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) ** 165 printk messages dropped ** [ 961.535113] loop5: p128 start 1 is beyond EOD, truncated ** 86 printk messages dropped ** [ 961.541163] loop5: p215 start 1 is beyond EOD, truncated ** 36 printk messages dropped ** [ 961.543762] loop5: p252 start 1 is beyond EOD, truncated 14:39:34 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000140), 0x391, 0x0) [ 961.543782] loop5: p253 start 1 is beyond EOD, truncated [ 961.543802] loop5: p254 start 1 is beyond EOD, truncated [ 961.543822] loop5: p255 start 1 is beyond EOD, truncated 14:39:34 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(0xffffffffffffffff, &(0x7f0000000140), 0x391, 0x0) 14:39:34 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 8 printk messages dropped ** [ 961.709655] loop0: p7 start 1 is beyond EOD, truncated 14:39:34 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, 0x0, 0x0, 0x0) [ 961.709674] loop0: p8 start 1 is beyond EOD, truncated [ 961.709694] loop0: p9 start 1 is beyond EOD, truncated ** 14 printk messages dropped ** [ 961.712029] loop0: p24 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 961.712069] loop0: p26 start 1 is beyond EOD, truncated ** 18 printk messages dropped ** [ 961.712523] loop0: p45 start 1 is beyond EOD, truncated ** 84 printk messages dropped ** [ 961.715055] loop0: p130 start 1 is beyond EOD, truncated ** 151 printk messages dropped ** [ 961.898438] loop1: p22 start 1 is beyond EOD, truncated ** 229 printk messages dropped ** [ 961.899888] loop1: p252 start 1 is beyond EOD, truncated ** 200 printk messages dropped ** [ 961.938682] loop3: p200 start 1 is beyond EOD, truncated ** 61 printk messages dropped ** [ 962.227155] loop1: p6 start 1 is beyond EOD, truncated [ 962.227175] loop1: p7 start 1 is beyond EOD, truncated [ 962.227196] loop1: p8 start 1 is beyond EOD, truncated [ 962.227214] loop1: p9 start 1 is beyond EOD, truncated [ 962.227249] loop1: p10 start 1 is beyond EOD, truncated [ 962.227319] loop1: p11 start 1 is beyond EOD, truncated [ 962.227364] loop1: p12 start 1 is beyond EOD, truncated [ 962.227419] loop1: p13 start 1 is beyond EOD, truncated [ 962.227529] loop1: p14 start 1 is beyond EOD, truncated [ 962.227566] loop1: p15 start 1 is beyond EOD, truncated [ 962.227589] loop1: p16 start 1 is beyond EOD, truncated [ 962.227650] loop1: p17 start 1 is beyond EOD, truncated [ 962.227685] loop1: p18 start 1 is beyond EOD, truncated [ 962.227708] loop1: p19 start 1 is beyond EOD, truncated [ 962.227779] loop1: p20 start 1 is beyond EOD, truncated [ 962.227828] loop1: p21 start 1 is beyond EOD, truncated [ 962.227848] loop1: p22 start 1 is beyond EOD, truncated [ 962.227888] loop1: p23 start 1 is beyond EOD, truncated [ 962.227929] loop1: p24 start 1 is beyond EOD, truncated [ 962.227962] loop1: p25 start 1 is beyond EOD, truncated [ 962.227987] loop1: p26 start 1 is beyond EOD, truncated [ 962.228019] loop1: p27 start 1 is beyond EOD, truncated [ 962.228046] loop1: p28 start 1 is beyond EOD, truncated [ 962.228067] loop1: p29 start 1 is beyond EOD, truncated [ 962.228088] loop1: p30 start 1 is beyond EOD, truncated [ 962.228128] loop1: p31 start 1 is beyond EOD, truncated [ 962.228167] loop1: p32 start 1 is beyond EOD, truncated [ 962.228188] loop1: p33 start 1 is beyond EOD, truncated [ 962.228229] loop1: p34 start 1 is beyond EOD, truncated [ 962.228272] loop1: p35 start 1 is beyond EOD, truncated [ 962.228309] loop1: p36 start 1 is beyond EOD, truncated ** 31 printk messages dropped ** [ 962.229390] loop1: p68 start 1 is beyond EOD, truncated ** 195 printk messages dropped ** [ 962.444089] loop0: p8 start 1 is beyond EOD, truncated [ 962.444108] loop0: p9 start 1 is beyond EOD, truncated [ 962.444127] loop0: p10 start 1 is beyond EOD, truncated [ 962.444147] loop0: p11 start 1 is beyond EOD, truncated [ 962.444188] loop0: p12 start 1 is beyond EOD, truncated [ 962.444207] loop0: p13 start 1 is beyond EOD, truncated [ 962.444226] loop0: p14 start 1 is beyond EOD, truncated [ 962.444287] loop0: p15 start 1 is beyond EOD, truncated [ 962.444321] loop0: p16 start 1 is beyond EOD, truncated [ 962.444340] loop0: p17 start 1 is beyond EOD, truncated [ 962.444368] loop0: p18 start 1 is beyond EOD, truncated [ 962.444388] loop0: p19 start 1 is beyond EOD, truncated [ 962.444408] loop0: p20 start 1 is beyond EOD, truncated [ 962.444427] loop0: p21 start 1 is beyond EOD, truncated [ 962.444446] loop0: p22 start 1 is beyond EOD, truncated [ 962.444481] loop0: p23 start 1 is beyond EOD, truncated [ 962.444501] loop0: p24 start 1 is beyond EOD, truncated [ 962.444521] loop0: p25 start 1 is beyond EOD, truncated 14:39:35 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:35 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:35 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:35 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, 0x0, 0x0, 0x0) 14:39:35 executing program 5: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:35 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 962.444540] loop0: p26 start 1 is beyond EOD, truncated [ 962.444568] loop0: p27 start 1 is beyond EOD, truncated [ 962.444588] loop0: p28 start 1 is beyond EOD, truncated 14:39:35 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, 0x0, 0x0, 0x0) [ 962.444607] loop0: p29 start 1 is beyond EOD, truncated [ 962.444623] loop0: p30 start 1 is beyond EOD, truncated [ 962.444658] loop0: p31 start 1 is beyond EOD, truncated [ 962.444678] loop0: p32 start 1 is beyond EOD, truncated 14:39:35 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 962.444697] loop0: p33 start 1 is beyond EOD, truncated [ 962.444712] loop0: p34 start 1 is beyond EOD, truncated [ 962.444757] loop0: p35 start 1 is beyond EOD, truncated [ 962.444790] loop0: p36 start 1 is beyond EOD, truncated [ 962.444818] loop0: p37 start 1 is beyond EOD, truncated [ 962.444836] loop0: p38 start 1 is beyond EOD, truncated [ 962.444873] loop0: p39 start 1 is beyond EOD, truncated [ 962.444996] loop0: p40 start 1 is beyond EOD, truncated [ 962.445006] loop0: p41 start 1 is beyond EOD, truncated [ 962.445046] loop0: p42 start 1 is beyond EOD, truncated [ 962.445066] loop0: p43 start 1 is beyond EOD, truncated 14:39:35 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 2 printk messages dropped ** [ 962.445138] loop0: p46 start 1 is beyond EOD, truncated [ 962.445221] loop0: p47 start 1 is beyond EOD, truncated [ 962.445251] loop0: p48 start 1 is beyond EOD, truncated [ 962.445308] loop0: p49 start 1 is beyond EOD, truncated ** 90 printk messages dropped ** [ 962.447831] loop0: p140 start 1 is beyond EOD, truncated 14:39:35 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 381 printk messages dropped ** [ 962.774317] loop3: p9 start 1 is beyond EOD, truncated ** 16 printk messages dropped ** [ 962.774760] loop3: p26 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 962.774848] loop3: p28 start 1 is beyond EOD, truncated ** 237 printk messages dropped ** [ 962.805486] loop2: p9 start 1 is beyond EOD, truncated [ 962.805505] loop2: p10 start 1 is beyond EOD, truncated [ 962.805547] loop2: p11 start 1 is beyond EOD, truncated [ 962.805566] loop2: p12 start 1 is beyond EOD, truncated [ 962.805599] loop2: p13 start 1 is beyond EOD, truncated [ 962.805627] loop2: p14 start 1 is beyond EOD, truncated [ 962.805645] loop2: p15 start 1 is beyond EOD, truncated 14:39:35 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x0, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:35 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 962.805687] loop2: p16 start 1 is beyond EOD, truncated [ 962.805705] loop2: p17 start 1 is beyond EOD, truncated [ 962.805747] loop2: p18 start 1 is beyond EOD, truncated [ 962.805766] loop2: p19 start 1 is beyond EOD, truncated [ 962.805781] loop2: p20 start 1 is beyond EOD, truncated [ 962.805827] loop2: p21 start 1 is beyond EOD, truncated [ 962.805845] loop2: p22 start 1 is beyond EOD, truncated [ 962.807061] loop2: p23 start 1 is beyond EOD, truncated [ 962.807099] loop2: p24 start 1 is beyond EOD, truncated [ 962.807139] loop2: p25 start 1 is beyond EOD, truncated [ 962.807178] loop2: p26 start 1 is beyond EOD, truncated [ 962.807198] loop2: p27 start 1 is beyond EOD, truncated [ 962.807238] loop2: p28 start 1 is beyond EOD, truncated [ 962.807260] loop2: p29 start 1 is beyond EOD, truncated [ 962.807278] loop2: p30 start 1 is beyond EOD, truncated [ 962.807297] loop2: p31 start 1 is beyond EOD, truncated [ 962.807318] loop2: p32 start 1 is beyond EOD, truncated [ 962.807342] loop2: p33 start 1 is beyond EOD, truncated [ 962.807377] loop2: p34 start 1 is beyond EOD, truncated [ 962.807397] loop2: p35 start 1 is beyond EOD, truncated ** 215 printk messages dropped ** [ 962.823999] loop2: p251 start 1 is beyond EOD, truncated ** 25 printk messages dropped ** [ 962.926610] Buffer I/O error on dev loop2p2, logical block 0, async page read [ 962.926660] Buffer I/O error on dev loop2p2, logical block 0, async page read [ 963.048877] loop1: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 ** 236 printk messages dropped ** [ 963.122977] loop1: p234 start 1 is beyond EOD, truncated [ 963.122992] loop1: p235 start 1 is beyond EOD, truncated [ 963.123037] loop1: p236 start 1 is beyond EOD, truncated [ 963.123056] loop1: p237 start 1 is beyond EOD, truncated [ 963.123097] loop1: p238 start 1 is beyond EOD, truncated 14:39:36 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:36 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0xa5, 0x0, &(0x7f0000003880)={0x0, 0x989680}) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) 14:39:36 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:36 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x0, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:36 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 963.123116] loop1: p239 start 1 is beyond EOD, truncated 14:39:36 executing program 5: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 963.123235] loop3: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 963.124144] loop1: p240 start 1 is beyond EOD, truncated [ 963.124159] loop1: p241 start 1 is beyond EOD, truncated 14:39:36 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 963.124192] loop1: p242 start 1 is beyond EOD, truncated [ 963.124225] loop1: p243 start 1 is beyond EOD, truncated [ 963.124246] loop1: p244 start 1 is beyond EOD, truncated [ 963.124346] loop1: p245 start 1 is beyond EOD, truncated [ 963.124387] loop1: p246 start 1 is beyond EOD, truncated [ 963.124408] loop1: p247 start 1 is beyond EOD, truncated 14:39:36 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:36 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 963.124455] loop1: p248 start 1 is beyond EOD, truncated [ 963.124475] loop1: p249 start 1 is beyond EOD, truncated [ 963.124495] loop1: p250 start 1 is beyond EOD, truncated [ 963.124515] loop1: p251 start 1 is beyond EOD, truncated [ 963.124534] loop1: p252 start 1 is beyond EOD, truncated 14:39:36 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 236 printk messages dropped ** [ 963.157368] loop3: p5 start 1 is beyond EOD, truncated [ 963.157393] loop3: p6 start 1 is beyond EOD, truncated 14:39:36 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 963.157414] loop3: p7 start 1 is beyond EOD, truncated [ 963.157434] loop3: p8 start 1 is beyond EOD, truncated [ 963.157455] loop3: p9 start 1 is beyond EOD, truncated [ 963.157475] loop3: p10 start 1 is beyond EOD, truncated [ 963.157495] loop3: p11 start 1 is beyond EOD, truncated [ 963.157514] loop3: p12 start 1 is beyond EOD, truncated [ 963.157534] loop3: p13 start 1 is beyond EOD, truncated [ 963.157553] loop3: p14 start 1 is beyond EOD, truncated 14:39:36 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 963.157568] loop3: p15 start 1 is beyond EOD, truncated ** 262 printk messages dropped ** [ 963.176434] loop3: p252 start 1 is beyond EOD, truncated [ 963.176480] loop3: p253 start 1 is beyond EOD, truncated [ 963.177656] loop3: p254 start 1 is beyond EOD, truncated [ 963.177684] loop3: p255 start 1 is beyond EOD, truncated [ 963.238954] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) ** 1 printk messages dropped ** [ 963.435651] loop0: p1 start 1 is beyond EOD, truncated [ 963.435691] loop0: p2 size 2 extends beyond EOD, truncated [ 963.446033] loop0: p3 start 201 is beyond EOD, truncated [ 963.446050] loop0: p4 start 301 is beyond EOD, truncated [ 963.446069] loop0: p5 start 1 is beyond EOD, truncated [ 963.446170] loop0: p6 start 1 is beyond EOD, truncated ** 39 printk messages dropped ** [ 963.450336] loop0: p46 start 1 is beyond EOD, truncated ** 210 printk messages dropped ** [ 963.796822] loop2: p1 start 1 is beyond EOD, truncated [ 963.796854] loop2: p2 size 2 extends beyond EOD, truncated ** 133 printk messages dropped ** [ 963.863076] loop2: p39 start 1 is beyond EOD, truncated ** 97 printk messages dropped ** [ 963.867895] loop2: p137 start 1 is beyond EOD, truncated [ 963.867941] loop2: p138 start 1 is beyond EOD, truncated [ 963.867956] loop2: p139 start 1 is beyond EOD, truncated [ 963.868000] loop2: p140 start 1 is beyond EOD, truncated [ 963.868040] loop2: p141 start 1 is beyond EOD, truncated [ 963.868076] loop2: p142 start 1 is beyond EOD, truncated [ 963.868127] loop2: p143 start 1 is beyond EOD, truncated [ 963.868180] loop2: p144 start 1 is beyond EOD, truncated [ 963.868220] loop2: p145 start 1 is beyond EOD, truncated [ 963.868260] loop2: p146 start 1 is beyond EOD, truncated [ 963.868275] loop2: p147 start 1 is beyond EOD, truncated [ 963.868302] loop2: p148 start 1 is beyond EOD, truncated [ 963.868320] loop2: p149 start 1 is beyond EOD, truncated [ 963.868335] loop2: p150 start 1 is beyond EOD, truncated [ 963.868379] loop2: p151 start 1 is beyond EOD, truncated [ 963.868420] loop2: p152 start 1 is beyond EOD, truncated ** 5 printk messages dropped ** [ 963.868759] loop5: p100 start 1 is beyond EOD, truncated ** 257 printk messages dropped ** [ 963.885681] loop5: p250 start 1 is beyond EOD, truncated [ 963.885721] loop5: p251 start 1 is beyond EOD, truncated [ 963.885740] loop5: p252 start 1 is beyond EOD, truncated [ 963.885761] loop5: p253 start 1 is beyond EOD, truncated [ 963.885781] loop5: p254 start 1 is beyond EOD, truncated [ 963.885802] loop5: p255 start 1 is beyond EOD, truncated [ 963.919143] loop4: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 963.947399] loop4: p1 start 1 is beyond EOD, truncated [ 963.947436] loop4: p2 size 2 extends beyond EOD, truncated [ 963.996912] loop4: p3 start 201 is beyond EOD, truncated 14:39:37 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:37 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:37 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:37 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:37 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:37 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 963.996950] loop4: p4 start 301 is beyond EOD, truncated [ 963.996990] loop4: p5 start 1 is beyond EOD, truncated [ 963.997010] loop4: p6 start 1 is beyond EOD, truncated [ 963.997030] loop4: p7 start 1 is beyond EOD, truncated [ 963.997049] loop4: p8 start 1 is beyond EOD, truncated [ 963.997063] loop4: p9 start 1 is beyond EOD, truncated [ 963.997101] loop4: p10 start 1 is beyond EOD, truncated [ 963.997143] loop4: p11 start 1 is beyond EOD, truncated [ 963.997169] loop4: p12 start 1 is beyond EOD, truncated [ 963.997189] loop4: p13 start 1 is beyond EOD, truncated [ 963.997209] loop4: p14 start 1 is beyond EOD, truncated [ 963.997359] loop4: p15 start 1 is beyond EOD, truncated [ 963.997390] loop4: p16 start 1 is beyond EOD, truncated 14:39:37 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 963.997439] loop4: p17 start 1 is beyond EOD, truncated [ 963.997470] loop4: p18 start 1 is beyond EOD, truncated 14:39:37 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 963.997511] loop4: p19 start 1 is beyond EOD, truncated [ 963.997577] loop4: p20 start 1 is beyond EOD, truncated [ 963.997599] loop4: p21 start 1 is beyond EOD, truncated [ 963.997631] loop4: p22 start 1 is beyond EOD, truncated ** 97 printk messages dropped ** [ 964.004944] loop4: p120 start 1 is beyond EOD, truncated ** 264 printk messages dropped ** [ 964.359256] loop5: p129 start 1 is beyond EOD, truncated 14:39:37 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 123 printk messages dropped ** [ 964.363137] loop5: p253 start 1 is beyond EOD, truncated [ 964.363155] loop5: p254 start 1 is beyond EOD, truncated [ 964.363197] loop5: p255 start 1 is beyond EOD, truncated [ 964.407425] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 964.410952] loop0: p1 start 1 is beyond EOD, truncated [ 964.410991] loop0: p2 size 2 extends beyond EOD, truncated [ 964.417267] loop0: p3 start 201 is beyond EOD, truncated 14:39:37 executing program 2: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 964.417306] loop0: p4 start 301 is beyond EOD, truncated [ 964.417325] loop0: p5 start 1 is beyond EOD, truncated [ 964.417344] loop0: p6 start 1 is beyond EOD, truncated [ 964.417387] loop0: p7 start 1 is beyond EOD, truncated [ 964.417407] loop0: p8 start 1 is beyond EOD, truncated [ 964.417426] loop0: p9 start 1 is beyond EOD, truncated 14:39:37 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 964.417445] loop0: p10 start 1 is beyond EOD, truncated [ 964.417464] loop0: p11 start 1 is beyond EOD, truncated [ 964.417507] loop0: p12 start 1 is beyond EOD, truncated [ 964.417526] loop0: p13 start 1 is beyond EOD, truncated [ 964.417545] loop0: p14 start 1 is beyond EOD, truncated [ 964.417565] loop0: p15 start 1 is beyond EOD, truncated [ 964.417584] loop0: p16 start 1 is beyond EOD, truncated [ 964.417617] loop0: p17 start 1 is beyond EOD, truncated [ 964.417645] loop0: p18 start 1 is beyond EOD, truncated 14:39:37 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 964.417660] loop0: p19 start 1 is beyond EOD, truncated [ 964.417705] loop0: p20 start 1 is beyond EOD, truncated [ 964.417720] loop0: p21 start 1 is beyond EOD, truncated [ 964.417765] loop0: p22 start 1 is beyond EOD, truncated [ 964.417780] loop0: p23 start 1 is beyond EOD, truncated [ 964.417825] loop0: p24 start 1 is beyond EOD, truncated [ 964.417840] loop0: p25 start 1 is beyond EOD, truncated [ 964.417885] loop0: p26 start 1 is beyond EOD, truncated [ 964.417900] loop0: p27 start 1 is beyond EOD, truncated [ 964.417945] loop0: p28 start 1 is beyond EOD, truncated [ 964.417965] loop0: p29 start 1 is beyond EOD, truncated [ 964.417980] loop0: p30 start 1 is beyond EOD, truncated [ 964.418026] loop0: p31 start 1 is beyond EOD, truncated [ 964.418045] loop0: p32 start 1 is beyond EOD, truncated ** 185 printk messages dropped ** [ 964.423485] loop0: p218 start 1 is beyond EOD, truncated ** 38 printk messages dropped ** [ 964.790792] loop4: p1 start 1 is beyond EOD, truncated [ 964.790843] loop4: p2 size 2 extends beyond EOD, truncated [ 964.828582] loop4: p3 start 201 is beyond EOD, truncated [ 964.828633] loop4: p4 start 301 is beyond EOD, truncated [ 964.828682] loop4: p5 start 1 is beyond EOD, truncated [ 964.828702] loop4: p6 start 1 is beyond EOD, truncated [ 964.828723] loop4: p7 start 1 is beyond EOD, truncated [ 964.828770] loop4: p8 start 1 is beyond EOD, truncated [ 964.828790] loop4: p9 start 1 is beyond EOD, truncated [ 964.828810] loop4: p10 start 1 is beyond EOD, truncated ** 20 printk messages dropped ** [ 964.835709] loop4: p31 start 1 is beyond EOD, truncated ** 221 printk messages dropped ** [ 964.863240] loop4: p253 start 1 is beyond EOD, truncated [ 964.863279] loop4: p254 start 1 is beyond EOD, truncated [ 964.863299] loop4: p255 start 1 is beyond EOD, truncated [ 965.053550] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 965.053912] loop2: p1 start 1 is beyond EOD, truncated [ 965.053921] loop2: p2 size 2 extends beyond EOD, truncated [ 965.054979] loop2: p3 start 201 is beyond EOD, truncated [ 965.054987] loop2: p4 start 301 is beyond EOD, truncated [ 965.054993] loop2: p5 start 1 is beyond EOD, truncated [ 965.055000] loop2: p6 start 1 is beyond EOD, truncated [ 965.055007] loop2: p7 start 1 is beyond EOD, truncated [ 965.055024] loop2: p8 start 1 is beyond EOD, truncated [ 965.055031] loop2: p9 start 1 is beyond EOD, truncated [ 965.055038] loop2: p10 start 1 is beyond EOD, truncated 14:39:38 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:38 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:38 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:38 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:38 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:38 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 965.055044] loop2: p11 start 1 is beyond EOD, truncated [ 965.055050] loop2: p12 start 1 is beyond EOD, truncated [ 965.055058] loop2: p13 start 1 is beyond EOD, truncated [ 965.055065] loop2: p14 start 1 is beyond EOD, truncated [ 965.055072] loop2: p15 start 1 is beyond EOD, truncated [ 965.055080] loop2: p16 start 1 is beyond EOD, truncated [ 965.055087] loop2: p17 start 1 is beyond EOD, truncated [ 965.055093] loop2: p18 start 1 is beyond EOD, truncated [ 965.055099] loop2: p19 start 1 is beyond EOD, truncated [ 965.055105] loop2: p20 start 1 is beyond EOD, truncated [ 965.055111] loop2: p21 start 1 is beyond EOD, truncated [ 965.055117] loop2: p22 start 1 is beyond EOD, truncated [ 965.055123] loop2: p23 start 1 is beyond EOD, truncated [ 965.055136] loop2: p24 start 1 is beyond EOD, truncated [ 965.055142] loop2: p25 start 1 is beyond EOD, truncated [ 965.055149] loop2: p26 start 1 is beyond EOD, truncated 14:39:38 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 965.055155] loop2: p27 start 1 is beyond EOD, truncated 14:39:38 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 229 printk messages dropped ** [ 965.211205] loop5: p1 start 1 is beyond EOD, truncated 14:39:38 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 235 printk messages dropped ** [ 965.265123] loop5: p236 start 1 is beyond EOD, truncated [ 965.265143] loop5: p237 start 1 is beyond EOD, truncated [ 965.265163] loop5: p238 start 1 is beyond EOD, truncated [ 965.265183] loop5: p239 start 1 is beyond EOD, truncated [ 965.265204] loop5: p240 start 1 is beyond EOD, truncated [ 965.265244] loop5: p241 start 1 is beyond EOD, truncated [ 965.265284] loop5: p242 start 1 is beyond EOD, truncated [ 965.265304] loop5: p243 start 1 is beyond EOD, truncated 14:39:38 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 965.265343] loop5: p244 start 1 is beyond EOD, truncated [ 965.265363] loop5: p245 start 1 is beyond EOD, truncated 14:39:38 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040), 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:38 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0x0, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 965.265382] loop5: p246 start 1 is beyond EOD, truncated [ 965.265397] loop5: p247 start 1 is beyond EOD, truncated [ 965.265436] loop5: p248 start 1 is beyond EOD, truncated [ 965.265456] loop5: p249 start 1 is beyond EOD, truncated [ 965.265476] loop5: p250 start 1 is beyond EOD, truncated [ 965.265516] loop5: p251 start 1 is beyond EOD, truncated [ 965.265535] loop5: p252 start 1 is beyond EOD, truncated [ 965.265564] loop5: p253 start 1 is beyond EOD, truncated [ 965.265583] loop5: p254 start 1 is beyond EOD, truncated [ 965.265602] loop5: p255 start 1 is beyond EOD, truncated [ 965.271544] loop4: p1 start 1 is beyond EOD, truncated [ 965.272879] loop4: p2 size 2 extends beyond EOD, truncated ** 254 printk messages dropped ** [ 965.445164] loop0: p1 start 1 is beyond EOD, truncated [ 965.445185] loop0: p2 size 2 extends beyond EOD, truncated [ 965.451522] loop0: p3 start 201 is beyond EOD, truncated [ 965.451542] loop0: p4 start 301 is beyond EOD, truncated [ 965.451562] loop0: p5 start 1 is beyond EOD, truncated [ 965.451581] loop0: p6 start 1 is beyond EOD, truncated [ 965.451605] loop0: p7 start 1 is beyond EOD, truncated [ 965.451642] loop0: p8 start 1 is beyond EOD, truncated [ 965.451661] loop0: p9 start 1 is beyond EOD, truncated [ 965.451681] loop0: p10 start 1 is beyond EOD, truncated ** 95 printk messages dropped ** [ 965.454436] loop0: p106 start 1 is beyond EOD, truncated ** 144 printk messages dropped ** [ 965.458259] loop0: p251 start 1 is beyond EOD, truncated [ 965.458280] loop0: p252 start 1 is beyond EOD, truncated [ 965.458300] loop0: p253 start 1 is beyond EOD, truncated [ 965.458341] loop0: p254 start 1 is beyond EOD, truncated [ 965.458380] loop0: p255 start 1 is beyond EOD, truncated [ 965.803117] loop4: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 ** 237 printk messages dropped ** [ 965.845023] loop4: p163 start 1 is beyond EOD, truncated [ 965.845049] loop4: p164 start 1 is beyond EOD, truncated 14:39:39 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:39 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040), 0x0, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:39 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040), 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:39 executing program 4: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:39 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:39 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0x0, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 965.845063] loop4: p165 start 1 is beyond EOD, truncated [ 965.845128] loop4: p166 start 1 is beyond EOD, truncated [ 965.845178] loop4: p167 start 1 is beyond EOD, truncated [ 965.845218] loop4: p168 start 1 is beyond EOD, truncated [ 965.845240] loop4: p169 start 1 is beyond EOD, [ 965.845351] truncated [ 965.845358] loop2: p72 start 1 is beyond EOD, truncated [ 965.845373] loop2: p73 start 1 is beyond EOD, truncated [ 965.845399] loop2: p74 start 1 is beyond EOD, truncated [ 965.845413] loop2: p75 start 1 is beyond EOD, truncated [ 965.845439] loop2: p76 start 1 is beyond EOD, truncated [ 965.845453] loop2: p77 start 1 is beyond EOD, truncated ** 3 printk messages dropped ** [ 965.845583] loop2: p81 start 1 is beyond EOD, truncated [ 965.845610] loop2: p82 start 1 is beyond EOD, truncated [ 965.845628] loop2: p83 start 1 is beyond EOD, truncated 14:39:39 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040), 0x0, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:39 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 965.845643] loop2: p84 start 1 is beyond EOD, truncated [ 965.845669] loop2: p85 start 1 is beyond EOD, truncated 14:39:39 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040), 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:39 executing program 4: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 965.845687] loop2: p86 start 1 is beyond EOD, truncated ** 166 printk messages dropped ** [ 965.850594] loop2: p181 start 1 is beyond EOD, truncated ** 85 printk messages dropped ** [ 965.854765] loop2: p248 start 1 is beyond EOD, truncated [ 965.854779] loop2: p249 start 1 is beyond EOD, truncated [ 965.854805] loop2: p250 start 1 is beyond EOD, truncated [ 965.854823] loop2: p251 start 1 is beyond EOD, truncated 14:39:39 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0x0, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 965.854845] loop2: p252 start 1 is beyond EOD, truncated [ 965.854859] loop2: p253 start 1 is beyond EOD, truncated [ 965.854899] loop2: p254 start 1 is beyond EOD, truncated [ 965.854925] loop2: p255 start 1 is beyond EOD, truncated [ 966.337421] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 14:39:39 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040), 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 232 printk messages dropped ** [ 966.418342] loop4: p230 start 1 is beyond EOD, truncated [ 966.418362] loop4: p231 start 1 is beyond EOD, truncated [ 966.418381] loop4: p232 start 1 is beyond EOD, truncated [ 966.418415] loop4: p233 start 1 is beyond EOD, truncated [ 966.418453] loop4: p234 start 1 is beyond EOD, truncated [ 966.418472] loop4: p235 start 1 is beyond EOD, truncated [ 966.418492] loop4: p236 start 1 is beyond EOD, truncated [ 966.418517] loop4: p237 start 1 is beyond EOD, truncated [ 966.418573] loop4: p238 start 1 is beyond EOD, truncated [ 966.418593] loop4: p239 start 1 is beyond EOD, truncated [ 966.418612] loop4: p240 start 1 is beyond EOD, truncated [ 966.418632] loop4: p241 start 1 is beyond EOD, truncated [ 966.418652] loop4: p242 start 1 is beyond EOD, truncated [ 966.418671] loop4: p243 start 1 is beyond EOD, truncated ** 2 printk messages dropped ** [ 966.418745] loop4: p246 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 966.418793] loop4: p248 start 1 is beyond EOD, truncated ** 252 printk messages dropped ** [ 966.504816] loop0: p248 start 1 is beyond EOD, truncated [ 966.504836] loop0: p249 start 1 is beyond EOD, truncated [ 966.504856] loop0: p250 start 1 is beyond EOD, truncated [ 966.504875] loop0: p251 start 1 is beyond EOD, truncated [ 966.504910] loop0: p252 start 1 is beyond EOD, truncated [ 966.504948] loop0: p253 start 1 is beyond EOD, truncated [ 966.504977] loop0: p254 start 1 is beyond EOD, truncated [ 966.504997] loop0: p255 start 1 is beyond EOD, truncated 14:39:39 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:39 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040), 0x0, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:39 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040), 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:39 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040), 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:39 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001", 0x30, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 966.835334] loop4: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 14:39:40 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 966.841696] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 14:39:40 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 966.846303] loop4: p1 start 1 is beyond EOD, truncated [ 966.846394] loop4: p2 size 2 extends beyond EOD, truncated [ 966.848249] loop2: p1 start 1 is beyond EOD, truncated [ 966.848269] loop2: p2 size 2 extends beyond EOD, truncated [ 966.857112] loop2: p3 start 201 is beyond EOD, truncated 14:39:40 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001", 0x30, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:40 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001", 0x30, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:40 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 966.857939] loop2: p4 start 301 is beyond EOD, truncated [ 966.857981] loop2: p5 start 1 is beyond EOD, truncated [ 966.858010] loop2: p6 start 1 is beyond EOD, truncated [ 966.858037] loop2: p7 start 1 is beyond EOD, truncated ** 35 printk messages dropped ** [ 966.859206] loop2: p43 start 1 is beyond EOD, truncated 14:39:40 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 204 printk messages dropped ** [ 966.871580] loop2: p248 start 1 is beyond EOD, truncated ** 252 printk messages dropped ** [ 966.935126] loop4: p248 start 1 is beyond EOD, truncated [ 966.935145] loop4: p249 start 1 is beyond EOD, truncated [ 966.935195] loop4: p250 start 1 is beyond EOD, truncated [ 966.935214] loop4: p251 start 1 is beyond EOD, truncated [ 966.935255] loop4: p252 start 1 is beyond EOD, truncated 14:39:40 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001", 0x30, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 966.935295] loop4: p253 start 1 is beyond EOD, truncated [ 966.935310] loop4: p254 start 1 is beyond EOD, truncated [ 966.935356] loop4: p255 start 1 is beyond EOD, truncated [ 967.288838] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 ** 236 printk messages dropped ** [ 967.320263] truncated [ 967.320272] loop2: p236 start 1 is beyond EOD, truncated [ 967.320311] loop2: p237 start 1 is beyond EOD, truncated [ 967.320351] loop2: p238 start 1 is beyond EOD, truncated [ 967.320371] loop2: p239 start 1 is beyond EOD, truncated [ 967.320391] loop2: p240 start 1 is beyond EOD, truncated [ 967.320411] loop2: p241 start 1 is beyond EOD, truncated [ 967.320431] loop2: p242 start 1 is beyond EOD, truncated [ 967.320461] loop2: p243 start 1 is beyond EOD, truncated [ 967.320502] loop2: p244 start 1 is beyond EOD, truncated [ 967.320544] loop2: p245 start 1 is beyond EOD, truncated [ 967.320570] loop2: p246 start 1 is beyond EOD, truncated [ 967.320584] loop2: p247 start 1 is beyond EOD, truncated [ 967.320610] loop2: p248 start 1 is beyond EOD, truncated [ 967.320628] loop2: p249 start 1 is beyond EOD, truncated [ 967.320650] loop2: p250 start 1 is beyond EOD, truncated [ 967.320668] loop2: p251 start 1 is beyond EOD, truncated [ 967.320691] loop2: p252 start 1 is beyond EOD, truncated [ 967.320750] loop2: p253 start 1 is beyond EOD, truncated [ 967.320769] loop2: p254 start 1 is beyond EOD, truncated [ 967.320784] loop2: p255 start 1 is beyond EOD, truncated [ 967.335852] loop5: p1 start 1 is beyond EOD, truncated [ 967.335865] loop5: p2 size 2 extends beyond EOD, truncated [ 967.386144] loop5: p3 start 201 is beyond EOD, truncated [ 967.386175] loop5: p4 start 301 is beyond EOD, truncated [ 967.386222] loop5: p5 start 1 is beyond EOD, truncated [ 967.386241] loop5: p6 start 1 is beyond EOD, truncated [ 967.386261] loop5: p7 start 1 is beyond EOD, truncated [ 967.386280] loop5: p8 start 1 is beyond EOD, truncated [ 967.386300] loop5: p9 start 1 is beyond EOD, truncated ** 129 printk messages dropped ** [ 967.393016] loop5: p139 start 1 is beyond EOD, truncated ** 107 printk messages dropped ** [ 967.396290] loop5: p247 start 1 is beyond EOD, truncated [ 967.396336] loop5: p248 start 1 is beyond EOD, truncated [ 967.396355] loop5: p249 start 1 is beyond EOD, truncated [ 967.396371] loop5: p250 start 1 is beyond EOD, truncated [ 967.396416] loop5: p251 start 1 is beyond EOD, truncated [ 967.396451] loop5: p252 start 1 is beyond EOD, truncated [ 967.396496] loop5: p253 start 1 is beyond EOD, truncated [ 967.396515] loop5: p254 start 1 is beyond EOD, truncated [ 967.396531] loop5: p255 start 1 is beyond EOD, truncated [ 967.513184] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 967.518884] loop0: p1 start 1 is beyond EOD, truncated [ 967.518914] loop0: p2 size 2 extends beyond EOD, truncated [ 967.526102] loop0: p3 start 201 is beyond EOD, truncated [ 967.526140] loop0: p4 start 301 is beyond EOD, truncated [ 967.526159] loop0: p5 start 1 is beyond EOD, truncated [ 967.526179] loop0: p6 start 1 is beyond EOD, truncated [ 967.526199] loop0: p7 start 1 is beyond EOD, truncated [ 967.526240] loop0: p8 start 1 is beyond EOD, truncated 14:39:41 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:41 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001", 0x30, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:41 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:41 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:41 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:41 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900", 0x48, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 967.526260] loop0: p9 start 1 is beyond EOD, truncated [ 967.526279] loop0: p10 start 1 is beyond EOD, truncated [ 967.526294] loop0: p11 start 1 is beyond EOD, truncated [ 967.526340] loop0: p12 start 1 is beyond EOD, truncated [ 967.526354] loop0: p13 start 1 is beyond EOD, truncated [ 967.526399] loop0: p14 start 1 is beyond EOD, truncated [ 967.526421] loop0: p15 start 1 is beyond EOD, truncated [ 967.526440] loop0: p16 start 1 is beyond EOD, truncated [ 967.526458] loop0: p17 start 1 is beyond EOD, truncated [ 967.526500] loop0: p18 start 1 is beyond EOD, truncated [ 967.526519] loop0: p19 start 1 is beyond EOD, truncated [ 967.526560] loop0: p20 start 1 is beyond EOD, truncated [ 967.526579] loop0: p21 start 1 is beyond EOD, truncated [ 967.526613] loop0: p22 start 1 is beyond EOD, truncated [ 967.526641] loop0: p23 start 1 is beyond EOD, truncated [ 967.526660] loop0: p24 start 1 is beyond EOD, truncated [ 967.526680] loop0: p25 start 1 is beyond EOD, truncated 14:39:41 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900", 0x48, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 967.526694] loop0: p26 start 1 is beyond EOD, truncated [ 967.526739] loop0: p27 start 1 is beyond EOD, truncated ** 9 printk messages dropped ** [ 967.527060] loop0: p37 start 1 is beyond EOD, truncated ** 18 printk messages dropped ** [ 967.527559] loop0: p56 start 1 is beyond EOD, truncated 14:39:41 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001", 0x30, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 4 printk messages dropped ** [ 967.527659] loop0: p61 start 1 is beyond EOD, truncated [ 967.527700] loop0: p62 start 1 is beyond EOD, truncated ** 345 printk messages dropped ** [ 967.902335] loop5: p152 start 1 is beyond EOD, truncated ** 400 printk messages dropped ** [ 968.320869] loop5: p41 start 1 is beyond EOD, truncated [ 968.320884] loop5: p42 start 1 is beyond EOD, truncated [ 968.320930] loop5: p43 start 1 is beyond EOD, truncated [ 968.320950] loop5: p44 start 1 is beyond EOD, truncated 14:39:41 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900", 0x48, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 968.320969] loop5: p45 start 1 is beyond EOD, truncated 14:39:41 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 968.321049] loop5: p46 start 1 is beyond EOD, truncated [ 968.321088] loop5: p47 start 1 is beyond EOD, truncated 14:39:41 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:41 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 968.321110] loop5: p48 start 1 is beyond EOD, truncated [ 968.321124] loop5: p49 start 1 is beyond EOD, truncated [ 968.321164] loop5: p50 start 1 is beyond EOD, truncated [ 968.321190] loop5: p51 start 1 is beyond EOD, truncated [ 968.321204] loop5: p52 start 1 is beyond EOD, truncated [ 968.321230] loop5: p53 start 1 is beyond EOD, truncated [ 968.321244] loop5: p54 start 1 is beyond EOD, truncated [ 968.321270] loop5: p55 start 1 is beyond EOD, truncated ** 22 printk messages dropped ** [ 968.321984] loop5: p78 start 1 is beyond EOD, truncated ** 3 printk messages dropped ** [ 968.322085] loop5: p82 start 1 is beyond EOD, truncated [ 968.322105] loop5: p83 start 1 is beyond EOD, truncated ** 39 printk messages dropped ** [ 968.323316] loop5: p123 start 1 is beyond EOD, truncated ** 133 printk messages dropped ** [ 968.789017] loop5: p1 start 1 is beyond EOD, truncated ** 184 printk messages dropped ** [ 968.837352] loop5: p186 start 1 is beyond EOD, truncated ** 99 printk messages dropped ** [ 968.856984] loop2: p30 start 1 is beyond EOD, truncated ** 34 printk messages dropped ** [ 968.857989] loop2: p65 start 1 is beyond EOD, truncated [ 968.858008] loop2: p66 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 968.858069] loop2: p68 start 1 is beyond EOD, truncated ** 123 printk messages dropped ** [ 968.863717] loop2: p192 start 1 is beyond EOD, truncated ** 110 printk messages dropped ** [ 969.093395] loop4: p47 start 1 is beyond EOD, truncated [ 969.093446] loop4: p48 start 1 is beyond EOD, truncated [ 969.093481] loop4: p49 start 1 is beyond EOD, truncated [ 969.093507] loop4: p50 start 1 is beyond EOD, truncated [ 969.093521] loop4: p51 start 1 is beyond EOD, truncated [ 969.093546] loop4: p52 start 1 is beyond EOD, truncated [ 969.093560] loop4: p53 start 1 is beyond EOD, truncated [ 969.093586] loop4: p54 start 1 is beyond EOD, truncated [ 969.093710] loop4: p55 start 1 is beyond EOD, truncated [ 969.093736] loop4: p56 start 1 is beyond EOD, truncated [ 969.093750] loop4: p57 start 1 is beyond EOD, truncated [ 969.093776] loop4: p58 start 1 is beyond EOD, truncated [ 969.093825] loop4: p59 start 1 is beyond EOD, truncated [ 969.093859] loop4: p60 start 1 is beyond EOD, truncated [ 969.093888] loop4: p61 start 1 is beyond EOD, truncated [ 969.093907] loop4: p62 start 1 is beyond EOD, truncated [ 969.093927] loop4: p63 start 1 is beyond EOD, truncated [ 969.093946] loop4: p64 start 1 is beyond EOD, truncated [ 969.094011] loop4: p65 start 1 is beyond EOD, truncated [ 969.094037] loop4: p66 start 1 is beyond EOD, truncated [ 969.094056] loop4: p67 start 1 is beyond EOD, truncated [ 969.094096] loop4: p68 start 1 is beyond EOD, truncated [ 969.094135] loop4: p69 start 1 is beyond EOD, truncated [ 969.094175] loop4: p70 start 1 is beyond EOD, truncated [ 969.094226] loop4: p71 start 1 is beyond EOD, truncated [ 969.094245] loop4: p72 start 1 is beyond EOD, truncated [ 969.094268] loop4: p73 start 1 is beyond EOD, truncated [ 969.094285] loop4: p74 start 1 is beyond EOD, truncated [ 969.094335] loop4: p75 start 1 is beyond EOD, truncated [ 969.094385] loop4: p76 start 1 is beyond EOD, truncated [ 969.094436] loop4: p77 start 1 is beyond EOD, truncated ** 164 printk messages dropped ** [ 969.099396] loop4: p242 start 1 is beyond EOD, truncated ** 63 printk messages dropped ** [ 969.317320] loop0: p50 start 1 is beyond EOD, truncated [ 969.317339] loop0: p51 start 1 is beyond EOD, truncated [ 969.317359] loop0: p52 start 1 is beyond EOD, truncated [ 969.317393] loop0: p53 start 1 is beyond EOD, truncated [ 969.317421] loop0: p54 start 1 is beyond EOD, truncated [ 969.317441] loop0: p55 start 1 is beyond EOD, truncated [ 969.317460] loop0: p56 start 1 is beyond EOD, truncated [ 969.317480] loop0: p57 start 1 is beyond EOD, truncated [ 969.317495] loop0: p58 start 1 is beyond EOD, truncated [ 969.317540] loop0: p59 start 1 is beyond EOD, truncated [ 969.317560] loop0: p60 start 1 is beyond EOD, truncated [ 969.317580] loop0: p61 start 1 is beyond EOD, truncated [ 969.317600] loop0: p62 start 1 is beyond EOD, truncated [ 969.317631] loop0: p63 start 1 is beyond EOD, truncated [ 969.317665] loop0: p64 start 1 is beyond EOD, truncated [ 969.317702] loop0: p65 start 1 is beyond EOD, truncated [ 969.317730] loop0: p66 start 1 is beyond EOD, truncated [ 969.317749] loop0: p67 start 1 is beyond EOD, truncated [ 969.317790] loop0: p68 start 1 is beyond EOD, truncated [ 969.317810] loop0: p69 start 1 is beyond EOD, truncated [ 969.317847] loop0: p70 start 1 is beyond EOD, truncated 14:39:42 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:42 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900", 0x48, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:42 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900000064000000000432000520", 0x54, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:42 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:42 executing program 4: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001", 0x30, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:42 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 969.317879] loop0: p71 start 1 is beyond EOD, truncated [ 969.317895] loop0: p72 start 1 is beyond EOD, truncated [ 969.317933] loop0: p73 start 1 is beyond EOD, truncated [ 969.317961] loop0: p74 start 1 is beyond EOD, truncated [ 969.317980] loop0: p75 start 1 is beyond EOD, truncated [ 969.318000] loop0: p76 start 1 is beyond EOD, truncated [ 969.318020] loop0: p77 start 1 is beyond EOD, truncated [ 969.318040] loop0: p78 start 1 is beyond EOD, truncated [ 969.318060] loop0: p79 start 1 is beyond EOD, truncated [ 969.318080] loop0: p80 start 1 is beyond EOD, truncated [ 969.318099] loop0: p81 start 1 is beyond EOD, truncated [ 969.318119] loop0: p82 start 1 is beyond EOD, truncated [ 969.318134] loop0: p83 start 1 is beyond EOD, truncated 14:39:42 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900", 0x48, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 969.318180] loop0: p84 start 1 is beyond EOD, truncated ** 4 printk messages dropped ** [ 969.318338] loop0: p89 start 1 is beyond EOD, truncated ** 120 printk messages dropped ** [ 969.323552] loop0: p210 start 1 is beyond EOD, truncated ** 71 printk messages dropped ** [ 969.708651] loop5: p1 start 1 is beyond EOD, truncated 14:39:42 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900000064000000000432000520", 0x54, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:42 executing program 4: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900", 0x48, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 291 printk messages dropped ** [ 969.776001] loop4: p132 start 1 is beyond EOD, [ 969.776005] loop5: p105 start 1 is beyond EOD, [ 969.776013] truncated [ 969.776019] loop4: p133 start 1 is beyond EOD, [ 969.776024] truncated [ 969.776038] loop5: p106 start 1 is beyond EOD, truncated [ 969.776054] truncated 14:39:42 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:39:42 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) [ 969.776056] loop5: p107 start 1 is beyond EOD, truncated 14:39:42 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900", 0x48, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 969.776061] loop4: p134 start 1 is beyond EOD, truncated [ 969.776079] loop4: p135 start 1 is beyond EOD, [ 969.776085] loop5: p108 start 1 is beyond EOD, [ 969.776099] truncated [ 969.776103] truncated [ 969.776138] loop4: p136 start 1 is beyond EOD, [ 969.776170] loop5: p109 start 1 is beyond EOD, [ 969.776182] truncated [ 969.776189] loop4: p137 start 1 is beyond EOD, [ 969.776199] truncated [ 969.776209] truncated [ 969.776224] loop5: p110 start 1 is beyond EOD, [ 969.776239] loop4: p138 start 1 is beyond EOD, [ 969.776243] truncated [ 969.776256] loop5: p111 start 1 is beyond EOD, truncated [ 969.776259] truncated [ 969.776281] loop4: p139 start 1 is beyond EOD, [ 969.776286] loop5: p112 start 1 is beyond EOD, ** 1 printk messages dropped ** [ 969.776299] loop4: p140 start 1 is beyond EOD, ** 3 printk messages dropped ** [ 969.776360] loop4: p142 start 1 is beyond EOD, truncated [ 969.776375] loop4: p143 start 1 is beyond EOD, truncated [ 969.776414] loop4: p144 start 1 is beyond EOD, truncated [ 969.776433] loop4: p145 start 1 is beyond EOD, truncated [ 969.776460] loop4: p146 start 1 is beyond EOD, ** 123 printk messages dropped ** [ 969.778177] loop5: p127 start 1 is beyond EOD, truncated ** 159 printk messages dropped ** [ 969.784389] loop2: p139 start 1 is beyond EOD, truncated [ 969.784404] loop2: p140 start 1 is beyond EOD, truncated [ 969.784450] loop2: p141 start 1 is beyond EOD, truncated [ 969.784468] loop2: p142 start 1 is beyond EOD, truncated [ 969.784510] loop2: p143 start 1 is beyond EOD, truncated [ 969.784529] loop2: p144 start 1 is beyond EOD, truncated [ 969.784544] loop2: p145 start 1 is beyond EOD, truncated ** 10 printk messages dropped ** [ 969.785002] loop5: p193 start 1 is beyond EOD, truncated [ 969.785021] loop5: p194 start 1 is beyond EOD, truncated [ 969.785062] loop5: p195 start 1 is beyond EOD, truncated [ 969.785082] loop5: p196 start 1 is beyond EOD, truncated ** 140 printk messages dropped ** [ 969.789067] loop2: p226 start 1 is beyond EOD, truncated [ 969.789087] loop2: p227 start 1 is beyond EOD, truncated ** 27 printk messages dropped ** [ 969.793294] loop2: p255 start 1 is beyond EOD, truncated ** 2 printk messages dropped ** [ 969.804513] loop4: p181 start 1 is beyond EOD, truncated ** 30 printk messages dropped ** [ 969.806777] loop4: p212 start 1 is beyond EOD, truncated ** 46 printk messages dropped ** [ 970.157679] loop4: p1 start 1 is beyond EOD, truncated [ 970.157731] loop4: p2 size 2 extends beyond EOD, truncated [ 970.171166] loop2: p1 start 1 is beyond EOD, truncated [ 970.172032] loop2: p2 size 2 extends beyond EOD, truncated [ 970.193647] loop4: p3 start 201 is beyond EOD, truncated [ 970.193678] loop4: p4 start 301 is beyond EOD, truncated [ 970.193705] loop4: p5 start 1 is beyond EOD, truncated [ 970.193724] loop4: p6 start 1 is beyond EOD, truncated [ 970.193739] loop4: p7 start 1 is beyond EOD, truncated [ 970.193784] loop4: p8 start 1 is beyond EOD, truncated [ 970.197268] loop4: p9 start 1 is beyond EOD, truncated [ 970.197306] loop4: p10 start 1 is beyond EOD, truncated [ 970.197326] loop4: p11 start 1 is beyond EOD, truncated [ 970.197354] loop4: p12 start 1 is beyond EOD, truncated [ 970.197374] loop4: p13 start 1 is beyond EOD, truncated [ 970.197393] loop4: p14 start 1 is beyond EOD, truncated [ 970.197426] loop4: p15 start 1 is beyond EOD, truncated [ 970.197453] loop4: p16 start 1 is beyond EOD, truncated [ 970.197472] loop4: p17 start 1 is beyond EOD, truncated [ 970.197514] loop4: p18 start 1 is beyond EOD, truncated [ 970.197533] loop4: p19 start 1 is beyond EOD, truncated 14:39:43 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:43 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) 14:39:43 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900000064000000000432000520", 0x54, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:43 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900000064000000000432000520", 0x54, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:43 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) 14:39:43 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900000064000000000432000520", 0x54, 0x1a0}]) [ 970.197552] loop4: p20 start 1 is beyond EOD, truncated [ 970.197577] loop4: p21 start 1 is beyond EOD, truncated [ 970.197614] loop4: p22 start 1 is beyond EOD, truncated [ 970.197651] loop4: p23 start 1 is beyond EOD, truncated [ 970.197704] loop4: p24 start 1 is beyond EOD, truncated [ 970.197723] loop4: p25 start 1 is beyond EOD, truncated [ 970.197743] loop4: p26 start 1 is beyond EOD, truncated [ 970.197763] loop4: p27 start 1 is beyond EOD, truncated [ 970.197782] loop4: p28 start 1 is beyond EOD, truncated [ 970.197815] loop4: p29 start 1 is beyond EOD, truncated [ 970.197833] loop4: p30 start 1 is beyond EOD, truncated [ 970.197848] loop4: p31 start 1 is beyond EOD, truncated [ 970.197894] loop4: p32 start 1 is beyond EOD, truncated [ 970.197913] loop4: p33 start 1 is beyond EOD, truncated [ 970.197928] loop4: p34 start 1 is beyond EOD, truncated [ 970.197974] loop4: p35 start 1 is beyond EOD, truncated 14:39:43 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 970.197993] loop4: p36 start 1 is beyond EOD, truncated [ 970.198008] loop4: p37 start 1 is beyond EOD, truncated [ 970.198053] loop4: p38 start 1 is beyond EOD, truncated 14:39:43 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x0, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:43 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x0, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 970.198094] loop4: p39 start 1 is beyond EOD, truncated [ 970.198154] loop4: p40 start 1 is beyond EOD, truncated [ 970.198168] loop4: p41 start 1 is beyond EOD, truncated 14:39:43 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}}, {{@in=@local}, 0x0, @in6}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:43 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900000064000000000432000520", 0x54, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 970.198194] loop4: p42 start 1 is beyond EOD, truncated [ 970.198213] loop4: p43 start 1 is beyond EOD, truncated [ 970.198228] loop4: p44 start 1 is beyond EOD, truncated [ 970.201771] loop4: p45 start 1 is beyond EOD, truncated [ 970.201808] loop4: p46 start 1 is beyond EOD, truncated [ 970.201828] loop4: p47 start 1 is beyond EOD, truncated [ 970.201848] loop4: p48 start 1 is beyond EOD, truncated [ 970.201868] loop4: p49 start 1 is beyond EOD, truncated [ 970.201888] loop4: p50 start 1 is beyond EOD, truncated [ 970.201930] loop4: p51 start 1 is beyond EOD, truncated 14:39:43 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 970.201949] loop4: p52 start 1 is beyond EOD, truncated [ 970.201969] loop4: p53 start 1 is beyond EOD, truncated [ 970.201989] loop4: p54 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 970.202023] loop4: p56 start 1 is beyond EOD, truncated ** 716 printk messages dropped ** [ 970.546281] loop0: p1 start 1 is beyond EOD, truncated [ 970.546317] loop0: p2 size 2 extends beyond EOD, truncated [ 970.555816] loop0: p3 start 201 is beyond EOD, truncated [ 970.555837] loop0: p4 start 301 is beyond EOD, truncated [ 970.555856] loop0: p5 start 1 is beyond EOD, truncated [ 970.555876] loop0: p6 start 1 is beyond EOD, truncated [ 970.555895] loop0: p7 start 1 is beyond EOD, truncated [ 970.555915] loop0: p8 start 1 is beyond EOD, truncated [ 970.555934] loop0: p9 start 1 is beyond EOD, truncated [ 970.555968] loop0: p10 start 1 is beyond EOD, truncated [ 970.555996] loop0: p11 start 1 is beyond EOD, truncated [ 970.556016] loop0: p12 start 1 is beyond EOD, truncated [ 970.556035] loop0: p13 start 1 is beyond EOD, truncated [ 970.556055] loop0: p14 start 1 is beyond EOD, truncated [ 970.556074] loop0: p15 start 1 is beyond EOD, truncated [ 970.556116] loop0: p16 start 1 is beyond EOD, truncated [ 970.556135] loop0: p17 start 1 is beyond EOD, truncated [ 970.556150] loop0: p18 start 1 is beyond EOD, truncated [ 970.556197] loop0: p19 start 1 is beyond EOD, truncated [ 970.556215] loop0: p20 start 1 is beyond EOD, truncated ** 98 printk messages dropped ** [ 970.559130] loop0: p119 start 1 is beyond EOD, truncated ** 138 printk messages dropped ** [ 970.869948] loop5: p1 start 1 is beyond EOD, truncated [ 970.869998] loop5: p2 size 2 extends beyond EOD, truncated [ 970.880599] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 970.894174] loop2: p1 start 1 is beyond EOD, truncated [ 970.894206] loop2: p2 size 2 extends beyond EOD, truncated [ 970.911905] loop5: p3 start 201 is beyond EOD, truncated [ 970.911937] loop5: p4 start 301 is beyond EOD, truncated [ 970.912003] loop5: p5 start 1 is beyond EOD, truncated [ 970.912023] loop5: p6 start 1 is beyond EOD, truncated [ 970.912043] loop5: p7 start 1 is beyond EOD, truncated [ 970.912062] loop5: p8 start 1 is beyond EOD, truncated [ 970.912084] loop5: p9 start 1 is beyond EOD, truncated [ 970.912114] loop5: p10 start 1 is beyond EOD, truncated [ 970.912142] loop5: p11 start 1 is beyond EOD, truncated 14:39:44 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x0, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:44 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900000064000000000432000520", 0x54, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:44 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:44 executing program 5: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900000064000000000432000520", 0x54, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:44 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x0, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:44 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001", 0x30, 0x1a0}]) [ 970.912161] loop5: p12 start 1 is beyond EOD, truncated [ 970.912182] loop5: p13 start 1 is beyond EOD, truncated [ 970.912202] loop5: p14 start 1 is beyond EOD, truncated [ 970.912222] loop5: p15 start 1 is beyond EOD, truncated [ 970.912241] loop5: p16 start 1 is beyond EOD, truncated [ 970.912262] loop5: p17 start 1 is beyond EOD, truncated [ 970.912282] loop5: p18 start 1 is beyond EOD, truncated 14:39:44 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:44 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d30600", 0x5d, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 970.913716] loop5: p19 start 1 is beyond EOD, truncated [ 970.913737] loop5: p20 start 1 is beyond EOD, truncated [ 970.913758] loop5: p21 start 1 is beyond EOD, truncated [ 970.913789] loop5: p22 start 1 is beyond EOD, truncated [ 970.913815] loop5: p23 start 1 is beyond EOD, truncated ** 25 printk messages dropped ** [ 970.914645] loop5: p49 start 1 is beyond EOD, truncated ** 49 printk messages dropped ** [ 970.922809] loop5: p99 start 1 is beyond EOD, truncated ** 82 printk messages dropped ** [ 970.933464] loop2: p24 start 1 is beyond EOD, truncated ** 61 printk messages dropped ** [ 970.936625] loop5: p173 start 1 is beyond EOD, truncated 14:39:44 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:44 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001", 0x30, 0x1a0}]) [ 970.936662] loop5: p174 start 1 is beyond EOD, truncated [ 970.936683] loop5: p175 start 1 is beyond EOD, truncated 14:39:44 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d30600", 0x5d, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 970.936735] loop5: p176 start 1 is beyond EOD, truncated [ 970.936765] loop5: p177 start 1 is beyond EOD, truncated [ 970.936784] loop5: p178 start 1 is beyond EOD, truncated [ 970.936804] loop5: p179 start 1 is beyond EOD, truncated [ 970.936823] loop5: p180 start 1 is beyond EOD, truncated [ 970.936843] loop5: p181 start 1 is beyond EOD, truncated [ 970.936863] loop5: p182 start 1 is beyond EOD, truncated ** 7 printk messages dropped ** [ 970.937035] loop5: p190 start 1 is beyond EOD, truncated 14:39:44 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 970.937064] loop5: p191 start 1 is beyond EOD, truncated [ 970.937083] loop5: p192 start 1 is beyond EOD, truncated [ 970.937103] loop5: p193 start 1 is beyond EOD, truncated ** 27 printk messages dropped ** [ 970.938069] loop2: p94 start 1 is beyond EOD, truncated ** 140 printk messages dropped ** [ 970.951978] loop2: p176 start 1 is beyond EOD, truncated ** 82 printk messages dropped ** [ 971.382265] loop5: p1 start 1 is beyond EOD, truncated [ 971.382305] loop5: p2 size 2 extends beyond EOD, truncated [ 971.416810] loop5: p3 start 201 is beyond EOD, truncated [ 971.420394] loop5: p4 start 301 is beyond EOD, truncated [ 971.420414] loop5: p5 start 1 is beyond EOD, truncated [ 971.420452] loop5: p6 start 1 is beyond EOD, truncated [ 971.420479] loop5: p7 start 1 is beyond EOD, truncated [ 971.420511] loop5: p8 start 1 is beyond EOD, truncated ** 248 printk messages dropped ** [ 971.505117] loop0: p1 start 1 is beyond EOD, truncated [ 971.505156] loop0: p2 size 2 extends beyond EOD, truncated [ 971.517347] loop0: p3 start 201 is beyond EOD, truncated [ 971.517368] loop0: p4 start 301 is beyond EOD, truncated [ 971.517388] loop0: p5 start 1 is beyond EOD, truncated [ 971.517407] loop0: p6 start 1 is beyond EOD, truncated [ 971.517428] loop0: p7 start 1 is beyond EOD, truncated [ 971.517447] loop0: p8 start 1 is beyond EOD, truncated [ 971.517476] loop0: p9 start 1 is beyond EOD, truncated [ 971.517495] loop0: p10 start 1 is beyond EOD, truncated [ 971.517510] loop0: p11 start 1 is beyond EOD, truncated [ 971.517556] loop0: p12 start 1 is beyond EOD, truncated [ 971.517574] loop0: p13 start 1 is beyond EOD, truncated [ 971.517616] loop0: p14 start 1 is beyond EOD, truncated [ 971.517636] loop0: p15 start 1 is beyond EOD, truncated [ 971.517656] loop0: p16 start 1 is beyond EOD, truncated [ 971.517676] loop0: p17 start 1 is beyond EOD, truncated [ 971.517696] loop0: p18 start 1 is beyond EOD, truncated [ 971.517715] loop0: p19 start 1 is beyond EOD, truncated 14:39:45 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x0, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:45 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:45 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d30600", 0x5d, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:45 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) 14:39:45 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:45 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 971.517735] loop0: p20 start 1 is beyond EOD, truncated [ 971.517755] loop0: p21 start 1 is beyond EOD, truncated [ 971.517775] loop0: p22 start 1 is beyond EOD, truncated [ 971.517794] loop0: p23 start 1 is beyond EOD, truncated [ 971.517838] loop0: p24 start 1 is beyond EOD, truncated [ 971.517857] loop0: p25 start 1 is beyond EOD, truncated [ 971.517877] loop0: p26 start 1 is beyond EOD, truncated [ 971.517896] loop0: p27 start 1 is beyond EOD, truncated [ 971.517915] loop0: p28 start 1 is beyond EOD, truncated [ 971.517930] loop0: p29 start 1 is beyond EOD, truncated [ 971.517976] loop0: p30 start 1 is beyond EOD, truncated [ 971.517995] loop0: p31 start 1 is beyond EOD, truncated [ 971.518010] loop0: p32 start 1 is beyond EOD, truncated [ 971.518055] loop0: p33 start 1 is beyond EOD, truncated [ 971.518087] loop0: p34 start 1 is beyond EOD, truncated [ 971.518097] loop0: p35 start 1 is beyond EOD, truncated [ 971.518116] loop0: p36 start 1 is beyond EOD, truncated [ 971.518134] loop0: p37 start 1 is beyond EOD, truncated [ 971.518176] loop0: p38 start 1 is beyond EOD, truncated [ 971.518195] loop0: p39 start 1 is beyond EOD, truncated 14:39:45 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:45 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d30600", 0x5d, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 74 printk messages dropped ** [ 971.520569] loop0: p114 start 1 is beyond EOD, truncated ** 77 printk messages dropped ** [ 971.552977] loop0: p192 start 1 is beyond EOD, truncated 14:39:45 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d30600", 0x5d, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 143 printk messages dropped ** [ 972.162673] loop2: p6 start 1 is beyond EOD, truncated ** 150 printk messages dropped ** [ 972.166855] loop2: p76 start 1 is beyond EOD, truncated [ 972.166875] loop2: p77 start 1 is beyond EOD, truncated [ 972.166908] loop2: p78 start 1 is beyond EOD, truncated [ 972.166937] loop2: p79 start 1 is beyond EOD, truncated [ 972.166957] loop2: p80 start 1 is beyond EOD, truncated [ 972.166976] loop2: p81 start 1 is beyond EOD, truncated [ 972.166998] loop2: p82 start 1 is beyond EOD, truncated [ 972.167020] loop2: p83 start 1 is beyond EOD, truncated [ 972.167057] loop2: p84 start 1 is beyond EOD, truncated [ 972.167076] loop2: p85 start 1 is beyond EOD, truncated 14:39:45 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:45 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 972.167094] loop2: p86 start 1 is beyond EOD, truncated [ 972.167136] loop2: p87 start 1 is beyond EOD, truncated 14:39:45 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d30600", 0x5d, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 972.167155] loop2: p88 start 1 is beyond EOD, truncated [ 972.167170] loop2: p89 start 1 is beyond EOD, truncated [ 972.167216] loop2: p90 start 1 is beyond EOD, truncated [ 972.167236] loop2: p91 start 1 is beyond EOD, truncated [ 972.167255] loop2: p92 start 1 is beyond EOD, truncated [ 972.167275] loop2: p93 start 1 is beyond EOD, truncated [ 972.167290] loop2: p94 start 1 is beyond EOD, truncated [ 972.167337] loop2: p95 start 1 is beyond EOD, [ 972.167425] truncated [ 972.167433] loop5: p148 start 1 is beyond EOD, truncated [ 972.167453] loop5: p149 start 1 is beyond EOD, truncated ** 13 printk messages dropped ** [ 972.167792] loop5: p163 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 972.167826] loop5: p165 start 1 is beyond EOD, truncated ** 518 printk messages dropped ** [ 972.206167] loop4: p252 start 1 is beyond EOD, truncated ** 3 printk messages dropped ** [ 972.284055] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 972.303226] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) [ 972.449853] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 972.459410] loop0: p1 start 1 is beyond EOD, truncated [ 972.459441] loop0: p2 size 2 extends beyond EOD, truncated ** 8 printk messages dropped ** [ 972.468277] loop0: p11 start 1 is beyond EOD, truncated [ 972.468293] loop0: p12 start 1 is beyond EOD, truncated [ 972.468339] loop0: p13 start 1 is beyond EOD, truncated [ 972.468359] loop0: p14 start 1 is beyond EOD, truncated [ 972.468392] loop0: p15 start 1 is beyond EOD, truncated [ 972.468438] loop0: p16 start 1 is beyond EOD, truncated [ 972.468453] loop0: p17 start 1 is beyond EOD, truncated [ 972.468498] loop0: p18 start 1 is beyond EOD, truncated [ 972.468517] loop0: p19 start 1 is beyond EOD, truncated [ 972.468559] loop0: p20 start 1 is beyond EOD, truncated ** 6 printk messages dropped ** [ 972.468758] loop0: p27 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 972.468793] loop0: p29 start 1 is beyond EOD, truncated ** 160 printk messages dropped ** [ 972.475002] loop0: p190 start 1 is beyond EOD, truncated ** 76 printk messages dropped ** [ 972.873035] loop2: p11 start 1 is beyond EOD, truncated [ 972.873178] loop2: p12 start 1 is beyond EOD, truncated [ 972.873216] loop2: p13 start 1 is beyond EOD, truncated [ 972.873236] loop2: p14 start 1 is beyond EOD, truncated [ 972.873256] loop2: p15 start 1 is beyond EOD, truncated [ 972.873298] loop2: p16 start 1 is beyond EOD, truncated 14:39:46 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x0, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:46 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:46 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:46 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d30600", 0x5d, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:46 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}, {}, 0x0, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:46 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}, {}, 0x0, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 972.873317] loop2: p17 start 1 is beyond EOD, truncated [ 972.873344] loop2: p18 start 1 is beyond EOD, truncated [ 972.873379] loop2: p19 start 1 is beyond EOD, truncated [ 972.873407] loop2: p20 start 1 is beyond EOD, truncated [ 972.873426] loop2: p21 start 1 is beyond EOD, truncated [ 972.873446] loop2: p22 start 1 is beyond EOD, truncated [ 972.873480] loop2: p23 start 1 is beyond EOD, truncated [ 972.873507] loop2: p24 start 1 is beyond EOD, truncated [ 972.873526] loop2: p25 start 1 is beyond EOD, truncated [ 972.873545] loop2: p26 start 1 is beyond EOD, truncated [ 972.873587] loop2: p27 start 1 is beyond EOD, truncated [ 972.873606] loop2: p28 start 1 is beyond EOD, truncated [ 972.873621] loop2: p29 start 1 is beyond EOD, truncated [ 972.873666] loop2: p30 start 1 is beyond EOD, truncated [ 972.873681] loop2: p31 start 1 is beyond EOD, truncated [ 972.873727] loop2: p32 start 1 is beyond EOD, truncated [ 972.873746] loop2: p33 start 1 is beyond EOD, truncated ** 10 printk messages dropped ** [ 972.874031] loop2: p44 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 972.874117] loop2: p46 start 1 is beyond EOD, truncated ** 18 printk messages dropped ** [ 972.878255] loop2: p65 start 1 is beyond EOD, truncated 14:39:46 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:46 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 704 printk messages dropped ** [ 973.737293] loop4: p1 start 1 is beyond EOD, truncated ** 2 printk messages dropped ** [ 973.748879] loop4: p3 start 201 is beyond EOD, truncated [ 973.748916] loop4: p4 start 301 is beyond EOD, truncated [ 973.748956] loop4: p5 start 1 is beyond EOD, truncated [ 973.749023] loop4: p6 start 1 is beyond EOD, truncated 14:39:46 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:46 executing program 4: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:46 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}, {}, 0x0, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 973.749044] loop4: p7 start 1 is beyond EOD, truncated [ 973.749064] loop4: p8 start 1 is beyond EOD, truncated 14:39:46 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 973.749103] loop4: p9 start 1 is beyond EOD, truncated [ 973.749165] loop4: p10 start 1 is beyond EOD, truncated [ 973.749187] loop4: p11 start 1 is beyond EOD, truncated [ 973.749246] loop4: p12 start 1 is beyond EOD, truncated [ 973.749294] loop4: p13 start 1 is beyond EOD, truncated [ 973.749314] loop4: p14 start 1 is beyond EOD, truncated [ 973.749334] loop4: p15 start 1 is beyond EOD, truncated [ 973.749354] loop4: p16 start 1 is beyond EOD, truncated ** 73 printk messages dropped ** [ 973.754044] loop4: p90 start 1 is beyond EOD, truncated ** 200 printk messages dropped ** [ 973.828768] loop5: p35 start 1 is beyond EOD, truncated [ 973.828788] loop5: p36 start 1 is beyond EOD, truncated ** 223 printk messages dropped ** [ 974.318979] loop4: p1 start 1 is beyond EOD, truncated [ 974.319008] loop4: p2 size 2 extends beyond EOD, truncated [ 974.333921] loop5: p3 start 201 is beyond EOD, truncated ** 10 printk messages dropped ** [ 974.334288] loop5: p14 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 974.334353] loop5: p16 start 1 is beyond EOD, truncated [ 974.334372] loop5: p17 start 1 is beyond EOD, truncated [ 974.334418] loop5: p18 start 1 is beyond EOD, truncated [ 974.334437] loop5: p19 start 1 is beyond EOD, truncated [ 974.337086] loop4: p3 start 201 is beyond EOD, truncated [ 974.337106] loop4: p4 start 301 is beyond EOD, truncated [ 974.337126] loop4: p5 start 1 is beyond EOD, truncated [ 974.337145] loop4: p6 start 1 is beyond EOD, truncated ** 79 printk messages dropped ** [ 974.339610] loop4: p51 start 1 is beyond EOD, truncated [ 974.339629] loop4: p52 start 1 is beyond EOD, truncated [ 974.339644] loop4: p53 start 1 is beyond EOD, truncated [ 974.339689] loop4: p54 start 1 is beyond EOD, truncated 14:39:47 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:47 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:47 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:47 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 14:39:47 executing program 5: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:47 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 974.339708] loop4: p55 start 1 is beyond EOD, truncated ** 164 printk messages dropped ** [ 974.344868] loop5: p128 start 1 is beyond EOD, truncated [ 974.344889] loop5: p129 start 1 is beyond EOD, truncated [ 974.344909] loop5: p130 start 1 is beyond EOD, truncated [ 974.344928] loop5: p131 start 1 is beyond EOD, truncated [ 974.344948] loop5: p132 start 1 is beyond EOD, truncated [ 974.344968] loop5: p133 start 1 is beyond EOD, truncated [ 974.344988] loop5: p134 start 1 is beyond EOD, truncated [ 974.345007] loop5: p135 start 1 is beyond EOD, truncated [ 974.345027] loop5: p136 start 1 is beyond EOD, truncated [ 974.345047] loop5: p137 start 1 is beyond EOD, truncated [ 974.345066] loop5: p138 start 1 is beyond EOD, truncated [ 974.345086] loop5: p139 start 1 is beyond EOD, truncated [ 974.345106] loop5: p140 start 1 is beyond EOD, truncated [ 974.345127] loop5: p141 start 1 is beyond EOD, truncated [ 974.345147] loop5: p142 start 1 is beyond EOD, truncated [ 974.345167] loop5: p143 start 1 is beyond EOD, truncated [ 974.345187] loop5: p144 start 1 is beyond EOD, truncated [ 974.345214] loop5: p145 start 1 is beyond EOD, truncated [ 974.345247] loop5: p146 start 1 is beyond EOD, truncated [ 974.345268] loop5: p147 start 1 is beyond EOD, truncated [ 974.345288] loop5: p148 start 1 is beyond EOD, truncated [ 974.345307] loop5: p149 start 1 is beyond EOD, truncated [ 974.345327] loop5: p150 start 1 is beyond EOD, truncated [ 974.345347] loop5: p151 start 1 is beyond EOD, truncated 14:39:47 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 974.345367] loop5: p152 start 1 is beyond EOD, truncated [ 974.345386] loop5: p153 start 1 is beyond EOD, truncated [ 974.345402] loop5: p154 start 1 is beyond EOD, truncated 14:39:47 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:47 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 14:39:47 executing program 5: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 974.345440] loop5: p155 start 1 is beyond EOD, truncated [ 974.345460] loop5: p156 start 1 is beyond EOD, truncated ** 154 printk messages dropped ** [ 974.349596] loop5: p230 start 1 is beyond EOD, truncated ** 87 printk messages dropped ** [ 974.639902] loop0: p1 start 1 is beyond EOD, truncated [ 974.639934] loop0: p2 size 2 extends beyond EOD, truncated [ 974.647205] loop0: p3 start 201 is beyond EOD, truncated [ 974.647226] loop0: p4 start 301 is beyond EOD, truncated [ 974.647246] loop0: p5 start 1 is beyond EOD, truncated 14:39:47 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 974.647266] loop0: p6 start 1 is beyond EOD, truncated 14:39:47 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 974.647285] loop0: p7 start 1 is beyond EOD, truncated [ 974.647317] loop0: p8 start 1 is beyond EOD, truncated [ 974.647345] loop0: p9 start 1 is beyond EOD, truncated [ 974.647365] loop0: p10 start 1 is beyond EOD, truncated [ 974.647384] loop0: p11 start 1 is beyond EOD, truncated [ 974.647404] loop0: p12 start 1 is beyond EOD, truncated [ 974.647423] loop0: p13 start 1 is beyond EOD, truncated [ 974.647506] loop0: p14 start 1 is beyond EOD, truncated [ 974.647526] loop0: p15 start 1 is beyond EOD, truncated [ 974.647545] loop0: p16 start 1 is beyond EOD, truncated [ 974.647564] loop0: p17 start 1 is beyond EOD, truncated [ 974.647583] loop0: p18 start 1 is beyond EOD, truncated [ 974.647617] loop0: p19 start 1 is beyond EOD, truncated [ 974.647646] loop0: p20 start 1 is beyond EOD, truncated [ 974.647665] loop0: p21 start 1 is beyond EOD, truncated [ 974.647684] loop0: p22 start 1 is beyond EOD, truncated [ 974.647704] loop0: p23 start 1 is beyond EOD, truncated [ 974.647719] loop0: p24 start 1 is beyond EOD, truncated [ 974.647764] loop0: p25 start 1 is beyond EOD, truncated [ 974.647779] loop0: p26 start 1 is beyond EOD, truncated [ 974.647824] loop0: p27 start 1 is beyond EOD, truncated [ 974.647839] loop0: p28 start 1 is beyond EOD, truncated [ 974.647884] loop0: p29 start 1 is beyond EOD, truncated [ 974.647899] loop0: p30 start 1 is beyond EOD, truncated [ 974.647943] loop0: p31 start 1 is beyond EOD, truncated [ 974.647986] loop0: p32 start 1 is beyond EOD, truncated [ 974.648005] loop0: p33 start 1 is beyond EOD, truncated [ 974.648024] loop0: p34 start 1 is beyond EOD, truncated ** 36 printk messages dropped ** [ 974.649039] loop0: p71 start 1 is beyond EOD, truncated ** 185 printk messages dropped ** [ 974.914181] loop5: p1 start 1 is beyond EOD, truncated [ 974.914202] loop5: p2 size 2 extends beyond EOD, truncated [ 974.929775] loop2: p1 start 1 is beyond EOD, truncated [ 974.929814] loop2: p2 size 2 extends beyond EOD, truncated 14:39:48 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:48 executing program 5: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:48 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:48 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 14:39:48 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:48 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 974.932198] loop4: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 974.938179] loop4: p1 start 1 is beyond EOD, truncated [ 974.938199] loop4: p2 size 2 extends beyond EOD, truncated [ 974.944574] loop5: p3 start 201 is beyond EOD, truncated [ 974.944614] loop5: p4 start 301 is beyond EOD, truncated [ 974.944633] loop5: p5 start 1 is beyond EOD, truncated [ 974.944652] loop5: p6 start 1 is beyond EOD, truncated [ 974.944671] loop5: p7 start 1 is beyond EOD, truncated [ 974.944690] loop5: p8 start 1 is beyond EOD, truncated [ 974.944733] loop5: p9 start 1 is beyond EOD, truncated [ 974.944773] loop5: p10 start 1 is beyond EOD, truncated [ 974.944793] loop5: p11 start 1 is beyond EOD, truncated [ 974.944812] loop5: p12 start 1 is beyond EOD, truncated [ 974.944832] loop5: p13 start 1 is beyond EOD, truncated [ 974.944852] loop5: p14 start 1 is beyond EOD, truncated [ 974.944871] loop5: p15 start 1 is beyond EOD, truncated [ 974.944886] loop5: p16 start 1 is beyond EOD, truncated [ 974.944913] loop5: p17 start 1 is beyond EOD, truncated [ 974.944933] loop5: p18 start 1 is beyond EOD, truncated [ 974.944972] loop5: p19 start 1 is beyond EOD, truncated [ 974.944991] loop5: p20 start 1 is beyond EOD, truncated [ 974.945010] loop5: p21 start 1 is beyond EOD, truncated [ 974.945045] loop5: p22 start 1 is beyond EOD, truncated [ 974.945065] loop5: p23 start 1 is beyond EOD, truncated [ 974.945085] loop5: p24 start 1 is beyond EOD, truncated [ 974.945113] loop5: p25 start 1 is beyond EOD, truncated [ 974.945133] loop5: p26 start 1 is beyond EOD, truncated [ 974.945153] loop5: p27 start 1 is beyond EOD, truncated 14:39:48 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ** 47 printk messages dropped ** [ 974.946590] loop5: p75 start 1 is beyond EOD, truncated ** 218 printk messages dropped ** [ 974.969097] loop2: p41 start 1 is beyond EOD, truncated 14:39:48 executing program 5: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:48 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) syz_read_part_table(0x0, 0x0, 0x0) ** 198 printk messages dropped ** [ 974.986091] loop2: p150 start 1 is beyond EOD, truncated [ 974.986111] loop2: p151 start 1 is beyond EOD, truncated [ 974.986131] loop2: p152 start 1 is beyond EOD, truncated [ 974.986150] loop2: p153 start 1 is beyond EOD, truncated [ 974.986182] loop2: p154 start 1 is beyond EOD, truncated [ 974.986221] loop2: p155 start 1 is beyond EOD, truncated [ 974.986261] loop2: p156 start 1 is beyond EOD, truncated ** 12 printk messages dropped ** [ 974.986838] loop4: p94 start 1 is beyond EOD, truncated 14:39:48 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) syz_read_part_table(0x0, 0x0, 0x0) [ 974.986865] loop4: p95 start 1 is beyond EOD, truncated ** 177 printk messages dropped ** [ 975.012720] loop4: p199 start 1 is beyond EOD, truncated ** 78 printk messages dropped ** [ 975.023010] loop4: p255 start 1 is beyond EOD, truncated 14:39:48 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:48 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 975.134653] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) [ 975.149168] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 975.412752] loop5: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 975.426706] loop5: p1 start 1 is beyond EOD, truncated [ 975.426743] loop5: p2 size 2 extends beyond EOD, truncated [ 975.435693] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 ** 235 printk messages dropped ** [ 975.456618] loop5: p232 start 1 is beyond EOD, truncated [ 975.461082] loop5: p233 start 1 is beyond EOD, truncated [ 975.461199] loop5: p234 start 1 is beyond EOD, truncated [ 975.461378] loop5: p235 start 1 is beyond EOD, truncated [ 975.461408] loop5: p236 start 1 is beyond EOD, truncated [ 975.461429] loop5: p237 start 1 is beyond EOD, truncated [ 975.461449] loop5: p238 start 1 is beyond EOD, truncated [ 975.461468] loop5: p239 start 1 is beyond EOD, truncated [ 975.461489] loop5: p240 start 1 is beyond EOD, truncated [ 975.461557] loop5: p241 start 1 is beyond EOD, truncated [ 975.461595] loop5: p242 start 1 is beyond EOD, truncated [ 975.461615] loop5: p243 start 1 is beyond EOD, truncated [ 975.461635] loop5: p244 start 1 is beyond EOD, truncated [ 975.461655] loop5: p245 start 1 is beyond EOD, truncated ** 4 printk messages dropped ** [ 975.461797] loop5: p250 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 975.461855] loop5: p252 start 1 is beyond EOD, truncated [ 975.461875] loop5: p253 start 1 is beyond EOD, truncated ** 62 printk messages dropped ** [ 975.489458] loop2: p63 start 1 is beyond EOD, truncated ** 188 printk messages dropped ** [ 975.523896] loop2: p252 start 1 is beyond EOD, truncated [ 975.523915] loop2: p253 start 1 is beyond EOD, truncated [ 975.523956] loop2: p254 start 1 is beyond EOD, truncated [ 975.523995] loop2: p255 start 1 is beyond EOD, truncated [ 975.596085] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 975.599575] loop0: p1 start 1 is beyond EOD, truncated [ 975.599615] loop0: p2 size 2 extends beyond EOD, truncated [ 975.667606] loop0: p3 start 201 is beyond EOD, truncated [ 975.667616] loop0: p4 start 301 is beyond EOD, truncated [ 975.667623] loop0: p5 start 1 is beyond EOD, truncated [ 975.667629] loop0: p6 start 1 is beyond EOD, truncated [ 975.667635] loop0: p7 start 1 is beyond EOD, truncated 14:39:49 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:49 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) syz_read_part_table(0x0, 0x0, 0x0) 14:39:49 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}, {}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:49 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000001600)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:49 executing program 1: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) 14:39:49 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 975.667641] loop0: p8 start 1 is beyond EOD, truncated [ 975.667648] loop0: p9 start 1 is beyond EOD, truncated [ 975.667654] loop0: p10 start 1 is beyond EOD, truncated [ 975.667661] loop0: p11 start 1 is beyond EOD, truncated [ 975.667668] loop0: p12 start 1 is beyond EOD, truncated [ 975.667674] loop0: p13 start 1 is beyond EOD, truncated [ 975.667680] loop0: p14 start 1 is beyond EOD, truncated 14:39:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 975.667686] loop0: p15 start 1 is beyond EOD, truncated [ 975.667693] loop0: p16 start 1 is beyond EOD, truncated [ 975.667699] loop0: p17 start 1 is beyond EOD, truncated [ 975.667705] loop0: p18 start 1 is beyond EOD, truncated [ 975.667710] loop0: p19 start 1 is beyond EOD, truncated [ 975.667716] loop0: p20 start 1 is beyond EOD, truncated [ 975.667722] loop0: p21 start 1 is beyond EOD, truncated ** 13 printk messages dropped ** [ 975.667803] loop0: p35 start 1 is beyond EOD, truncated ** 143 printk messages dropped ** [ 975.698076] loop0: p179 start 1 is beyond EOD, truncated ** 459 printk messages dropped ** [ 976.545551] loop0: p126 start 1 is beyond EOD, truncated ** 368 printk messages dropped ** [ 976.919302] loop3: p202 start 1 is beyond EOD, truncated [ 976.919347] loop3: p203 start 1 is beyond EOD, truncated [ 976.919366] loop3: p204 start 1 is beyond EOD, truncated [ 976.919408] loop3: p205 start 1 is beyond EOD, truncated [ 976.919427] loop3: p206 start 1 is beyond EOD, truncated [ 976.919442] loop3: p207 start 1 is beyond EOD, 14:39:49 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 976.919539] loop2: p36 start 1 is beyond EOD, truncated 14:39:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 14:39:49 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:49 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 976.919558] loop2: p37 start 1 is beyond EOD, truncated 14:39:49 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 976.919586] loop2: p38 start 1 is beyond EOD, truncated [ 976.919604] loop2: p39 start 1 is beyond EOD, truncated [ 976.919620] loop2: p40 start 1 is beyond EOD, truncated [ 976.919665] loop2: p41 start 1 is beyond EOD, truncated [ 976.919680] loop2: p42 start 1 is beyond EOD, truncated [ 976.919725] loop2: p43 start 1 is beyond EOD, truncated [ 976.919744] loop2: p44 start 1 is beyond EOD, truncated [ 976.919764] loop2: p45 start 1 is beyond EOD, truncated ** 4 printk messages dropped ** [ 976.919885] loop2: p50 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 976.919947] loop2: p52 start 1 is beyond EOD, truncated ** 198 printk messages dropped ** [ 976.963028] loop2: p200 start 1 is beyond EOD, truncated ** 75 printk messages dropped ** [ 977.169795] loop1: p20 start 1 is beyond EOD, truncated ** 244 printk messages dropped ** [ 977.530607] loop3: p9 start 1 is beyond EOD, truncated ** 247 printk messages dropped ** [ 977.684240] loop0: p1 start 1 is beyond EOD, truncated [ 977.684280] loop0: p2 size 2 extends beyond EOD, truncated [ 977.698060] loop0: p3 start 201 is beyond EOD, truncated [ 977.698091] loop0: p4 start 301 is beyond EOD, truncated [ 977.698111] loop0: p5 start 1 is beyond EOD, truncated [ 977.698130] loop0: p6 start 1 is beyond EOD, truncated [ 977.698150] loop0: p7 start 1 is beyond EOD, truncated [ 977.698178] loop0: p8 start 1 is beyond EOD, truncated [ 977.698197] loop0: p9 start 1 is beyond EOD, truncated [ 977.698217] loop0: p10 start 1 is beyond EOD, truncated [ 977.698237] loop0: p11 start 1 is beyond EOD, truncated [ 977.698256] loop0: p12 start 1 is beyond EOD, truncated [ 977.698299] loop0: p13 start 1 is beyond EOD, truncated [ 977.698318] loop0: p14 start 1 is beyond EOD, truncated [ 977.698337] loop0: p15 start 1 is beyond EOD, truncated [ 977.698378] loop0: p16 start 1 is beyond EOD, truncated [ 977.698397] loop0: p17 start 1 is beyond EOD, truncated [ 977.698412] loop0: p18 start 1 is beyond EOD, truncated [ 977.698457] loop0: p19 start 1 is beyond EOD, truncated [ 977.698473] loop0: p20 start 1 is beyond EOD, truncated [ 977.698518] loop0: p21 start 1 is beyond EOD, truncated [ 977.698538] loop0: p22 start 1 is beyond EOD, truncated [ 977.698557] loop0: p23 start 1 is beyond EOD, truncated [ 977.698591] loop0: p24 start 1 is beyond EOD, truncated [ 977.698610] loop0: p25 start 1 is beyond EOD, truncated [ 977.698639] loop0: p26 start 1 is beyond EOD, truncated [ 977.698658] loop0: p27 start 1 is beyond EOD, truncated [ 977.698677] loop0: p28 start 1 is beyond EOD, truncated [ 977.698692] loop0: p29 start 1 is beyond EOD, truncated [ 977.698737] loop0: p30 start 1 is beyond EOD, truncated [ 977.698752] loop0: p31 start 1 is beyond EOD, truncated [ 977.698798] loop0: p32 start 1 is beyond EOD, truncated [ 977.698816] loop0: p33 start 1 is beyond EOD, truncated ** 18 printk messages dropped ** [ 977.699332] loop0: p52 start 1 is beyond EOD, truncated ** 204 printk messages dropped ** [ 978.039402] loop1: p1 start 1 is beyond EOD, truncated [ 978.039453] loop1: p2 size 2 extends beyond EOD, truncated [ 978.047304] loop5: p1 start 1 is beyond EOD, truncated [ 978.047334] loop5: p2 size 2 extends beyond EOD, truncated [ 978.055695] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 978.067911] loop2: p1 start 1 is beyond EOD, truncated [ 978.067947] loop2: p2 size 2 extends beyond EOD, truncated [ 978.075607] loop1: p3 start 201 is beyond EOD, truncated [ 978.075648] loop1: p4 start 301 is beyond EOD, truncated [ 978.075687] loop1: p5 start 1 is beyond EOD, truncated [ 978.075707] loop1: p6 start 1 is beyond EOD, truncated [ 978.075728] loop1: p7 start 1 is beyond EOD, truncated [ 978.075766] loop1: p8 start 1 is beyond EOD, truncated [ 978.075786] loop1: p9 start 1 is beyond EOD, truncated [ 978.075806] loop1: p10 start 1 is beyond EOD, truncated [ 978.075825] loop1: p11 start 1 is beyond EOD, truncated [ 978.075845] loop1: p12 start 1 is beyond EOD, truncated [ 978.075927] loop1: p13 start 1 is beyond EOD, truncated [ 978.075950] loop1: p14 start 1 is beyond EOD, truncated [ 978.075995] loop1: p15 start 1 is beyond EOD, truncated [ 978.076078] loop1: p16 start 1 is beyond EOD, truncated [ 978.076098] loop1: p17 start 1 is beyond EOD, truncated 14:39:50 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:50 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 14:39:50 executing program 5: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:50 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) 14:39:50 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:50 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) [ 978.076118] loop1: p18 start 1 is beyond EOD, truncated [ 978.076149] loop1: p19 start 1 is beyond EOD, truncated [ 978.076167] loop1: p20 start 1 is beyond EOD, truncated [ 978.076195] loop1: p21 start 1 is beyond EOD, truncated [ 978.076236] loop1: p22 start 1 is beyond EOD, truncated [ 978.076255] loop1: p23 start 1 is beyond EOD, truncated [ 978.076296] loop1: p24 start 1 is beyond EOD, truncated [ 978.076315] loop1: p25 start 1 is beyond EOD, truncated [ 978.076348] loop1: p26 start 1 is beyond EOD, truncated [ 978.076368] loop1: p27 start 1 is beyond EOD, truncated [ 978.076395] loop1: p28 start 1 is beyond EOD, truncated [ 978.076415] loop1: p29 start 1 is beyond EOD, truncated 14:39:50 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 978.076456] loop1: p30 start 1 is beyond EOD, truncated ** 190 printk messages dropped ** [ 978.085432] loop5: p77 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 978.085466] loop5: p79 start 1 is beyond EOD, truncated 14:39:50 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}, {0x0, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ** 235 printk messages dropped ** [ 978.095816] loop1: p246 start 1 is beyond EOD, truncated ** 36 printk messages dropped ** [ 978.099087] loop2: p30 start 1 is beyond EOD, truncated ** 234 printk messages dropped ** [ 978.121521] loop3: p23 start 1 is beyond EOD, truncated [ 978.121540] loop3: p24 start 1 is beyond EOD, truncated ** 21 printk messages dropped ** [ 978.126845] loop3: p46 start 1 is beyond EOD, truncated [ 978.126859] loop3: p47 start 1 is beyond EOD, truncated [ 978.126914] loop3: p48 start 1 is beyond EOD, truncated [ 978.126936] loop3: p49 start 1 is beyond EOD, truncated [ 978.127006] loop3: p50 start 1 is beyond EOD, truncated [ 978.127025] loop3: p51 start 1 is beyond EOD, truncated [ 978.127045] loop3: p52 start 1 is beyond EOD, truncated [ 978.127064] loop3: p53 start 1 is beyond EOD, truncated 14:39:51 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 978.127117] loop3: p54 start 1 is beyond EOD, truncated [ 978.127137] loop3: p55 start 1 is beyond EOD, truncated 14:39:51 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) 14:39:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 978.127156] loop3: p56 start 1 is beyond EOD, truncated [ 978.127176] loop3: p57 start 1 is beyond EOD, truncated [ 978.127196] loop3: p58 start 1 is beyond EOD, truncated [ 978.127213] loop3: p59 start 1 is beyond EOD, truncated [ 978.127265] loop3: p60 start 1 is beyond EOD, truncated [ 978.127284] loop3: p61 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 978.127568] loop2: p195 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 978.127636] loop2: p197 start 1 is beyond EOD, truncated [ 978.127656] loop2: p198 start 1 is beyond EOD, truncated [ 978.127676] loop2: p199 start 1 is beyond EOD, truncated [ 978.127695] loop2: p200 start 1 is beyond EOD, truncated [ 978.127715] loop2: p201 start 1 is beyond EOD, truncated ** 135 printk messages dropped ** [ 978.139483] loop3: p140 start 1 is beyond EOD, truncated ** 211 printk messages dropped ** [ 978.576660] loop1: p93 start 1 is beyond EOD, truncated ** 364 printk messages dropped ** [ 978.622190] loop3: p198 start 1 is beyond EOD, truncated ** 34 printk messages dropped ** [ 978.623325] loop3: p233 start 1 is beyond EOD, truncated [ 978.623345] loop3: p234 start 1 is beyond EOD, truncated [ 978.623364] loop3: p235 start 1 is beyond EOD, truncated ** 25 printk messages dropped ** [ 978.637937] loop2: p8 start 1 is beyond EOD, truncated [ 978.649212] loop2: p9 start 1 is beyond EOD, truncated [ 978.649243] loop2: p10 start 1 is beyond EOD, truncated [ 978.649302] loop2: p11 start 1 is beyond EOD, truncated [ 978.649369] loop2: p12 start 1 is beyond EOD, truncated [ 978.649388] loop2: p13 start 1 is beyond EOD, truncated [ 978.649406] loop2: p14 start 1 is beyond EOD, truncated [ 978.649491] loop2: p15 start 1 is beyond EOD, truncated [ 978.649550] loop2: p16 start 1 is beyond EOD, truncated [ 978.649569] loop2: p17 start 1 is beyond EOD, truncated [ 978.649590] loop2: p18 start 1 is beyond EOD, truncated [ 978.649630] loop2: p19 start 1 is beyond EOD, truncated [ 978.649669] loop2: p20 start 1 is beyond EOD, truncated [ 978.649689] loop2: p21 start 1 is beyond EOD, truncated [ 978.649711] loop2: p22 start 1 is beyond EOD, truncated ** 3 printk messages dropped ** [ 978.649829] loop2: p26 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 978.649879] loop2: p28 start 1 is beyond EOD, truncated ** 176 printk messages dropped ** [ 978.657992] loop2: p205 start 1 is beyond EOD, truncated ** 59 printk messages dropped ** [ 978.920006] loop0: p7 start 1 is beyond EOD, truncated [ 978.920155] loop0: p8 start 1 is beyond EOD, truncated [ 978.920175] loop0: p9 start 1 is beyond EOD, truncated 14:39:51 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:51 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) 14:39:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 14:39:51 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:51 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:51 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) [ 978.920195] loop0: p10 start 1 is beyond EOD, truncated [ 978.920215] loop0: p11 start 1 is beyond EOD, truncated [ 978.920233] loop0: p12 start 1 is beyond EOD, truncated [ 978.920276] loop0: p13 start 1 is beyond EOD, truncated [ 978.920295] loop0: p14 start 1 is beyond EOD, truncated [ 978.920353] loop0: p15 start 1 is beyond EOD, truncated [ 978.920409] loop0: p16 start 1 is beyond EOD, truncated [ 978.920453] loop0: p17 start 1 is beyond EOD, truncated [ 978.920487] loop0: p18 start 1 is beyond EOD, truncated [ 978.920515] loop0: p19 start 1 is beyond EOD, truncated [ 978.920534] loop0: p20 start 1 is beyond EOD, truncated [ 978.920553] loop0: p21 start 1 is beyond EOD, truncated [ 978.920595] loop0: p22 start 1 is beyond EOD, truncated [ 978.920613] loop0: p23 start 1 is beyond EOD, truncated [ 978.920655] loop0: p24 start 1 is beyond EOD, truncated [ 978.920674] loop0: p25 start 1 is beyond EOD, truncated [ 978.920693] loop0: p26 start 1 is beyond EOD, truncated [ 978.920735] loop0: p27 start 1 is beyond EOD, truncated 14:39:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 978.920754] loop0: p28 start 1 is beyond EOD, truncated [ 978.920769] loop0: p29 start 1 is beyond EOD, truncated ** 14 printk messages dropped ** [ 978.921315] loop0: p44 start 1 is beyond EOD, truncated ** 224 printk messages dropped ** [ 979.259390] loop2: p13 start 1 is beyond EOD, truncated 14:39:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ** 335 printk messages dropped ** [ 979.338269] truncated ** 164 printk messages dropped ** [ 979.370476] loop3: p1 start 1 is beyond EOD, truncated ** 255 printk messages dropped ** [ 979.679901] loop5: p1 start 1 is beyond EOD, truncated ** 7 printk messages dropped ** [ 979.725147] loop5: p9 start 1 is beyond EOD, truncated 14:39:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ** 2 printk messages dropped ** [ 979.726398] loop5: p12 start 1 is beyond EOD, truncated 14:39:52 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:52 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 979.726517] loop5: p13 start 1 is beyond EOD, truncated 14:39:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 979.726537] loop5: p14 start 1 is beyond EOD, truncated [ 979.726584] loop5: p15 start 1 is beyond EOD, truncated [ 979.726606] loop5: p16 start 1 is beyond EOD, truncated [ 979.726624] loop5: p17 start 1 is beyond EOD, truncated [ 979.726696] loop5: p18 start 1 is beyond EOD, truncated [ 979.726715] loop5: p19 start 1 is beyond EOD, truncated [ 979.726768] loop5: p20 start 1 is beyond EOD, truncated [ 979.726788] loop5: p21 start 1 is beyond EOD, truncated [ 979.726815] loop5: p22 start 1 is beyond EOD, truncated [ 979.726834] loop5: p23 start 1 is beyond EOD, truncated ** 4 printk messages dropped ** [ 979.726975] loop5: p28 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 979.727035] loop5: p30 start 1 is beyond EOD, truncated ** 12 printk messages dropped ** [ 979.728574] loop5: p42 start 1 is beyond EOD, truncated ** 20 printk messages dropped ** [ 979.729234] loop5: p63 start 1 is beyond EOD, truncated ** 179 printk messages dropped ** [ 979.741575] loop5: p238 start 1 is beyond EOD, truncated ** 120 printk messages dropped ** [ 979.773942] loop2: p104 start 1 is beyond EOD, truncated ** 144 printk messages dropped ** [ 979.784127] loop2: p249 start 1 is beyond EOD, truncated ** 15 printk messages dropped ** [ 979.784817] loop1: p12 start 1 is beyond EOD, truncated [ 979.784871] loop1: p13 start 1 is beyond EOD, truncated [ 979.784913] loop1: p14 start 1 is beyond EOD, truncated [ 979.784931] loop1: p15 start 1 is beyond EOD, truncated [ 979.784946] loop1: p16 start 1 is beyond EOD, truncated [ 979.784973] loop1: p17 start 1 is beyond EOD, truncated [ 979.784991] loop1: p18 start 1 is beyond EOD, truncated [ 979.789424] loop1: p19 start 1 is beyond EOD, truncated [ 979.789571] loop1: p20 start 1 is beyond EOD, truncated [ 979.789590] loop1: p21 start 1 is beyond EOD, truncated [ 979.789609] loop1: p22 start 1 is beyond EOD, truncated [ 979.789630] loop1: p23 start 1 is beyond EOD, truncated [ 979.789648] loop1: p24 start 1 is beyond EOD, truncated [ 979.789690] loop1: p25 start 1 is beyond EOD, truncated [ 979.789710] loop1: p26 start 1 is beyond EOD, truncated [ 979.789728] loop1: p27 start 1 is beyond EOD, truncated [ 979.789780] loop1: p28 start 1 is beyond EOD, truncated [ 979.789800] loop1: p29 start 1 is beyond EOD, truncated [ 979.789820] loop1: p30 start 1 is beyond EOD, truncated [ 979.789840] loop1: p31 start 1 is beyond EOD, truncated [ 979.789874] loop1: p32 start 1 is beyond EOD, truncated ** 59 printk messages dropped ** [ 979.804622] loop1: p92 start 1 is beyond EOD, truncated ** 186 printk messages dropped ** [ 979.876835] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) [ 980.024655] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 980.031094] loop0: p1 start 1 is beyond EOD, truncated [ 980.031124] loop0: p2 size 2 extends beyond EOD, truncated [ 980.043178] loop0: p3 start 201 is beyond EOD, truncated [ 980.043209] loop0: p4 start 301 is beyond EOD, truncated [ 980.043228] loop0: p5 start 1 is beyond EOD, truncated [ 980.043257] loop0: p6 start 1 is beyond EOD, truncated [ 980.043276] loop0: p7 start 1 is beyond EOD, truncated [ 980.043296] loop0: p8 start 1 is beyond EOD, truncated 14:39:52 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:52 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 14:39:52 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:52 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:52 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 980.043316] loop0: p9 start 1 is beyond EOD, truncated [ 980.043356] loop0: p10 start 1 is beyond EOD, truncated [ 980.043375] loop0: p11 start 1 is beyond EOD, truncated [ 980.043390] loop0: p12 start 1 is beyond EOD, truncated [ 980.043428] loop0: p13 start 1 is beyond EOD, truncated [ 980.043456] loop0: p14 start 1 is beyond EOD, truncated [ 980.043475] loop0: p15 start 1 is beyond EOD, truncated [ 980.043516] loop0: p16 start 1 is beyond EOD, truncated [ 980.043535] loop0: p17 start 1 is beyond EOD, truncated [ 980.043554] loop0: p18 start 1 is beyond EOD, truncated [ 980.043597] loop0: p19 start 1 is beyond EOD, truncated 14:39:52 executing program 4: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 980.043616] loop0: p20 start 1 is beyond EOD, truncated [ 980.043631] loop0: p21 start 1 is beyond EOD, truncated [ 980.043676] loop0: p22 start 1 is beyond EOD, truncated [ 980.043695] loop0: p23 start 1 is beyond EOD, truncated ** 13 printk messages dropped ** [ 980.044070] loop0: p37 start 1 is beyond EOD, truncated ** 16 printk messages dropped ** [ 980.044575] loop0: p54 start 1 is beyond EOD, truncated ** 30 printk messages dropped ** [ 980.045414] loop0: p85 start 1 is beyond EOD, truncated ** 175 printk messages dropped ** [ 980.285891] loop3: p1 start 1 is beyond EOD, truncated [ 980.285924] loop3: p2 size 2 extends beyond EOD, truncated ** 94 printk messages dropped ** [ 980.310448] loop1: p95 start 1 is beyond EOD, truncated ** 116 printk messages dropped ** [ 980.319257] loop3: p7 start 1 is beyond EOD, truncated ** 60 printk messages dropped ** [ 980.322246] loop3: p65 start 1 is beyond EOD, truncated ** 159 printk messages dropped ** [ 980.333628] loop3: p171 start 1 is beyond EOD, truncated ** 181 printk messages dropped ** [ 980.369825] loop5: p100 start 1 is beyond EOD, truncated ** 135 printk messages dropped ** [ 980.397533] loop5: p236 start 1 is beyond EOD, truncated [ 980.397578] loop5: p237 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 980.397613] loop5: p239 start 1 is beyond EOD, truncated [ 980.397659] loop5: p240 start 1 is beyond EOD, truncated [ 980.397678] loop5: p241 start 1 is beyond EOD, truncated [ 980.397728] loop5: p242 start 1 is beyond EOD, truncated 14:39:53 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:53 executing program 4: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:53 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) [ 980.397747] loop5: p243 start 1 is beyond EOD, truncated [ 980.397789] loop5: p244 start 1 is beyond EOD, truncated 14:39:53 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 14:39:53 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(0x0, &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 980.397813] loop5: p245 start 1 is beyond EOD, truncated [ 980.397868] loop5: p246 start 1 is beyond EOD, truncated [ 980.397887] loop5: p247 start 1 is beyond EOD, truncated [ 980.397903] loop5: p248 start 1 is beyond EOD, truncated [ 980.397948] loop5: p249 start 1 is beyond EOD, truncated [ 980.397968] loop5: p250 start 1 is beyond EOD, truncated [ 980.397995] loop5: p251 start 1 is beyond EOD, truncated [ 980.398037] loop5: p252 start 1 is beyond EOD, truncated ** 4 printk messages dropped ** [ 980.419179] loop2: p4 start 301 is beyond EOD, truncated ** 1 printk messages dropped ** [ 980.419267] loop2: p6 start 1 is beyond EOD, truncated ** 16 printk messages dropped ** [ 980.429104] loop2: p23 start 1 is beyond EOD, truncated ** 238 printk messages dropped ** [ 980.828598] loop3: p1 start 1 is beyond EOD, truncated ** 98 printk messages dropped ** [ 980.841534] loop1: p100 start 1 is beyond EOD, truncated ** 387 printk messages dropped ** [ 980.866322] loop3: p233 start 1 is beyond EOD, truncated ** 25 printk messages dropped ** [ 981.050448] loop0: p3 start 201 is beyond EOD, truncated ** 252 printk messages dropped ** [ 981.378647] loop5: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 981.379917] loop3: p1 start 1 is beyond EOD, truncated [ 981.379955] loop3: p2 size 2 extends beyond EOD, truncated [ 981.397304] loop5: p1 start 1 is beyond EOD, truncated [ 981.397336] loop5: p2 size 2 extends beyond EOD, truncated 14:39:53 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:53 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055", 0x5f, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:53 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 14:39:53 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 981.398758] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 ** 203 printk messages dropped ** [ 981.433387] loop5: p99 start 1 is beyond EOD, truncated [ 981.433407] loop5: p100 start 1 is beyond EOD, truncated [ 981.433448] loop5: p101 start 1 is beyond EOD, truncated [ 981.433468] loop5: p102 start 1 is beyond EOD, truncated [ 981.433487] loop5: p103 start 1 is beyond EOD, truncated [ 981.433506] loop5: p104 start 1 is beyond EOD, truncated [ 981.433548] loop5: p105 start 1 is beyond EOD, truncated [ 981.433567] loop5: p106 start 1 is beyond EOD, truncated [ 981.433628] loop5: p107 start 1 is beyond EOD, truncated 14:39:54 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 981.433647] loop5: p108 start 1 is beyond EOD, truncated [ 981.433662] loop5: p109 start 1 is beyond EOD, truncated [ 981.433712] loop5: p110 start 1 is beyond EOD, truncated [ 981.433748] loop5: p111 start 1 is beyond EOD, truncated 14:39:54 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0), 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 981.433767] loop5: p112 start 1 is beyond EOD, truncated [ 981.433800] loop5: p113 start 1 is beyond EOD, truncated [ 981.433827] loop5: p114 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 981.433887] loop5: p116 start 1 is beyond EOD, truncated ** 20 printk messages dropped ** [ 981.458378] loop1: p10 start 1 is beyond EOD, truncated ** 181 printk messages dropped ** [ 981.465209] loop1: p192 start 1 is beyond EOD, truncated ** 290 printk messages dropped ** [ 981.501033] loop5: p222 start 1 is beyond EOD, truncated 14:39:54 executing program 4: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040), 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ** 58 printk messages dropped ** [ 981.505689] loop5: p254 start 1 is beyond EOD, truncated [ 981.505715] loop5: p255 start 1 is beyond EOD, truncated ** 3 printk messages dropped ** [ 981.524942] loop2: p6 start 1 is beyond EOD, truncated 14:39:54 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ** 253 printk messages dropped ** [ 981.947038] loop3: p1 start 1 is beyond EOD, truncated [ 981.947070] loop3: p2 size 2 extends beyond EOD, truncated 14:39:54 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000", 0x5a, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 981.958402] loop5: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 14:39:54 executing program 4: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:54 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:54 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900000064000000000432000520", 0x54, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ** 490 printk messages dropped ** [ 982.061981] loop5: p232 start 1 is beyond EOD, truncated [ 982.062089] loop5: p233 start 1 is beyond EOD, truncated ** 9 printk messages dropped ** [ 982.063621] truncated ** 246 printk messages dropped ** [ 982.097046] loop1: p235 start 1 is beyond EOD, truncated [ 982.097067] loop1: p236 start 1 is beyond EOD, truncated [ 982.097106] loop1: p237 start 1 is beyond EOD, truncated [ 982.097125] loop1: p238 start 1 is beyond EOD, truncated [ 982.097145] loop1: p239 start 1 is beyond EOD, truncated [ 982.097199] loop1: p240 start 1 is beyond EOD, truncated [ 982.097219] loop1: p241 start 1 is beyond EOD, truncated [ 982.097286] loop1: p242 start 1 is beyond EOD, truncated [ 982.097306] loop1: p243 start 1 is beyond EOD, truncated [ 982.097326] loop1: p244 start 1 is beyond EOD, truncated [ 982.097346] loop1: p245 start 1 is beyond EOD, truncated [ 982.097366] loop1: p246 start 1 is beyond EOD, truncated [ 982.097386] loop1: p247 start 1 is beyond EOD, truncated [ 982.097406] loop1: p248 start 1 is beyond EOD, truncated [ 982.097426] loop1: p249 start 1 is beyond EOD, truncated [ 982.097466] loop1: p250 start 1 is beyond EOD, truncated [ 982.097486] loop1: p251 start 1 is beyond EOD, truncated [ 982.097506] loop1: p252 start 1 is beyond EOD, truncated [ 982.097526] loop1: p253 start 1 is beyond EOD, truncated [ 982.097565] loop1: p254 start 1 is beyond EOD, truncated [ 982.097585] loop1: p255 start 1 is beyond EOD, truncated [ 982.114855] loop2: p3 start 201 is beyond EOD, truncated [ 982.114895] loop2: p4 start 301 is beyond EOD, truncated [ 982.114915] loop2: p5 start 1 is beyond EOD, truncated [ 982.114953] loop2: p6 start 1 is beyond EOD, truncated [ 982.115042] loop2: p7 start 1 is beyond EOD, truncated [ 982.115062] loop2: p8 start 1 is beyond EOD, truncated [ 982.115082] loop2: p9 start 1 is beyond EOD, truncated [ 982.115161] loop2: p10 start 1 is beyond EOD, truncated [ 982.115181] loop2: p11 start 1 is beyond EOD, truncated [ 982.115201] loop2: p12 start 1 is beyond EOD, truncated [ 982.115221] loop2: p13 start 1 is beyond EOD, truncated [ 982.115241] loop2: p14 start 1 is beyond EOD, truncated [ 982.115260] loop2: p15 start 1 is beyond EOD, truncated [ 982.115280] loop2: p16 start 1 is beyond EOD, truncated [ 982.115300] loop2: p17 start 1 is beyond EOD, truncated [ 982.115319] loop2: p18 start 1 is beyond EOD, truncated [ 982.115362] loop2: p19 start 1 is beyond EOD, truncated [ 982.115381] loop2: p20 start 1 is beyond EOD, truncated [ 982.115401] loop2: p21 start 1 is beyond EOD, truncated [ 982.115420] loop2: p22 start 1 is beyond EOD, truncated [ 982.115440] loop2: p23 start 1 is beyond EOD, truncated [ 982.115459] loop2: p24 start 1 is beyond EOD, truncated [ 982.115637] loop2: p25 start 1 is beyond EOD, truncated [ 982.115750] loop2: p26 start 1 is beyond EOD, truncated [ 982.115789] loop2: p27 start 1 is beyond EOD, truncated [ 982.115810] loop2: p28 start 1 is beyond EOD, truncated 14:39:55 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:55 executing program 1: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:55 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:55 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c900000064000000000432000520", 0x54, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:55 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 14:39:55 executing program 2: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ** 36 printk messages dropped ** [ 982.116994] loop2: p65 start 1 is beyond EOD, truncated ** 188 printk messages dropped ** [ 982.123985] loop2: p254 start 1 is beyond EOD, truncated [ 982.124004] loop2: p255 start 1 is beyond EOD, truncated [ 982.278703] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 982.279031] loop0: p1 start 1 is beyond EOD, truncated [ 982.279039] loop0: p2 size 2 extends beyond EOD, truncated [ 982.310419] loop0: p3 start 201 is beyond EOD, truncated [ 982.310428] loop0: p4 start 301 is beyond EOD, truncated [ 982.310439] loop0: p5 start 1 is beyond EOD, truncated [ 982.318954] loop0: p6 start 1 is beyond EOD, truncated [ 982.318960] loop0: p7 start 1 is beyond EOD, truncated [ 982.318967] loop0: p8 start 1 is beyond EOD, truncated [ 982.318973] loop0: p9 start 1 is beyond EOD, truncated [ 982.318980] loop0: p10 start 1 is beyond EOD, truncated [ 982.318986] loop0: p11 start 1 is beyond EOD, truncated [ 982.318992] loop0: p12 start 1 is beyond EOD, truncated [ 982.318999] loop0: p13 start 1 is beyond EOD, truncated [ 982.319005] loop0: p14 start 1 is beyond EOD, truncated [ 982.319011] loop0: p15 start 1 is beyond EOD, truncated [ 982.319017] loop0: p16 start 1 is beyond EOD, truncated [ 982.319023] loop0: p17 start 1 is beyond EOD, truncated [ 982.319029] loop0: p18 start 1 is beyond EOD, truncated [ 982.319036] loop0: p19 start 1 is beyond EOD, truncated [ 982.319042] loop0: p20 start 1 is beyond EOD, truncated [ 982.319049] loop0: p21 start 1 is beyond EOD, truncated [ 982.319055] loop0: p22 start 1 is beyond EOD, truncated [ 982.319061] loop0: p23 start 1 is beyond EOD, truncated [ 982.319068] loop0: p24 start 1 is beyond EOD, truncated [ 982.319074] loop0: p25 start 1 is beyond EOD, truncated [ 982.319080] loop0: p26 start 1 is beyond EOD, truncated [ 982.319087] loop0: p27 start 1 is beyond EOD, truncated [ 982.319093] loop0: p28 start 1 is beyond EOD, truncated [ 982.319099] loop0: p29 start 1 is beyond EOD, truncated [ 982.319105] loop0: p30 start 1 is beyond EOD, truncated [ 982.319111] loop0: p31 start 1 is beyond EOD, truncated [ 982.319117] loop0: p32 start 1 is beyond EOD, truncated [ 982.319123] loop0: p33 start 1 is beyond EOD, truncated [ 982.319128] loop0: p34 start 1 is beyond EOD, truncated [ 982.319140] loop0: p35 start 1 is beyond EOD, truncated [ 982.319147] loop0: p36 start 1 is beyond EOD, truncated [ 982.319153] loop0: p37 start 1 is beyond EOD, truncated [ 982.319159] loop0: p38 start 1 is beyond EOD, truncated [ 982.319165] loop0: p39 start 1 is beyond EOD, truncated ** 171 printk messages dropped ** [ 982.320375] loop0: p211 start 1 is beyond EOD, truncated ** 46 printk messages dropped ** [ 982.586501] loop3: p1 start 1 is beyond EOD, truncated ** 81 printk messages dropped ** [ 982.618426] loop3: p81 start 1 is beyond EOD, truncated ** 20 printk messages dropped ** [ 982.619179] loop3: p102 start 1 is beyond EOD, truncated 14:39:55 executing program 2: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:55 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) 14:39:55 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ** 134 printk messages dropped ** [ 982.631678] loop1: p44 start 1 is beyond EOD, truncated [ 982.631693] loop1: p45 start 1 is beyond EOD, truncated [ 982.631730] loop1: p46 start 1 is beyond EOD, truncated [ 982.631740] loop1: p47 start 1 is beyond EOD, truncated [ 982.631759] loop1: p48 start 1 is beyond EOD, truncated 14:39:55 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:55 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 982.631777] loop1: p49 start 1 is beyond EOD, truncated [ 982.631819] loop1: p50 start 1 is beyond EOD, truncated [ 982.631838] loop1: p51 start 1 is beyond EOD, truncated [ 982.631853] loop1: p52 start 1 is beyond EOD, truncated [ 982.631899] loop1: p53 start 1 is beyond EOD, truncated [ 982.631917] loop1: p54 start 1 is beyond EOD, truncated ** 9 printk messages dropped ** [ 982.633498] loop3: p202 start 1 is beyond EOD, truncated 14:39:55 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ** 18 printk messages dropped ** [ 982.633950] loop3: p221 start 1 is beyond EOD, truncated ** 206 printk messages dropped ** [ 982.650194] loop1: p225 start 1 is beyond EOD, truncated ** 270 printk messages dropped ** [ 982.792655] loop2: p238 start 1 is beyond EOD, truncated ** 32 printk messages dropped ** [ 982.989952] loop5: p15 start 1 is beyond EOD, truncated ** 3 printk messages dropped ** [ 982.997826] loop5: p19 start 1 is beyond EOD, truncated ** 92 printk messages dropped ** [ 983.013780] loop5: p112 start 1 is beyond EOD, truncated ** 398 printk messages dropped ** [ 983.259398] loop3: p254 start 1 is beyond EOD, truncated ** 2 printk messages dropped ** [ 983.372995] loop2: p1 start 1 is beyond EOD, truncated [ 983.373030] loop2: p2 size 2 extends beyond EOD, truncated ** 163 printk messages dropped ** [ 983.401765] loop2: p166 start 1 is beyond EOD, truncated ** 87 printk messages dropped ** [ 983.405841] loop2: p254 start 1 is beyond EOD, truncated [ 983.405861] loop2: p255 start 1 is beyond EOD, truncated [ 983.707658] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 983.711321] loop0: p1 start 1 is beyond EOD, truncated [ 983.711360] loop0: p2 size 2 extends beyond EOD, truncated [ 983.718095] loop0: p3 start 201 is beyond EOD, truncated [ 983.718127] loop0: p4 start 301 is beyond EOD, truncated [ 983.718147] loop0: p5 start 1 is beyond EOD, truncated [ 983.718167] loop0: p6 start 1 is beyond EOD, truncated [ 983.718187] loop0: p7 start 1 is beyond EOD, truncated [ 983.718215] loop0: p8 start 1 is beyond EOD, truncated [ 983.718235] loop0: p9 start 1 is beyond EOD, truncated [ 983.718254] loop0: p10 start 1 is beyond EOD, truncated [ 983.718274] loop0: p11 start 1 is beyond EOD, truncated [ 983.718294] loop0: p12 start 1 is beyond EOD, truncated [ 983.718314] loop0: p13 start 1 is beyond EOD, truncated [ 983.718344] loop0: p14 start 1 is beyond EOD, truncated [ 983.718363] loop0: p15 start 1 is beyond EOD, truncated ** 81 printk messages dropped ** [ 983.720759] loop0: p97 start 1 is beyond EOD, truncated ** 156 printk messages dropped ** [ 983.725140] loop0: p254 start 1 is beyond EOD, truncated [ 983.725159] loop0: p255 start 1 is beyond EOD, truncated [ 984.075856] loop5: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 984.083206] loop5: p1 start 1 is beyond EOD, truncated [ 984.083244] loop5: p2 size 2 extends beyond EOD, truncated [ 984.094868] loop4: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 984.103524] loop5: p3 start 201 is beyond EOD, truncated [ 984.103562] loop5: p4 start 301 is beyond EOD, truncated [ 984.103581] loop5: p5 start 1 is beyond EOD, truncated [ 984.103615] loop5: p6 start 1 is beyond EOD, truncated [ 984.103636] loop5: p7 start 1 is beyond EOD, truncated 14:39:56 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:56 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:56 executing program 1: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:56 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:56 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:56 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001", 0x30, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 984.103656] loop5: p8 start 1 is beyond EOD, truncated [ 984.103675] loop5: p9 start 1 is beyond EOD, truncated [ 984.103703] loop5: p10 start 1 is beyond EOD, truncated [ 984.103723] loop5: p11 start 1 is beyond EOD, truncated [ 984.103742] loop5: p12 start 1 is beyond EOD, truncated [ 984.103761] loop5: p13 start 1 is beyond EOD, truncated [ 984.103804] loop5: p14 start 1 is beyond EOD, truncated [ 984.103823] loop5: p15 start 1 is beyond EOD, truncated [ 984.103843] loop5: p16 start 1 is beyond EOD, truncated [ 984.103862] loop5: p17 start 1 is beyond EOD, truncated [ 984.103900] loop5: p18 start 1 is beyond EOD, truncated [ 984.103944] loop5: p19 start 1 is beyond EOD, truncated [ 984.103963] loop5: p20 start 1 is beyond EOD, truncated [ 984.104003] loop5: p21 start 1 is beyond EOD, truncated [ 984.104023] loop5: p22 start 1 is beyond EOD, truncated [ 984.104073] loop5: p23 start 1 is beyond EOD, truncated [ 984.104092] loop5: p24 start 1 is beyond EOD, truncated ** 745 printk messages dropped ** [ 984.506670] loop1: p49 start 1 is beyond EOD, truncated 14:39:57 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 14:39:57 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ** 35 printk messages dropped ** [ 984.507706] loop3: p232 start 1 is beyond EOD, truncated ** 27 printk messages dropped ** [ 984.509609] loop1: p72 start 1 is beyond EOD, truncated [ 984.509651] loop1: p73 start 1 is beyond EOD, truncated 14:39:57 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 984.509670] loop1: p74 start 1 is beyond EOD, truncated [ 984.509689] loop1: p75 start 1 is beyond EOD, truncated [ 984.509731] loop1: p76 start 1 is beyond EOD, truncated [ 984.509750] loop1: p77 start 1 is beyond EOD, truncated [ 984.509769] loop1: p78 start 1 is beyond EOD, truncated ** 10 printk messages dropped ** [ 984.511400] loop3: p247 start 1 is beyond EOD, truncated ** 21 printk messages dropped ** [ 984.513831] loop1: p99 start 1 is beyond EOD, truncated [ 984.513858] loop1: p100 start 1 is beyond EOD, truncated [ 984.513881] loop1: p101 start 1 is beyond EOD, truncated [ 984.513901] loop1: p102 start 1 is beyond EOD, truncated ** 334 printk messages dropped ** [ 984.649374] loop5: p178 start 1 is beyond EOD, truncated 14:39:57 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:57 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ** 110 printk messages dropped ** [ 984.653660] loop4: p60 start 1 is beyond EOD, truncated ** 41 printk messages dropped ** [ 984.655469] loop4: p75 start 1 is beyond EOD, truncated [ 984.655488] loop4: p76 start 1 is beyond EOD, truncated [ 984.655547] loop4: p77 start 1 is beyond EOD, truncated ** 16 printk messages dropped ** [ 984.657385] loop4: p94 start 1 is beyond EOD, truncated ** 18 printk messages dropped ** [ 984.657807] loop4: p113 start 1 is beyond EOD, truncated 14:39:57 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 984.657827] loop4: p114 start 1 is beyond EOD, truncated [ 984.657847] loop4: p115 start 1 is beyond EOD, truncated [ 984.657886] loop4: p116 start 1 is beyond EOD, truncated [ 984.657905] loop4: p117 start 1 is beyond EOD, truncated ** 315 printk messages dropped ** [ 984.812898] loop2: p176 start 1 is beyond EOD, truncated ** 122 printk messages dropped ** [ 985.073355] loop0: p43 start 1 is beyond EOD, truncated ** 30 printk messages dropped ** [ 985.074234] loop0: p74 start 1 is beyond EOD, truncated [ 985.074268] loop0: p75 start 1 is beyond EOD, truncated [ 985.074317] loop0: p76 start 1 is beyond EOD, truncated [ 985.074336] loop0: p77 start 1 is beyond EOD, truncated [ 985.074355] loop0: p78 start 1 is beyond EOD, truncated [ 985.074396] loop0: p79 start 1 is beyond EOD, truncated [ 985.074416] loop0: p80 start 1 is beyond EOD, truncated [ 985.074435] loop0: p81 start 1 is beyond EOD, truncated [ 985.074496] loop0: p82 start 1 is beyond EOD, truncated ** 8 printk messages dropped ** [ 985.074735] loop0: p91 start 1 is beyond EOD, truncated ** 52 printk messages dropped ** [ 985.076176] loop0: p144 start 1 is beyond EOD, truncated ** 154 printk messages dropped ** [ 985.535233] loop5: p37 start 1 is beyond EOD, truncated [ 985.535282] loop5: p38 start 1 is beyond EOD, truncated [ 985.535323] loop5: p39 start 1 is beyond EOD, truncated ** 13 printk messages dropped ** [ 985.535682] loop5: p53 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 985.535723] loop5: p55 start 1 is beyond EOD, truncated [ 985.535737] loop5: p56 start 1 is beyond EOD, truncated [ 985.535939] loop5: p57 start 1 is beyond EOD, truncated [ 985.535958] loop5: p58 start 1 is beyond EOD, truncated ** 276 printk messages dropped ** [ 985.543830] truncated [ 985.543834] loop4: p107 start 1 is beyond EOD, [ 985.543847] truncated 14:39:58 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:58 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:58 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:58 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:58 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:58 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 985.543853] truncated [ 985.543868] loop3: p26 start 1 is beyond EOD, [ 985.543878] loop4: p108 start 1 is beyond EOD, [ 985.543888] truncated [ 985.543897] truncated [ 985.543909] loop3: p27 start 1 is beyond EOD, [ 985.543919] loop4: p109 start 1 is beyond EOD, [ 985.543921] truncated [ 985.543928] loop3: p28 start 1 is beyond EOD, [ 985.543930] truncated [ 985.543938] loop4: p110 start 1 is beyond EOD, [ 985.543948] truncated [ 985.543954] truncated [ 985.543969] loop3: p29 start 1 is beyond EOD, [ 985.543979] loop4: p111 start 1 is beyond EOD, [ 985.543980] truncated [ 985.543988] loop3: p30 start 1 is beyond EOD, [ 985.543990] truncated [ 985.543998] loop4: p112 start 1 is beyond EOD, [ 985.543999] truncated [ 985.544003] loop3: p31 start 1 is beyond EOD, truncated [ 985.544050] loop3: p32 start 1 is beyond EOD, truncated [ 985.544067] loop3: p33 start 1 is beyond EOD, truncated [ 985.544128] loop3: p34 start 1 is beyond EOD, truncated [ 985.544149] loop3: p35 start 1 is beyond EOD, truncated [ 985.544170] loop3: p36 start 1 is beyond EOD, truncated [ 985.544189] loop3: p37 start 1 is beyond EOD, truncated [ 985.544208] loop3: p38 start 1 is beyond EOD, truncated [ 985.544252] loop3: p39 start 1 is beyond EOD, truncated [ 985.544261] loop3: p40 start 1 is beyond EOD, truncated [ 985.544280] loop3: p41 start 1 is beyond EOD, truncated [ 985.544300] loop3: p42 start 1 is beyond EOD, truncated [ 985.544320] loop3: p43 start 1 is beyond EOD, truncated [ 985.544340] loop3: p44 start 1 is beyond EOD, truncated [ 985.544360] loop3: p45 start 1 is beyond EOD, truncated [ 985.544379] loop3: p46 start 1 is beyond EOD, truncated [ 985.544399] loop3: p47 start 1 is beyond EOD, truncated [ 985.544419] loop3: p48 start 1 is beyond EOD, truncated [ 985.544439] loop3: p49 start 1 is beyond EOD, truncated [ 985.544460] loop3: p50 start 1 is beyond EOD, truncated [ 985.544480] loop3: p51 start 1 is beyond EOD, truncated [ 985.544520] loop3: p52 start 1 is beyond EOD, truncated [ 985.544538] loop3: p53 start 1 is beyond EOD, truncated [ 985.544558] loop3: p54 start 1 is beyond EOD, truncated [ 985.544579] loop3: p55 start 1 is beyond EOD, truncated [ 985.544600] loop3: p56 start 1 is beyond EOD, truncated [ 985.544618] loop3: p57 start 1 is beyond EOD, truncated [ 985.544660] loop3: p58 start 1 is beyond EOD, truncated [ 985.544680] loop3: p59 start 1 is beyond EOD, truncated 14:39:58 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ** 6 printk messages dropped ** [ 985.544819] loop3: p66 start 1 is beyond EOD, truncated ** 21 printk messages dropped ** [ 985.545349] loop3: p86 start 1 is beyond EOD, truncated [ 985.545370] loop3: p87 start 1 is beyond EOD, ** 4 printk messages dropped ** [ 985.545406] loop4: p114 start 1 is beyond EOD, [ 985.545409] truncated [ 985.545418] truncated ** 172 printk messages dropped ** [ 985.547745] loop4: p148 start 1 is beyond EOD, [ 985.547758] truncated ** 187 printk messages dropped ** [ 985.550960] loop5: p191 start 1 is beyond EOD, truncated ** 721 printk messages dropped ** [ 985.911988] loop2: p255 start 1 is beyond EOD, truncated [ 986.088090] loop3: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 986.104736] loop3: p1 start 1 is beyond EOD, truncated [ 986.104783] loop3: p2 size 2 extends beyond EOD, truncated [ 986.127254] loop4: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 14:39:58 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:58 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 986.139400] loop4: p1 start 1 is beyond EOD, truncated [ 986.139500] loop4: p2 size 2 extends beyond EOD, truncated [ 986.188323] loop3: p3 start 201 is beyond EOD, truncated [ 986.188374] loop3: p4 start 301 is beyond EOD, truncated [ 986.188413] loop3: p5 start 1 is beyond EOD, truncated [ 986.188449] loop3: p6 start 1 is beyond EOD, truncated 14:39:58 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:58 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:39:58 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 986.188469] loop3: p7 start 1 is beyond EOD, truncated [ 986.188489] loop3: p8 start 1 is beyond EOD, truncated [ 986.188508] loop3: p9 start 1 is beyond EOD, truncated [ 986.188569] loop3: p10 start 1 is beyond EOD, truncated [ 986.188589] loop3: p11 start 1 is beyond EOD, truncated [ 986.188833] loop3: p12 start 1 is beyond EOD, truncated [ 986.188853] loop3: p13 start 1 is beyond EOD, truncated [ 986.188873] loop3: p14 start 1 is beyond EOD, truncated [ 986.188893] loop3: p15 start 1 is beyond EOD, truncated ** 175 printk messages dropped ** [ 986.200936] loop4: p108 start 1 is beyond EOD, truncated ** 49 printk messages dropped ** [ 986.202355] loop4: p158 start 1 is beyond EOD, truncated [ 986.202376] loop4: p159 start 1 is beyond EOD, truncated ** 15 printk messages dropped ** [ 986.202737] loop4: p175 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 986.202797] loop4: p177 start 1 is beyond EOD, truncated [ 986.202816] loop4: p178 start 1 is beyond EOD, truncated ** 84 printk messages dropped ** [ 986.215564] loop3: p92 start 1 is beyond EOD, truncated ** 186 printk messages dropped ** [ 986.424449] loop2: p23 start 1 is beyond EOD, truncated ** 20 printk messages dropped ** [ 986.426301] loop2: p44 start 1 is beyond EOD, truncated ** 113 printk messages dropped ** [ 986.429417] loop2: p158 start 1 is beyond EOD, truncated ** 357 printk messages dropped ** [ 986.849243] loop1: p1 start 1 is beyond EOD, truncated ** 223 printk messages dropped ** [ 986.924098] loop2: p70 start 1 is beyond EOD, truncated [ 986.924147] loop2: p71 start 1 is beyond EOD, truncated [ 986.924167] loop2: p72 start 1 is beyond EOD, truncated [ 986.924335] truncated [ 986.924361] loop1: p105 start 1 is beyond EOD, truncated [ 986.924381] loop1: p106 start 1 is beyond EOD, truncated [ 986.924402] loop1: p107 start 1 is beyond EOD, truncated [ 986.924423] loop1: p108 start 1 is beyond EOD, truncated [ 986.924463] loop1: p109 start 1 is beyond EOD, truncated [ 986.924502] loop1: p110 start 1 is beyond EOD, truncated [ 986.924522] loop1: p111 start 1 is beyond EOD, truncated [ 986.924543] loop1: p112 start 1 is beyond EOD, truncated [ 986.924583] loop1: p113 start 1 is beyond EOD, truncated [ 986.924603] loop1: p114 start 1 is beyond EOD, truncated [ 986.924622] loop1: p115 start 1 is beyond EOD, truncated [ 986.924642] loop1: p116 start 1 is beyond EOD, truncated [ 986.924663] loop1: p117 start 1 is beyond EOD, truncated [ 986.924682] loop1: p118 start 1 is beyond EOD, truncated [ 986.924702] loop1: p119 start 1 is beyond EOD, truncated [ 986.924722] loop1: p120 start 1 is beyond EOD, truncated [ 986.924747] loop1: p121 start 1 is beyond EOD, truncated [ 986.924782] loop1: p122 start 1 is beyond EOD, truncated [ 986.924802] loop1: p123 start 1 is beyond EOD, truncated [ 986.924823] loop1: p124 start 1 is beyond EOD, truncated [ 986.924843] loop1: p125 start 1 is beyond EOD, truncated [ 986.924882] loop1: p126 start 1 is beyond EOD, truncated [ 986.924903] loop1: p127 start 1 is beyond EOD, truncated [ 986.924934] loop1: p128 start 1 is beyond EOD, truncated [ 986.924955] loop1: p129 start 1 is beyond EOD, truncated [ 986.924995] loop1: p130 start 1 is beyond EOD, truncated [ 986.925015] loop1: p131 start 1 is beyond EOD, truncated [ 986.925054] loop1: p132 start 1 is beyond EOD, truncated [ 986.925075] loop1: p133 start 1 is beyond EOD, truncated [ 986.925095] loop1: p134 start 1 is beyond EOD, truncated [ 986.925176] loop1: p135 start 1 is beyond EOD, truncated [ 986.925236] loop1: p136 start 1 is beyond EOD, truncated [ 986.925281] loop1: p137 start 1 is beyond EOD, truncated [ 986.925300] loop1: p138 start 1 is beyond EOD, [ 986.925446] loop3: p16 start 1 is beyond EOD, truncated [ 986.925466] loop3: p17 start 1 is beyond EOD, truncated [ 986.925480] loop3: p18 start 1 is beyond EOD, truncated [ 986.925516] loop3: p19 start 1 is beyond EOD, truncated [ 986.925536] loop3: p20 start 1 is beyond EOD, truncated [ 986.925556] loop3: p21 start 1 is beyond EOD, truncated [ 986.925577] loop3: p22 start 1 is beyond EOD, truncated [ 986.925597] loop3: p23 start 1 is beyond EOD, truncated [ 986.925617] loop3: p24 start 1 is beyond EOD, truncated 14:39:59 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:59 executing program 4: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x0, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:59 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:59 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:59 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000700)) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:39:59 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 986.925637] loop3: p25 start 1 is beyond EOD, truncated [ 986.925656] loop3: p26 start 1 is beyond EOD, truncated [ 986.925671] loop3: p27 start 1 is beyond EOD, truncated [ 986.925710] loop3: p28 start 1 is beyond EOD, truncated [ 986.925729] loop3: p29 start 1 is beyond EOD, truncated [ 986.925788] loop3: p30 start 1 is beyond EOD, truncated [ 986.925827] loop3: p31 start 1 is beyond EOD, truncated [ 986.925848] loop3: p32 start 1 is beyond EOD, truncated [ 986.925889] loop3: p33 start 1 is beyond EOD, truncated [ 986.925907] loop3: p34 start 1 is beyond EOD, truncated [ 986.925926] loop3: p35 start 1 is beyond EOD, truncated [ 986.925946] loop3: p36 start 1 is beyond EOD, truncated [ 986.925967] loop3: p37 start 1 is beyond EOD, truncated [ 986.925986] loop3: p38 start 1 is beyond EOD, truncated [ 986.926007] loop3: p39 start 1 is beyond EOD, truncated [ 986.926026] loop3: p40 start 1 is beyond EOD, truncated [ 986.926046] loop3: p41 start 1 is beyond EOD, truncated [ 986.926067] loop3: p42 start 1 is beyond EOD, truncated ** 22 printk messages dropped ** [ 986.926746] loop4: p42 start 1 is beyond EOD, truncated [ 986.926775] loop4: p43 start 1 is beyond EOD, truncated ** 4 printk messages dropped ** [ 986.926891] loop4: p48 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 986.926944] loop4: p50 start 1 is beyond EOD, truncated ** 140 printk messages dropped ** [ 986.931452] loop4: p84 start 1 is beyond EOD, truncated ** 856 printk messages dropped ** [ 987.529114] loop2: p15 start 1 is beyond EOD, truncated ** 174 printk messages dropped ** [ 987.546223] loop2: p190 start 1 is beyond EOD, truncated ** 68 printk messages dropped ** [ 987.576295] loop3: p1 start 1 is beyond EOD, truncated [ 987.576314] loop3: p2 size 2 extends beyond EOD, truncated [ 987.597125] loop1: p1 start 1 is beyond EOD, truncated 14:40:00 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 987.597175] loop1: p2 size 2 extends beyond EOD, truncated 14:40:00 executing program 3: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:00 executing program 1: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 987.612426] loop5: p3 start 201 is beyond EOD, truncated [ 987.612458] loop5: p4 start 301 is beyond EOD, truncated 14:40:00 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:00 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 987.612478] loop5: p5 start 1 is beyond EOD, truncated [ 987.612497] loop5: p6 start 1 is beyond EOD, truncated [ 987.612525] loop5: p7 start 1 is beyond EOD, truncated [ 987.612545] loop5: p8 start 1 is beyond EOD, truncated [ 987.612564] loop5: p9 start 1 is beyond EOD, truncated [ 987.612584] loop5: p10 start 1 is beyond EOD, truncated [ 987.612603] loop5: p11 start 1 is beyond EOD, truncated [ 987.612619] loop5: p12 start 1 is beyond EOD, truncated [ 987.612665] loop5: p13 start 1 is beyond EOD, truncated [ 987.612709] loop5: p14 start 1 is beyond EOD, truncated [ 987.612747] loop5: p15 start 1 is beyond EOD, truncated [ 987.612767] loop5: p16 start 1 is beyond EOD, truncated [ 987.612787] loop5: p17 start 1 is beyond EOD, truncated [ 987.612807] loop5: p18 start 1 is beyond EOD, truncated [ 987.612827] loop5: p19 start 1 is beyond EOD, truncated [ 987.612855] loop5: p20 start 1 is beyond EOD, truncated [ 987.612875] loop5: p21 start 1 is beyond EOD, truncated ** 5 printk messages dropped ** [ 987.612994] loop5: p27 start 1 is beyond EOD, truncated ** 16 printk messages dropped ** [ 987.614005] loop5: p44 start 1 is beyond EOD, truncated ** 20 printk messages dropped ** [ 987.614649] loop5: p65 start 1 is beyond EOD, truncated ** 51 printk messages dropped ** [ 987.616320] loop5: p117 start 1 is beyond EOD, truncated ** 79 printk messages dropped ** [ 987.627768] loop5: p197 start 1 is beyond EOD, truncated ** 121 printk messages dropped ** [ 987.635756] loop5: p249 start 1 is beyond EOD, truncated ** 618 printk messages dropped ** [ 988.329525] loop1: p121 start 1 is beyond EOD, truncated ** 383 printk messages dropped ** [ 988.343354] loop5: p113 start 1 is beyond EOD, truncated 14:40:00 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 988.343374] loop5: p114 start 1 is beyond EOD, truncated [ 988.343394] loop5: p115 start 1 is beyond EOD, truncated [ 988.343416] loop5: p116 start 1 is beyond EOD, truncated [ 988.343446] loop5: p117 start 1 is beyond EOD, truncated [ 988.343466] loop5: p118 start 1 is beyond EOD, truncated [ 988.343485] loop5: p119 start 1 is beyond EOD, truncated [ 988.343514] loop5: p120 start 1 is beyond EOD, truncated [ 988.343534] loop5: p121 start 1 is beyond EOD, truncated [ 988.343555] loop5: p122 start 1 is beyond EOD, truncated [ 988.343594] loop5: p123 start 1 is beyond EOD, truncated [ 988.343616] loop5: p124 start 1 is beyond EOD, truncated [ 988.343674] loop5: p125 start 1 is beyond EOD, truncated ** 6 printk messages dropped ** [ 988.343833] loop5: p132 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 988.343874] loop5: p134 start 1 is beyond EOD, truncated ** 65 printk messages dropped ** [ 988.345643] loop5: p200 start 1 is beyond EOD, truncated ** 197 printk messages dropped ** [ 988.361206] loop1: p174 start 1 is beyond EOD, [ 988.361211] truncated [ 988.361219] truncated [ 988.361226] loop1: p175 start 1 is beyond EOD, [ 988.361232] loop4: p97 start 1 is beyond EOD, [ 988.361238] truncated [ 988.361245] loop1: p176 start 1 is beyond EOD, [ 988.361250] truncated [ 988.361257] truncated [ 988.361265] loop1: p177 start 1 is beyond EOD, [ 988.361272] loop4: p98 start 1 is beyond EOD, truncated [ 988.361285] truncated [ 988.361292] loop4: p99 start 1 is beyond EOD, [ 988.361299] loop1: p178 start 1 is beyond EOD, truncated [ 988.361310] truncated [ 988.361324] loop4: p100 start 1 is beyond EOD, truncated [ 988.361345] loop1: p179 start 1 is beyond EOD, [ 988.361352] loop4: p101 start 1 is beyond EOD, [ 988.361357] truncated [ 988.361365] loop1: p180 start 1 is beyond EOD, [ 988.361370] truncated [ 988.361384] loop4: p102 start 1 is beyond EOD, truncated [ 988.361401] truncated [ 988.361404] loop4: p103 start 1 is beyond EOD, truncated [ 988.361426] loop1: p181 start 1 is beyond EOD, [ 988.361432] loop4: p104 start 1 is beyond EOD, [ 988.361439] truncated [ 988.361445] loop1: p182 start 1 is beyond EOD, [ 988.361451] truncated [ 988.361457] truncated [ 988.361464] loop1: p183 start 1 is beyond EOD, [ 988.361472] loop4: p105 start 1 is beyond EOD, [ 988.361486] truncated ** 13 printk messages dropped ** [ 988.361757] loop1: p192 start 1 is beyond EOD, truncated ** 256 printk messages dropped ** [ 988.378457] loop3: p120 start 1 is beyond EOD, truncated [ 988.378485] loop3: p121 start 1 is beyond EOD, truncated [ 988.378506] loop3: p122 start 1 is beyond EOD, truncated [ 988.378526] loop3: p123 start 1 is beyond EOD, truncated [ 988.378545] loop3: p124 start 1 is beyond EOD, truncated [ 988.378565] loop3: p125 start 1 is beyond EOD, truncated [ 988.378585] loop3: p126 start 1 is beyond EOD, truncated [ 988.378609] loop3: p127 start 1 is beyond EOD, truncated [ 988.378665] loop3: p128 start 1 is beyond EOD, truncated [ 988.378744] loop3: p129 start 1 is beyond EOD, truncated [ 988.378763] loop3: p130 start 1 is beyond EOD, truncated [ 988.378798] loop3: p131 start 1 is beyond EOD, truncated [ 988.378817] loop3: p132 start 1 is beyond EOD, truncated [ 988.378837] loop3: p133 start 1 is beyond EOD, truncated [ 988.378866] loop3: p134 start 1 is beyond EOD, truncated [ 988.378885] loop3: p135 start 1 is beyond EOD, truncated [ 988.378905] loop3: p136 start 1 is beyond EOD, truncated [ 988.378924] loop3: p137 start 1 is beyond EOD, truncated [ 988.378944] loop3: p138 start 1 is beyond EOD, truncated [ 988.378963] loop3: p139 start 1 is beyond EOD, truncated [ 988.379015] loop3: p140 start 1 is beyond EOD, truncated [ 988.379034] loop3: p141 start 1 is beyond EOD, truncated [ 988.379054] loop3: p142 start 1 is beyond EOD, truncated [ 988.379073] loop3: p143 start 1 is beyond EOD, truncated [ 988.379108] loop3: p144 start 1 is beyond EOD, truncated [ 988.379128] loop3: p145 start 1 is beyond EOD, truncated [ 988.379147] loop3: p146 start 1 is beyond EOD, truncated [ 988.379176] loop3: p147 start 1 is beyond EOD, truncated [ 988.379195] loop3: p148 start 1 is beyond EOD, truncated [ 988.379215] loop3: p149 start 1 is beyond EOD, truncated [ 988.379234] loop3: p150 start 1 is beyond EOD, truncated [ 988.379255] loop3: p151 start 1 is beyond EOD, truncated [ 988.379275] loop3: p152 start 1 is beyond EOD, truncated [ 988.379294] loop3: p153 start 1 is beyond EOD, truncated [ 988.379314] loop3: p154 start 1 is beyond EOD, truncated [ 988.379334] loop3: p155 start 1 is beyond EOD, truncated [ 988.379353] loop3: p156 start 1 is beyond EOD, truncated [ 988.379403] loop3: p157 start 1 is beyond EOD, truncated [ 988.379445] loop3: p158 start 1 is beyond EOD, truncated [ 988.379464] loop3: p159 start 1 is beyond EOD, truncated 14:40:01 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:01 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:01 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:40:01 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:01 executing program 3: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:01 executing program 2: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 988.379479] loop3: p160 start 1 is beyond EOD, truncated [ 988.379525] loop3: p161 start 1 is beyond EOD, truncated [ 988.379544] loop3: p162 start 1 is beyond EOD, truncated [ 988.379559] loop3: p163 start 1 is beyond EOD, truncated [ 988.379609] loop3: p164 start 1 is beyond EOD, truncated [ 988.379637] loop3: p165 start 1 is beyond EOD, truncated [ 988.379688] loop3: p166 start 1 is beyond EOD, truncated [ 988.379707] loop3: p167 start 1 is beyond EOD, truncated [ 988.379727] loop3: p168 start 1 is beyond EOD, truncated [ 988.379755] loop3: p169 start 1 is beyond EOD, truncated [ 988.379776] loop3: p170 start 1 is beyond EOD, truncated [ 988.379796] loop3: p171 start 1 is beyond EOD, truncated [ 988.379815] loop3: p172 start 1 is beyond EOD, truncated ** 17 printk messages dropped ** [ 988.381422] loop4: p163 start 1 is beyond EOD, truncated ** 3 printk messages dropped ** [ 988.381501] loop4: p167 start 1 is beyond EOD, truncated ** 227 printk messages dropped ** [ 988.904940] loop1: p52 start 1 is beyond EOD, truncated ** 555 printk messages dropped ** [ 988.947836] truncated ** 87 printk messages dropped ** [ 988.948853] loop4: p106 start 1 is beyond EOD, truncated [ 988.948872] truncated ** 53 printk messages dropped ** [ 988.949914] loop4: p140 start 1 is beyond EOD, truncated ** 377 printk messages dropped ** [ 988.971025] loop3: p246 start 1 is beyond EOD, truncated [ 988.971046] loop3: p247 start 1 is beyond EOD, truncated [ 988.971102] loop3: p248 start 1 is beyond EOD, truncated [ 988.971121] loop3: p249 start 1 is beyond EOD, [ 988.971258] truncated [ 988.971279] loop5: p16 start 1 is beyond EOD, truncated 14:40:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001", 0x30, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) 14:40:01 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 988.971360] loop5: p17 start 1 is beyond EOD, truncated [ 988.971392] loop5: p18 start 1 is beyond EOD, truncated [ 988.971417] loop5: p19 start 1 is beyond EOD, truncated [ 988.971440] loop5: p20 start 1 is beyond EOD, truncated [ 988.971482] loop5: p21 start 1 is beyond EOD, truncated 14:40:01 executing program 1: getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 988.971509] loop5: p22 start 1 is beyond EOD, truncated [ 988.971529] loop5: p23 start 1 is beyond EOD, truncated 14:40:01 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000700)) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 988.971548] loop5: p24 start 1 is beyond EOD, truncated [ 988.971601] loop5: p25 start 1 is beyond EOD, truncated [ 988.971640] loop5: p26 start 1 is beyond EOD, truncated [ 988.971659] loop5: p27 start 1 is beyond EOD, truncated 14:40:01 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3, &(0x7f0000000700)=0x80) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 988.971681] loop5: p28 start 1 is beyond EOD, truncated [ 988.971712] loop5: p29 start 1 is beyond EOD, truncated [ 988.971779] loop5: p30 start 1 is beyond EOD, truncated ** 2 printk messages dropped ** [ 988.971838] loop5: p33 start 1 is beyond EOD, truncated ** 21 printk messages dropped ** [ 988.974698] loop5: p47 start 1 is beyond EOD, truncated [ 988.974718] loop5: p48 start 1 is beyond EOD, truncated 14:40:02 executing program 2: getpeername(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ** 323 printk messages dropped ** [ 989.345682] loop2: p114 start 1 is beyond EOD, truncated ** 225 printk messages dropped ** [ 989.504360] loop0: p84 start 1 is beyond EOD, truncated ** 262 printk messages dropped ** [ 989.976837] loop5: p79 start 1 is beyond EOD, truncated ** 167 printk messages dropped ** [ 989.983139] loop5: p247 start 1 is beyond EOD, truncated ** 16 printk messages dropped ** [ 989.989953] loop2: p11 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 989.991927] loop2: p13 start 1 is beyond EOD, truncated [ 989.991971] loop2: p14 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 989.992066] loop2: p16 start 1 is beyond EOD, truncated [ 989.992086] loop2: p17 start 1 is beyond EOD, truncated ** 87 printk messages dropped ** [ 989.998913] loop4: p72 start 1 is beyond EOD, truncated ** 126 printk messages dropped ** [ 990.008610] loop2: p117 start 1 is beyond EOD, truncated [ 990.008632] loop2: p118 start 1 is beyond EOD, truncated [ 990.008651] loop2: p119 start 1 is beyond EOD, truncated ** 34 printk messages dropped ** [ 990.012556] loop2: p154 start 1 is beyond EOD, truncated [ 990.012596] loop2: p155 start 1 is beyond EOD, truncated [ 990.012636] loop2: p156 start 1 is beyond EOD, truncated [ 990.012676] loop2: p157 start 1 is beyond EOD, truncated 14:40:02 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) bind$netlink(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:40:02 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:02 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:02 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:02 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 990.012716] loop2: p158 start 1 is beyond EOD, truncated [ 990.012756] loop2: p159 start 1 is beyond EOD, truncated [ 990.012796] loop2: p160 start 1 is beyond EOD, truncated [ 990.012836] loop2: p161 start 1 is beyond EOD, truncated [ 990.012916] loop2: p162 start 1 is beyond EOD, truncated [ 990.012936] loop2: p163 start 1 is beyond EOD, truncated [ 990.012977] loop2: p164 start 1 is beyond EOD, truncated 14:40:02 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 990.012998] loop2: p165 start 1 is beyond EOD, truncated [ 990.013018] loop2: p166 start 1 is beyond EOD, truncated [ 990.013039] loop2: p167 start 1 is beyond EOD, truncated [ 990.013104] loop2: p168 start 1 is beyond EOD, truncated [ 990.013125] loop2: p169 start 1 is beyond EOD, truncated [ 990.013147] loop2: p170 start 1 is beyond EOD, truncated ** 38 printk messages dropped ** [ 990.015527] truncated ** 5 printk messages dropped ** [ 990.015587] truncated ** 571 printk messages dropped ** [ 990.097561] loop1: p172 start 1 is beyond EOD, truncated ** 77 printk messages dropped ** [ 990.100699] loop1: p192 start 1 is beyond EOD, truncated ** 242 printk messages dropped ** [ 990.579352] loop1: p33 start 1 is beyond EOD, truncated ** 189 printk messages dropped ** [ 990.592018] loop1: p156 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 990.592057] loop1: p158 start 1 is beyond EOD, truncated [ 990.592077] loop1: p159 start 1 is beyond EOD, truncated [ 990.592098] loop1: p160 start 1 is beyond EOD, truncated [ 990.592118] loop1: p161 start 1 is beyond EOD, truncated ** 42 printk messages dropped ** [ 990.603615] loop3: p1 start 1 is beyond EOD, truncated ** 191 printk messages dropped ** [ 990.633269] loop5: p136 start 1 is beyond EOD, truncated [ 990.633289] loop5: p137 start 1 is beyond EOD, truncated [ 990.633309] loop5: p138 start 1 is beyond EOD, truncated [ 990.633328] loop5: p139 start 1 is beyond EOD, truncated 14:40:03 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 990.633343] loop5: p140 start 1 is beyond EOD, truncated [ 990.633382] loop5: p141 start 1 is beyond EOD, truncated 14:40:03 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) bind$netlink(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:40:03 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:03 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 990.633449] loop5: p142 start 1 is beyond EOD, truncated [ 990.633489] loop5: p143 start 1 is beyond EOD, truncated [ 990.633509] loop5: p144 start 1 is beyond EOD, truncated [ 990.633528] loop5: p145 start 1 is beyond EOD, truncated [ 990.633549] loop5: p146 start 1 is beyond EOD, truncated [ 990.633570] loop5: p147 start 1 is beyond EOD, truncated [ 990.633609] loop5: p148 start 1 is beyond EOD, truncated 14:40:03 executing program 2: getpeername(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 990.633630] loop5: p149 start 1 is beyond EOD, truncated [ 990.633669] loop5: p150 start 1 is beyond EOD, truncated [ 990.633721] loop5: p151 start 1 is beyond EOD, truncated [ 990.633747] loop5: p152 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 990.633811] loop5: p154 start 1 is beyond EOD, truncated ** 32 printk messages dropped ** [ 990.634682] loop5: p187 start 1 is beyond EOD, truncated ** 136 printk messages dropped ** [ 990.659297] loop4: p69 start 1 is beyond EOD, truncated ** 384 printk messages dropped ** [ 990.909462] loop2: p32 start 1 is beyond EOD, truncated ** 485 printk messages dropped ** [ 991.295883] loop5: p116 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 991.295923] loop5: p118 start 1 is beyond EOD, truncated ** 52 printk messages dropped ** [ 991.297280] loop4: p166 start 1 is beyond EOD, truncated ** 137 printk messages dropped ** [ 991.302843] loop4: p231 start 1 is beyond EOD, truncated [ 991.302886] loop4: p232 start 1 is beyond EOD, truncated ** 50 printk messages dropped ** [ 991.304489] truncated [ 991.304498] loop5: p237 start 1 is beyond EOD, truncated [ 991.304537] loop5: p238 start 1 is beyond EOD, truncated 14:40:03 executing program 4: getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:03 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:40:03 executing program 1: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000700)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 991.304557] loop5: p239 start 1 is beyond EOD, truncated [ 991.304577] loop5: p240 start 1 is beyond EOD, truncated [ 991.304598] loop5: p241 start 1 is beyond EOD, truncated 14:40:03 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 991.304638] loop5: p242 start 1 is beyond EOD, truncated [ 991.304658] loop5: p243 start 1 is beyond EOD, truncated [ 991.304678] loop5: p244 start 1 is beyond EOD, truncated [ 991.304718] loop5: p245 start 1 is beyond EOD, truncated [ 991.304743] loop5: p246 start 1 is beyond EOD, truncated [ 991.304777] loop5: p247 start 1 is beyond EOD, truncated [ 991.304798] loop5: p248 start 1 is beyond EOD, truncated [ 991.304818] loop5: p249 start 1 is beyond EOD, truncated [ 991.304837] loop5: p250 start 1 is beyond EOD, truncated [ 991.304856] loop5: p251 start 1 is beyond EOD, truncated [ 991.304875] loop5: p252 start 1 is beyond EOD, truncated [ 991.304891] loop5: p253 start 1 is beyond EOD, truncated [ 991.304929] loop5: p254 start 1 is beyond EOD, truncated ** 19 printk messages dropped ** [ 991.339431] loop1: p19 start 1 is beyond EOD, truncated ** 202 printk messages dropped ** [ 991.373450] loop1: p222 start 1 is beyond EOD, truncated ** 310 printk messages dropped ** [ 991.538902] loop2: p22 start 1 is beyond EOD, truncated ** 18 printk messages dropped ** [ 991.539425] loop2: p41 start 1 is beyond EOD, truncated ** 525 printk messages dropped ** [ 991.961740] loop4: p81 start 1 is beyond EOD, truncated ** 2 printk messages dropped ** [ 991.961851] loop4: p84 start 1 is beyond EOD, truncated [ 991.961909] loop4: p85 start 1 is beyond EOD, truncated [ 991.961929] loop4: p86 start 1 is beyond EOD, truncated [ 991.961957] loop4: p87 start 1 is beyond EOD, truncated [ 991.962056] loop4: p88 start 1 is beyond EOD, truncated [ 991.962097] loop4: p89 start 1 is beyond EOD, truncated [ 991.962210] loop4: p90 start 1 is beyond EOD, truncated [ 991.962235] loop4: p91 start 1 is beyond EOD, truncated [ 991.962257] loop4: p92 start 1 is beyond EOD, truncated [ 991.962276] loop4: p93 start 1 is beyond EOD, truncated [ 991.962295] loop4: p94 start 1 is beyond EOD, truncated [ 991.962315] loop4: p95 start 1 is beyond EOD, truncated ** 283 printk messages dropped ** [ 991.981965] loop1: p57 start 1 is beyond EOD, [ 991.983117] loop3: p3 start 201 is beyond EOD, truncated [ 991.983137] loop3: p4 start 301 is beyond EOD, truncated [ 991.983156] loop3: p5 start 1 is beyond EOD, truncated [ 991.983176] loop3: p6 start 1 is beyond EOD, truncated [ 991.983196] loop3: p7 start 1 is beyond EOD, truncated [ 991.983216] loop3: p8 start 1 is beyond EOD, truncated [ 991.983235] loop3: p9 start 1 is beyond EOD, truncated [ 991.983276] loop3: p10 start 1 is beyond EOD, truncated [ 991.983294] loop3: p11 start 1 is beyond EOD, truncated [ 991.983542] truncated [ 991.983561] loop1: p58 start 1 is beyond EOD, truncated [ 991.983618] loop1: p59 start 1 is beyond EOD, truncated 14:40:04 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:04 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3, &(0x7f0000000700)=0x80) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:04 executing program 1: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000700)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:04 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:40:04 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:40:04 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3, &(0x7f0000000700)=0x80) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 991.983636] loop1: p60 start 1 is beyond EOD, truncated [ 991.983651] loop1: p61 start 1 is beyond EOD, truncated [ 991.983693] loop1: p62 start 1 is beyond EOD, truncated [ 991.983778] loop1: p63 start 1 is beyond EOD, truncated [ 991.983798] loop1: p64 start 1 is beyond EOD, truncated [ 991.983837] loop1: p65 start 1 is beyond EOD, truncated [ 991.983910] loop1: p66 start 1 is beyond EOD, truncated [ 991.983932] loop1: p67 start 1 is beyond EOD, truncated [ 991.983971] loop1: p68 start 1 is beyond EOD, truncated [ 991.984017] loop1: p69 start 1 is beyond EOD, truncated [ 991.984038] loop1: p70 start 1 is beyond EOD, truncated [ 991.984120] loop1: p71 start 1 is beyond EOD, truncated [ 991.984140] loop1: p72 start 1 is beyond EOD, truncated [ 991.984160] loop1: p73 start 1 is beyond EOD, truncated [ 991.984181] loop1: p74 start 1 is beyond EOD, truncated [ 991.984220] loop1: p75 start 1 is beyond EOD, truncated [ 991.984267] loop1: p76 start 1 is beyond EOD, truncated [ 991.984288] loop1: p77 start 1 is beyond EOD, [ 991.984531] loop3: p12 start 1 is beyond EOD, truncated [ 991.984551] loop3: p13 start 1 is beyond EOD, truncated [ 991.984571] loop3: p14 start 1 is beyond EOD, truncated [ 991.984586] loop3: p15 start 1 is beyond EOD, truncated ** 40 printk messages dropped ** [ 991.986598] loop3: p56 start 1 is beyond EOD, truncated ** 281 printk messages dropped ** [ 992.000683] loop3: p251 start 1 is beyond EOD, truncated ** 141 printk messages dropped ** [ 992.119672] loop2: p20 start 1 is beyond EOD, truncated ** 817 printk messages dropped ** [ 992.660658] loop3: p57 start 1 is beyond EOD, truncated ** 22 printk messages dropped ** [ 992.661125] loop3: p80 start 1 is beyond EOD, truncated [ 992.661145] loop3: p81 start 1 is beyond EOD, truncated [ 992.661165] loop3: p82 start 1 is beyond EOD, truncated [ 992.661185] loop3: p83 start 1 is beyond EOD, truncated [ 992.661204] loop3: p84 start 1 is beyond EOD, truncated [ 992.661225] loop3: p85 start 1 is beyond EOD, truncated [ 992.661244] loop3: p86 start 1 is beyond EOD, truncated [ 992.661278] loop3: p87 start 1 is beyond EOD, truncated [ 992.661411] loop3: p88 start 1 is beyond EOD, truncated [ 992.661466] loop3: p89 start 1 is beyond EOD, truncated [ 992.661514] loop3: p90 start 1 is beyond EOD, truncated 14:40:05 executing program 3: getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3, &(0x7f0000000700)=0x80) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 992.661553] loop3: p91 start 1 is beyond EOD, truncated 14:40:05 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:40:05 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 992.661575] loop3: p92 start 1 is beyond EOD, truncated [ 992.661615] loop3: p93 start 1 is beyond EOD, truncated 14:40:05 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3, &(0x7f0000000700)=0x80) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:05 executing program 1: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000700)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 992.661643] loop3: p94 start 1 is beyond EOD, truncated [ 992.661663] loop3: p95 start 1 is beyond EOD, truncated [ 992.661684] loop3: p96 start 1 is beyond EOD, truncated [ 992.661723] loop3: p97 start 1 is beyond EOD, truncated [ 992.661812] loop3: p98 start 1 is beyond EOD, truncated [ 992.661831] loop3: p99 start 1 is beyond EOD, truncated [ 992.661872] loop3: p100 start 1 is beyond EOD, truncated ** 370 printk messages dropped ** [ 992.665452] loop5: p105 start 1 is beyond EOD, truncated ** 62 printk messages dropped ** [ 992.666101] loop5: p125 start 1 is beyond EOD, ** 25 printk messages dropped ** [ 992.666329] loop3: p229 start 1 is beyond EOD, ** 362 printk messages dropped ** [ 992.895400] loop0: p161 start 1 is beyond EOD, truncated ** 311 printk messages dropped ** [ 993.222119] loop3: p209 start 1 is beyond EOD, truncated ** 199 printk messages dropped ** [ 993.262865] loop2: p65 start 1 is beyond EOD, truncated 14:40:05 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ** 96 printk messages dropped ** [ 993.267293] loop4: p118 start 1 is beyond EOD, truncated [ 993.267334] loop4: p119 start 1 is beyond EOD, truncated [ 993.267357] loop4: p120 start 1 is beyond EOD, truncated [ 993.267383] loop4: p121 start 1 is beyond EOD, truncated [ 993.267397] loop4: p122 start 1 is beyond EOD, truncated [ 993.267423] loop4: p123 start 1 is beyond EOD, truncated [ 993.267437] loop4: p124 start 1 is beyond EOD, truncated [ 993.267463] loop4: p125 start 1 is beyond EOD, truncated [ 993.267477] loop4: p126 start 1 is beyond EOD, truncated [ 993.267503] loop4: p127 start 1 is beyond EOD, truncated [ 993.267517] loop4: p128 start 1 is beyond EOD, truncated [ 993.267543] loop4: p129 start 1 is beyond EOD, truncated [ 993.267557] loop4: p130 start 1 is beyond EOD, truncated [ 993.267626] loop4: p131 start 1 is beyond EOD, truncated [ 993.267652] loop4: p132 start 1 is beyond EOD, truncated [ 993.267666] loop4: p133 start 1 is beyond EOD, truncated [ 993.267692] loop4: p134 start 1 is beyond EOD, truncated [ 993.267706] loop4: p135 start 1 is beyond EOD, truncated [ 993.267732] loop4: p136 start 1 is beyond EOD, truncated [ 993.267746] loop4: p137 start 1 is beyond EOD, truncated [ 993.267811] loop4: p138 start 1 is beyond EOD, truncated [ 993.267862] loop4: p139 start 1 is beyond EOD, truncated ** 16 printk messages dropped ** [ 993.269641] loop2: p133 start 1 is beyond EOD, truncated ** 133 printk messages dropped ** [ 993.276745] loop2: p170 start 1 is beyond EOD, truncated ** 128 printk messages dropped ** [ 993.281105] truncated [ 993.281117] truncated [ 993.281124] loop4: p237 start 1 is beyond EOD, truncated ** 294 printk messages dropped ** [ 993.295252] loop5: p175 start 1 is beyond EOD, truncated [ 993.295272] loop5: p176 start 1 is beyond EOD, truncated [ 993.295292] loop5: p177 start 1 is beyond EOD, truncated [ 993.295312] loop5: p178 start 1 is beyond EOD, truncated [ 993.295332] loop5: p179 start 1 is beyond EOD, truncated [ 993.295352] loop5: p180 start 1 is beyond EOD, truncated [ 993.295372] loop5: p181 start 1 is beyond EOD, truncated [ 993.295392] loop5: p182 start 1 is beyond EOD, truncated [ 993.295412] loop5: p183 start 1 is beyond EOD, [ 993.299402] truncated [ 993.299422] loop1: p82 start 1 is beyond EOD, truncated [ 993.299481] loop1: p83 start 1 is beyond EOD, truncated [ 993.299500] loop1: p84 start 1 is beyond EOD, truncated [ 993.299519] loop1: p85 start 1 is beyond EOD, truncated [ 993.299570] loop1: p86 start 1 is beyond EOD, truncated [ 993.299589] loop1: p87 start 1 is beyond EOD, truncated [ 993.299632] loop1: p88 start 1 is beyond EOD, truncated [ 993.299650] loop1: p89 start 1 is beyond EOD, truncated [ 993.299665] loop1: p90 start 1 is beyond EOD, truncated 14:40:06 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:06 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:06 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:40:06 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x0, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:06 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) 14:40:06 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 993.299722] loop1: p91 start 1 is beyond EOD, truncated [ 993.299740] loop1: p92 start 1 is beyond EOD, truncated [ 993.299759] loop1: p93 start 1 is beyond EOD, truncated [ 993.299800] loop1: p94 start 1 is beyond EOD, truncated [ 993.299816] loop1: p95 start 1 is beyond EOD, truncated [ 993.299861] loop1: p96 start 1 is beyond EOD, truncated [ 993.299879] loop1: p97 start 1 is beyond EOD, truncated [ 993.299921] loop1: p98 start 1 is beyond EOD, truncated [ 993.299940] loop1: p99 start 1 is beyond EOD, truncated [ 993.299960] loop1: p100 start 1 is beyond EOD, truncated [ 993.299993] loop1: p101 start 1 is beyond EOD, truncated [ 993.300111] truncated [ 993.300130] loop5: p184 start 1 is beyond EOD, truncated [ 993.300169] loop5: p185 start 1 is beyond EOD, truncated [ 993.300217] loop5: p186 start 1 is beyond EOD, truncated [ 993.300256] loop5: p187 start 1 is beyond EOD, truncated [ 993.300277] loop5: p188 start 1 is beyond EOD, truncated ** 19 printk messages dropped ** [ 993.300825] loop5: p208 start 1 is beyond EOD, truncated ** 258 printk messages dropped ** [ 993.794200] loop3: p35 start 1 is beyond EOD, truncated ** 540 printk messages dropped ** [ 993.899265] loop5: p53 start 1 is beyond EOD, truncated ** 487 printk messages dropped ** [ 993.945225] loop1: p60 start 1 is beyond EOD, truncated ** 55 printk messages dropped ** [ 993.949660] loop4: p209 start 1 is beyond EOD, 14:40:06 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x0, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 993.949666] truncated [ 993.949673] truncated [ 993.949681] loop4: p210 start 1 is beyond EOD, truncated [ 993.949702] loop4: p211 start 1 is beyond EOD, [ 993.949710] loop1: p109 start 1 is beyond EOD, [ 993.949714] truncated [ 993.949726] truncated [ 993.949742] loop4: p212 start 1 is beyond EOD, truncated 14:40:06 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 993.949774] loop4: p213 start 1 is beyond EOD, truncated [ 993.949800] loop4: p214 start 1 is beyond EOD, truncated [ 993.949821] loop4: p215 start 1 is beyond EOD, truncated [ 993.949842] loop4: p216 start 1 is beyond EOD, truncated [ 993.949882] loop4: p217 start 1 is beyond EOD, truncated [ 993.949903] loop4: p218 start 1 is beyond EOD, truncated [ 993.949933] loop4: p219 start 1 is beyond EOD, truncated [ 993.949954] loop4: p220 start 1 is beyond EOD, truncated [ 993.949975] loop4: p221 start 1 is beyond EOD, truncated [ 993.950262] loop4: p222 start 1 is beyond EOD, truncated 14:40:06 executing program 5: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3, &(0x7f0000000700)=0x80) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 993.950310] loop4: p223 start 1 is beyond EOD, truncated 14:40:06 executing program 3: r0 = memfd_create(&(0x7f00000000c0)="00000600000000000000", 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x10, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=@deltaction={0x2c, 0x30, 0x301, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x1, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}]}]}, 0x2c}}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:40:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x6, 0xf087}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000100), 0x1042b) sendto(r0, &(0x7f00000001c0)="d8", 0x1, 0x0, 0x0, 0x0) [ 993.950329] loop4: p224 start 1 is beyond EOD, truncated [ 993.950411] loop4: p225 start 1 is beyond EOD, truncated 14:40:06 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x1ff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 993.950431] loop4: p226 start 1 is beyond EOD, truncated [ 993.950451] loop4: p227 start 1 is beyond EOD, truncated [ 993.950471] loop4: p228 start 1 is beyond EOD, truncated ** 37 printk messages dropped ** [ 993.953528] loop1: p120 start 1 is beyond EOD, truncated ** 198 printk messages dropped ** [ 994.345297] loop3: p61 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 994.345378] loop3: p63 start 1 is beyond EOD, truncated ** 17 printk messages dropped ** [ 994.345839] loop3: p81 start 1 is beyond EOD, truncated ** 51 printk messages dropped ** [ 994.347249] loop3: p133 start 1 is beyond EOD, truncated ** 383 printk messages dropped ** [ 994.691706] loop5: p1 start 1 is beyond EOD, truncated ** 5 printk messages dropped ** [ 994.699261] loop2: p3 start 201 is beyond EOD, truncated [ 994.699301] loop2: p4 start 301 is beyond EOD, truncated [ 994.699341] loop2: p5 start 1 is beyond EOD, truncated [ 994.699381] loop2: p6 start 1 is beyond EOD, truncated [ 994.699400] loop2: p7 start 1 is beyond EOD, truncated [ 994.699420] loop2: p8 start 1 is beyond EOD, truncated [ 994.699449] loop2: p9 start 1 is beyond EOD, truncated [ 994.699470] loop2: p10 start 1 is beyond EOD, truncated [ 994.699490] loop2: p11 start 1 is beyond EOD, truncated [ 994.699510] loop2: p12 start 1 is beyond EOD, truncated [ 994.700849] loop2: p13 start 1 is beyond EOD, truncated [ 994.700890] loop2: p14 start 1 is beyond EOD, truncated [ 994.700909] loop2: p15 start 1 is beyond EOD, truncated [ 994.700970] loop2: p16 start 1 is beyond EOD, truncated [ 994.700990] loop2: p17 start 1 is beyond EOD, truncated [ 994.701011] loop2: p18 start 1 is beyond EOD, truncated [ 994.701032] loop2: p19 start 1 is beyond EOD, truncated [ 994.701073] loop2: p20 start 1 is beyond EOD, truncated [ 994.701094] loop2: p21 start 1 is beyond EOD, truncated [ 994.701121] loop2: p22 start 1 is beyond EOD, truncated [ 994.701967] loop2: p23 start 1 is beyond EOD, truncated [ 994.701987] loop2: p24 start 1 is beyond EOD, truncated 14:40:07 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:07 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000080)) 14:40:07 executing program 3: r0 = memfd_create(&(0x7f00000000c0)="00000600000000000000", 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x10, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=@deltaction={0x2c, 0x30, 0x301, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x1, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}]}]}, 0x2c}}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:40:07 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001380)=ANY=[], 0xffffffe0) rename(0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)) 14:40:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 14:40:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000540)={"00ac720000000000ec973f820f7c4000", 0x102}) readv(r0, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/12, 0xc}], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 994.702007] loop2: p25 start 1 is beyond EOD, truncated [ 994.702026] loop2: p26 start 1 is beyond EOD, truncated [ 994.702072] loop2: p27 start 1 is beyond EOD, truncated ** 235 printk messages dropped ** [ 994.725232] loop5: p36 start 1 is beyond EOD, [ 994.725582] truncated [ 994.725590] loop4: p5 start 1 is beyond EOD, truncated [ 994.725609] loop4: p6 start 1 is beyond EOD, truncated 14:40:07 executing program 4: r0 = socket(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) 14:40:07 executing program 3: r0 = memfd_create(&(0x7f0000000040)='vmnet0%security}}eth0)-nodevmd5sum:user:\x00', 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 994.726031] loop4: p7 start 1 is beyond EOD, truncated 14:40:07 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") bind(r0, &(0x7f00000002c0)=@in={0x2, 0x4e20}, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gretap0\x00', 0x349) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x2, 0x18004e20, @multicast1}, 0x10) [ 994.726052] loop4: p8 start 1 is beyond EOD, truncated [ 994.726073] loop4: p9 start 1 is beyond EOD, truncated 14:40:07 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x800) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast2, @loopback}, &(0x7f0000000280)=0xc) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r0, r1, 0x0, 0x10000) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000580), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000400)=@req3={0x1000, 0x0, 0x80000000, 0x0, 0x0, 0x1, 0x80000000}, 0x1c) open$dir(0x0, 0x6c400, 0x0) 14:40:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'veth0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_ADDRESS={0x14, 0x1, @local}]}, 0x2c}}, 0x0) [ 994.726094] loop4: p10 start 1 is beyond EOD, truncated [ 994.726113] loop4: p11 start 1 is beyond EOD, truncated [ 994.726133] loop4: p12 start 1 is beyond EOD, truncated [ 994.726153] loop4: p13 start 1 is beyond EOD, truncated [ 994.726172] loop4: p14 start 1 is beyond EOD, truncated [ 994.726191] loop4: p15 start 1 is beyond EOD, truncated [ 994.726252] loop4: p16 start 1 is beyond EOD, truncated [ 994.726271] loop4: p17 start 1 is beyond EOD, truncated [ 994.726313] loop4: p18 start 1 is beyond EOD, truncated [ 994.726332] loop4: p19 start 1 is beyond EOD, truncated 14:40:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000027c0)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x0, {0x0, 0x4}}) [ 994.726351] loop4: p20 start 1 is beyond EOD, [ 994.726684] truncated [ 994.726711] loop2: p223 start 1 is beyond EOD, truncated [ 994.726731] loop2: p224 start 1 is beyond EOD, truncated [ 994.726750] loop2: p225 start 1 is beyond EOD, [ 994.726754] truncated [ 994.726762] loop5: p37 start 1 is beyond EOD, [ 994.726763] truncated [ 994.726773] truncated [ 994.726781] loop5: p38 start 1 is beyond EOD, [ 994.726789] loop2: p226 start 1 is beyond EOD, [ 994.726792] truncated [ 994.726801] loop5: p39 start 1 is beyond EOD, [ 994.726805] truncated [ 994.726812] truncated [ 994.726820] loop5: p40 start 1 is beyond EOD, [ 994.726830] loop2: p227 start 1 is beyond EOD, [ 994.726831] truncated [ 994.726840] loop5: p41 start 1 is beyond EOD, [ 994.726841] truncated [ 994.726849] loop2: p228 start 1 is beyond EOD, [ 994.726860] truncated [ 994.726868] truncated [ 994.726882] loop5: p42 start 1 is beyond EOD, [ 994.726890] loop2: p229 start 1 is beyond EOD, [ 994.726893] truncated [ 994.726901] loop5: p43 start 1 is beyond EOD, [ 994.726902] truncated [ 994.726910] loop2: p230 start 1 is beyond EOD, [ 994.726912] truncated [ 994.726920] loop5: p44 start 1 is beyond EOD, [ 994.726921] truncated [ 994.726929] loop2: p231 start 1 is beyond EOD, [ 994.726940] truncated [ 994.726948] truncated [ 994.726962] loop5: p45 start 1 is beyond EOD, [ 994.726970] loop2: p232 start 1 is beyond EOD, [ 994.726973] truncated [ 994.726981] loop5: p46 start 1 is beyond EOD, [ 994.726982] truncated [ 994.726990] loop2: p233 start 1 is beyond EOD, [ 994.726992] truncated [ 994.727000] loop5: p47 start 1 is beyond EOD, [ 994.727002] truncated [ 994.727010] loop2: p234 start 1 is beyond EOD, [ 994.727012] truncated [ 994.727019] loop5: p48 start 1 is beyond EOD, [ 994.727021] truncated [ 994.727029] loop2: p235 start 1 is beyond EOD, [ 994.727039] truncated [ 994.727048] truncated [ 994.727060] loop5: p49 start 1 is beyond EOD, [ 994.727070] loop2: p236 start 1 is beyond EOD, [ 994.727080] truncated [ 994.727093] loop5: p50 start 1 is beyond EOD, truncated [ 994.727120] loop5: p51 start 1 is beyond EOD, truncated ** 268 printk messages dropped ** [ 994.741148] loop5: p101 start 1 is beyond EOD, [ 994.741157] truncated [ 994.741160] truncated [ 994.741168] loop5: p102 start 1 is beyond EOD, [ 994.741179] loop1: p59 start 1 is beyond EOD, truncated [ 994.741198] loop1: p60 start 1 is beyond EOD, truncated [ 994.741217] loop1: p61 start 1 is beyond EOD, truncated [ 994.741235] loop1: p62 start 1 is beyond EOD, [ 994.741241] truncated [ 994.741252] truncated 14:40:07 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYPTR64], 0x1}], 0x1, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) 14:40:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca0403b3c6da327afe21720024881def9fa15ec15bb0cb39374f19d63b357936a748e0bb2099ec2a79035bec4a89224cf37c93b534a5348ee94ba3f5f55fa92acaf8e0061598d802fcdc1f7253969a3278154696f42eaf07c89aacdfb016fcb0485a72fc2cdfd7d72f132ff82028a47b61d4dd4d1201d87bd883f74ac1710e05a8fe598dbd94c78adc2ad0e9ae6cb911691b61feaf07539d17c2b05a608dc1f71011c10c92f7faae952e304f0b6c94f754b11e416c4df32f5ca6c0caa6070ee04bfd47adf2f90843fc143b52d2ff50e63ea46a2677baf1df09e67c0768ee6382a8de5dc91eb5552dbd3ba7647b47efc8dc6c9de913710ad2314e3e94a2f9193c5fc3120474261c4914925707530c3a41ec98741aa30fabd70fc38cc57c6707bead0cf24b369f8989b366507b6a261842c727efa97032314f09626954d357374b42fee36fafd448fd0836bea7397b2ac03dff44372e987316fdacf8477befe768dc1505eb58bdb052a5eb3ab1a79014008c8ab55b3ea432beba4434f5199fc6f3b08934cc3fb4cc62b7a733826030153750fa61bbf0dbc1cdfef66ef77aa047c04b9ceb80ff0b99959fdeeaec0e3838dced78e9f12f997bcd992ef36baff4de252999d00406a379272912bab80fbecbd334eb4b844c66c0018312dc20ccb52f36dc84ba4c3876fe9f5b49f39e49e9348f38bcfb4a77a36790971c41c0ed554ebf03c145336e77bca86fcce945c43075d583233b2c36ff471d140ff8b4d91b33ad13540f5f2cffe0ced42839848a13cbc66f1d7393f01a8fe63b37619665d1c98bc1ae09fa9dcc642f2047a555bc8aab2ebfc00b13b902494b139ebe4b96026bf5c441b30b11611371386fac1ccf99df87093bd6609b24f7e7a1bfc175e720c7bb496c45d6f42acfacc216307f7f3bebb96f443e68717442b6ae5a9c29e10a5be02f30007653c9debdaa1e69c28d15d3bfd69232dfafae13622f4cbe9a030ae880375f7415d10770aae1c8271393546f40fa07e6e205de1f52ab215d7c2a1dc474d28e79081913f19c2c53fc8b8d86c699523e836a548c1315610ca4542b0ae145a1fac88d417252fdbec86b4d2d824ca2702102b18062a7194e2f96904dd210c1d2cbd12d253f4243324f61cbb42a0271527d7b871a1ddee9b55030a173ed9573a5cce7924946474c21e39bdddd559aa5f85e981d6ca79e967d5edb484ed6c70bf1d1c57f3ad64b5ede6ba51158d044578d395c561abd382335c5342883d6588d94fb860c0025adab4df23b2c9c00638fe33816b609267ad80e2b6b04d6b7872db753b3ed3dba724bec6c02d5a40cca99e074682f0fc6e0db69a265e5b2757dafd5db7d8a9d5f00b94e6afe662b180b750bedbbb3ba03c52bee15be40b259471fca2fd32696d241d6f9dea3beac4054146e334969e4dae0ef929a4b762bd44612353dbe8275ed21b3f34bf9b38d64e7cfbd8aebf826bd40eb2cb2331b410ca7753c40250954fa8ad12c09e7a54e18a645ad1e501d93e540c6560e702e80e360def60ccab4fd18bc3a33a9ef798aa77ccd30a0175e35b1d6df6963a489322b149d673d920695294f0e6267a4a078c4ab4b2e2cfefb7e81f45f6dd7207e2c8b7e57ac9d988856fa8c0c4c6e49be3c4f9dc7aa078f76268f0be9e2af88a0fe658b243ded33b3836d559a1fb480278f82e546eec2666def860686e9abb898d80f018edb937f7a902238194a16be357e91fd86eaab3c19ae9446a27810dfe586f2d354e251c4afdd89af87421f943d7b9e12b6640897459bd988ef31960784c8072184456fa99d33c3978a0dfc5dd88bfe941da4681d6e31894f5100b2e6fdbd75e51f2f32a0bc00976721b453c5c670b04ca27c23232be7734c35f2898512c3138c78d42626693084826d195299fdb4467db31c79761e40112d1e47d8fe1b846bec1dc7f92d59d088af95a7d4b0d10b7ece85bf6aef12693c429e3df8f7f27289857e16005a233ac1c526afcfa2d4a82ffdd0d52724b3a635e4415d7c0fbcacd1c24294919ad8bd6edc2dcc7e8c66f5980b8483d50a9f5b2204d2f9fbfccffd578dd718b342a1443be5e4f18fbc10691c678ec837ea9a37c8456dde7e3f420bd61e918270b83c3f5c3f9495b33c7be6ea81b78df808cdd55862beb2ad246bf402cbc90918f6d4ff0d24755c346cac9093a101f8ae9eb863139e012c73e10f4e09ae69f822f2bace32429dbbff181115c9eaf00deae55ac0c5c2563672947820b7d016d15049b9fe294a4613954832521727fbac1d900b441174140864c9c5d1fb58b2f0dbfbec0b62c4216a408b8b7f6c3aaaa8b3f153161173dc48daf0f2ddb3f30ac6e573430df30d6ea7259e460a19cf329c661dee097b871b351ffd22b8090df3dd9fdb22cb636f18eb4df69a63299ff3e2acf0d08a944e46907007be920a3672c215dc9fc8aa3066399d9b7494a8a2bc0416aec022389a52bb110ee99ce773132c61c04095c3d591dc273d7b91a99ec99911e7dfcc4b4522431d543ae1710ebfa4c0ac8c3b2af2827233d4b4edda49b98c7086e65b05930d2014cc44bb92217c9578282fdb9c2ce817eba860a14c8f9914353ca14f14d4baad9be49f03e91ecc42d199c3e3704d0476cbb01016326e351f6995e59287197cdc1b1a103a749b6d6a55bbc3cfdb9b8211653d55c46618fd1a0e4a2c755ab4c5d3503d4900648c6adc486ff1ea7e3228300ea161a32a55702de9115bb75928fff82d3761599792a359c3d04e738be8a16ecf1db16935bc2a6c54bd1c33f881b7f1ea687a06504667ec0f05c058392af51a4141123c6090f5ddb12845dc0a486d5f318f0efe1926b9bd5e3ae982e75f49225ee6b71899b7483b501466767a05320eebe3e94c54ec335a33eaa54ea97912a0cf844ad2edf59294af5f07ae3ffdeb7d6f03d10b7bb1616dce11ca2140ea859ddd2536602320eab4801360f821090a67562db436c0dd1209cc717bfe8fa9696ee917ca8985a0abc54b9f6f1b462e00b29b36a413e2fc784d153e95f2b7fc75b048c7aba3db76941b090e1fd76dddc8f6f2758c5e72cf101f0dc8185fb8f86fc4ec615312eb559954c2a32fb7add4699bc486c219744126c077a30f8402a03c95405f8a7981933ec1e9cf145fe8a0f0053794efacc1e8ad066841c87ff819ecf87c75e7e741faef1ade631bd2cb1572d00b341fc6306b56da50f53638e979f093fd789a28cd4cc320da4c43640a0394691f809fc0268d95e81773dfcae593f17f04864712eb47cedf4b0375399cef0982a78e1654085fb8a8704f27b1dfa5378919e4977aad38b5771c8f3402bb93a697abc7c21dd4374c4b74c1a923cdb3e532a4d2be5dd5897723f1ac3ec744b1ec87c324f93c9845456b72d7da990ec8a133864f247f5c9c88e9d3fc999b86c51d8a7d8c833dc5570b0d4339eabb0456f5b39e5216d8ee0be3465caf182d3373a50ba98b653c30b7986bed8687a005b14b344bd49cf487a96090565c35969d7e7c58af5199fe14eefe947cad9ef0fb6ab156438d5855c4bf03bb5095b72333bded3c35c5764c73abd73889d04e9904f44580726cd7491ba09840ecacac8f61e9711dcb5fd232ba71a586", 0x1000) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @multicast2, @loopback}, &(0x7f0000000280)=0xfffffffffffffe09) sendfile(r0, r1, 0x0, 0x10000) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) 14:40:07 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, r0) 14:40:07 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) dup3(r0, r1, 0x0) 14:40:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x34c, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)={{0x0, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0xb}, "", [[], []]}, 0x220) [ 994.741255] loop5: p103 start 1 is beyond EOD, truncated [ 994.741276] loop1: p63 start 1 is beyond EOD, [ 994.741283] loop5: p104 start 1 is beyond EOD, [ 994.741296] truncated [ 994.741301] truncated [ 994.741314] loop5: p105 start 1 is beyond EOD, truncated [ 994.741322] loop1: p64 start 1 is beyond EOD, [ 994.741340] loop5: p106 start 1 is beyond EOD, 14:40:07 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ef, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) close(r0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={0x0}, 0x10) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) [ 994.741341] truncated [ 994.741358] loop1: p65 start 1 is beyond EOD, [ 994.741361] truncated [ 994.741369] truncated [ 994.741372] loop1: p66 start 1 is beyond EOD, [ 994.741375] loop5: p107 start 1 is beyond EOD, 14:40:07 executing program 2: [ 994.741392] truncated [ 994.741400] truncated [ 994.741420] loop5: p108 start 1 is beyond EOD, [ 994.741427] loop1: p67 start 1 is beyond EOD, [ 994.741444] truncated [ 994.741461] loop5: p109 start 1 is beyond EOD, [ 994.741466] truncated [ 994.741481] truncated [ 994.741488] loop1: p68 start 1 is beyond EOD, [ 994.741494] loop5: p110 start 1 is beyond EOD, truncated [ 994.741500] truncated [ 994.741508] loop1: p69 start 1 is beyond EOD, [ 994.741520] loop5: p111 start 1 is beyond EOD, [ 994.741522] truncated [ 994.741540] truncated [ 994.741547] loop1: p70 start 1 is beyond EOD, truncated [ 994.741567] loop1: p71 start 1 is beyond EOD, [ 994.741575] loop5: p112 start 1 is beyond EOD, truncated [ 994.741582] truncated [ 994.741602] loop5: p113 start 1 is beyond EOD, [ 994.741608] loop1: p72 start 1 is beyond EOD, [ 994.741613] truncated [ 994.741621] loop5: p114 start 1 is beyond EOD, [ 994.741622] truncated [ 994.741640] truncated [ 994.741647] loop1: p73 start 1 is beyond EOD, [ 994.741661] loop5: p115 start 1 is beyond EOD, [ 994.741662] truncated [ 994.741681] truncated [ 994.741687] loop1: p74 start 1 is beyond EOD, [ 994.741701] loop5: p116 start 1 is beyond EOD, [ 994.741706] truncated ** 188 printk messages dropped ** [ 994.746365] loop3: p3 start 201 is beyond EOD, truncated ** 99 printk messages dropped ** [ 994.748320] loop4: p152 start 1 is beyond EOD, [ 994.748328] truncated [ 994.748331] truncated [ 994.748339] loop4: p153 start 1 is beyond EOD, 14:40:08 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000001380)=ANY=[], 0xffffffe0) write$P9_RREADLINK(r0, 0x0, 0x0) 14:40:08 executing program 4: 14:40:08 executing program 2: 14:40:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x34c, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)={{0x0, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0xb}, "", [[], []]}, 0x220) [ 994.748352] loop1: p166 start 1 is beyond EOD, [ 994.748354] truncated [ 994.748372] truncated [ 994.748379] loop4: p154 start 1 is beyond EOD, [ 994.748392] loop1: p167 start 1 is beyond EOD, [ 994.748394] truncated [ 994.748412] truncated [ 994.748419] loop4: p155 start 1 is beyond EOD, [ 994.748434] loop1: p168 start 1 is beyond EOD, [ 994.748445] truncated [ 994.748462] truncated [ 994.748478] loop4: p156 start 1 is beyond EOD, [ 994.748485] loop1: p169 start 1 is beyond EOD, [ 994.748498] truncated [ 994.748502] truncated [ 994.748519] loop4: p157 start 1 is beyond EOD, [ 994.748525] loop1: p170 start 1 is beyond EOD, [ 994.748539] truncated [ 994.748542] truncated ** 13 printk messages dropped ** [ 994.749044] loop5: p164 start 1 is beyond EOD, truncated [ 994.749062] loop5: p165 start 1 is beyond EOD, truncated 14:40:08 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:08 executing program 5: 14:40:08 executing program 2: r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c1f443c123ecf719070") sendto(r0, &(0x7f00000003c0)="120000001200ff7f000000000000000e0000", 0x12, 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000001600)=""/4096, 0xfffffffffffffe35, 0x0, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80) 14:40:08 executing program 4: 14:40:08 executing program 3: 14:40:08 executing program 5: 14:40:08 executing program 3: [ 994.749098] loop5: p166 start 1 is beyond EOD, truncated [ 994.749167] loop5: p167 start 1 is beyond EOD, truncated [ 994.749186] loop5: p168 start 1 is beyond EOD, truncated [ 994.749214] loop5: p169 start 1 is beyond EOD, truncated 14:40:08 executing program 5: [ 994.749233] loop5: p170 start 1 is beyond EOD, truncated [ 994.749252] loop5: p171 start 1 is beyond EOD, truncated [ 994.749294] loop5: p172 start 1 is beyond EOD, truncated [ 994.749314] loop5: p173 start 1 is beyond EOD, truncated [ 994.749333] loop5: p174 start 1 is beyond EOD, truncated [ 994.749348] loop5: p175 start 1 is beyond EOD, truncated [ 994.749394] loop5: p176 start 1 is beyond EOD, truncated [ 994.749414] loop5: p177 start 1 is beyond EOD, truncated [ 994.749433] loop5: p178 start 1 is beyond EOD, truncated [ 994.749488] loop5: p179 start 1 is beyond EOD, truncated [ 994.749514] loop5: p180 start 1 is beyond EOD, truncated [ 994.749528] loop5: p181 start 1 is beyond EOD, truncated [ 994.749557] loop5: p182 start 1 is beyond EOD, truncated [ 994.749603] loop5: p183 start 1 is beyond EOD, truncated [ 994.749643] loop5: p184 start 1 is beyond EOD, truncated [ 994.749678] loop5: p185 start 1 is beyond EOD, truncated [ 994.749704] loop5: p186 start 1 is beyond EOD, truncated [ 994.749718] loop5: p187 start 1 is beyond EOD, truncated [ 994.749744] loop5: p188 start 1 is beyond EOD, truncated [ 994.749762] loop5: p189 start 1 is beyond EOD, truncated [ 994.749785] loop5: p190 start 1 is beyond EOD, truncated [ 994.749802] loop5: p191 start 1 is beyond EOD, truncated [ 994.749838] loop5: p192 start 1 is beyond EOD, truncated [ 994.749863] loop5: p193 start 1 is beyond EOD, truncated [ 994.749877] loop5: p194 start 1 is beyond EOD, truncated [ 994.749914] loop5: p195 start 1 is beyond EOD, truncated [ 994.749928] loop5: p196 start 1 is beyond EOD, truncated [ 994.749954] loop5: p197 start 1 is beyond EOD, truncated [ 994.749968] loop5: p198 start 1 is beyond EOD, [ 994.750277] truncated [ 994.750314] loop3: p11 start 1 is beyond EOD, truncated [ 994.750334] loop3: p12 start 1 is beyond EOD, truncated [ 994.750354] loop3: p13 start 1 is beyond EOD, truncated 14:40:08 executing program 1: 14:40:08 executing program 4: 14:40:08 executing program 3: 14:40:08 executing program 2: ** 237 printk messages dropped ** [ 994.758402] loop4: p251 start 1 is beyond EOD, truncated [ 994.758447] loop4: p252 start 1 is beyond EOD, truncated [ 994.758561] loop4: p253 start 1 is beyond EOD, truncated [ 994.758581] loop4: p254 start 1 is beyond EOD, truncated [ 994.758601] loop4: p255 start 1 is beyond EOD, truncated [ 994.760543] loop3: p106 start 1 is beyond EOD, truncated [ 994.760600] loop3: p107 start 1 is beyond EOD, truncated [ 994.760621] loop3: p108 start 1 is beyond EOD, truncated 14:40:08 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:08 executing program 5: 14:40:08 executing program 2: 14:40:08 executing program 3: 14:40:08 executing program 4: 14:40:08 executing program 1: [ 994.760660] loop3: p109 start 1 is beyond EOD, truncated [ 994.760679] loop3: p110 start 1 is beyond EOD, truncated [ 994.760926] loop1: p171 start 1 is beyond EOD, truncated [ 994.760944] loop1: p172 start 1 is beyond EOD, truncated [ 994.760959] loop1: p173 start 1 is beyond EOD, truncated [ 994.761005] loop1: p174 start 1 is beyond EOD, truncated [ 994.761024] loop1: p175 start 1 is beyond EOD, truncated [ 994.761069] loop1: p176 start 1 is beyond EOD, truncated 14:40:08 executing program 5: 14:40:08 executing program 2: 14:40:08 executing program 3: 14:40:08 executing program 4: 14:40:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000380)=0x404100000001, 0xfe3f) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132441) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x0, 0x2}, 0x20) setsockopt$inet_tcp_buf(r1, 0x6, 0x0, 0x0, 0x0) [ 994.761115] loop1: p177 start 1 is beyond EOD, truncated [ 994.761136] loop1: p178 start 1 is beyond EOD, truncated [ 994.761189] loop1: p179 start 1 is beyond EOD, truncated [ 994.761236] loop1: p180 start 1 is beyond EOD, truncated 14:40:08 executing program 5: [ 994.761274] loop1: p181 start 1 is beyond EOD, truncated [ 994.761295] loop1: p182 start 1 is beyond EOD, truncated [ 994.761316] loop1: p183 start 1 is beyond EOD, truncated [ 994.761335] loop1: p184 start 1 is beyond EOD, truncated [ 994.761356] loop1: p185 start 1 is beyond EOD, truncated [ 994.761375] loop1: p186 start 1 is beyond EOD, truncated [ 994.761395] loop1: p187 start 1 is beyond EOD, truncated [ 994.761414] loop1: p188 start 1 is beyond EOD, truncated [ 994.761429] loop1: p189 start 1 is beyond EOD, truncated [ 994.761474] loop1: p190 start 1 is beyond EOD, truncated [ 994.761494] loop1: p191 start 1 is beyond EOD, truncated [ 994.761514] loop1: p192 start 1 is beyond EOD, truncated [ 994.761535] loop1: p193 start 1 is beyond EOD, truncated [ 994.761555] loop1: p194 start 1 is beyond EOD, truncated [ 994.761574] loop1: p195 start 1 is beyond EOD, truncated [ 994.761635] loop1: p196 start 1 is beyond EOD, truncated [ 994.761653] loop1: p197 start 1 is beyond EOD, truncated [ 994.761694] loop1: p198 start 1 is beyond EOD, truncated [ 994.761709] loop1: p199 start 1 is beyond EOD, truncated [ 994.761735] loop1: p200 start 1 is beyond EOD, truncated ** 39 printk messages dropped ** [ 994.766000] loop1: p240 start 1 is beyond EOD, truncated ** 184 printk messages dropped ** [ 995.245855] loop2: p9 start 1 is beyond EOD, truncated [ 995.245891] loop2: p10 start 1 is beyond EOD, truncated [ 995.245958] loop2: p11 start 1 is beyond EOD, truncated [ 995.245978] loop2: p12 start 1 is beyond EOD, truncated [ 995.245998] loop2: p13 start 1 is beyond EOD, truncated [ 995.246075] loop2: p14 start 1 is beyond EOD, truncated [ 995.246113] loop2: p15 start 1 is beyond EOD, truncated [ 995.246132] loop2: p16 start 1 is beyond EOD, truncated [ 995.246153] loop2: p17 start 1 is beyond EOD, truncated [ 995.246172] loop2: p18 start 1 is beyond EOD, truncated [ 995.246192] loop2: p19 start 1 is beyond EOD, truncated [ 995.246207] loop2: p20 start 1 is beyond EOD, truncated [ 995.246273] loop2: p21 start 1 is beyond EOD, truncated [ 995.246292] loop2: p22 start 1 is beyond EOD, truncated 14:40:09 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:09 executing program 3: 14:40:09 executing program 4: 14:40:09 executing program 2: 14:40:09 executing program 1: 14:40:09 executing program 5: [ 995.246312] loop2: p23 start 1 is beyond EOD, truncated [ 995.246327] loop2: p24 start 1 is beyond EOD, truncated [ 995.246347] loop2: p25 start 1 is beyond EOD, truncated [ 995.246529] loop2: p26 start 1 is beyond EOD, truncated [ 995.246554] loop2: p27 start 1 is beyond EOD, truncated [ 995.246574] loop2: p28 start 1 is beyond EOD, truncated [ 995.246594] loop2: p29 start 1 is beyond EOD, truncated 14:40:09 executing program 3: 14:40:09 executing program 1: 14:40:09 executing program 4: 14:40:09 executing program 2: 14:40:09 executing program 5: [ 995.246614] loop2: p30 start 1 is beyond EOD, truncated [ 995.246634] loop2: p31 start 1 is beyond EOD, truncated [ 995.246655] loop2: p32 start 1 is beyond EOD, truncated 14:40:09 executing program 3: [ 995.246695] loop2: p33 start 1 is beyond EOD, truncated [ 995.255025] loop2: p34 start 1 is beyond EOD, truncated [ 995.255046] loop2: p35 start 1 is beyond EOD, truncated [ 995.255085] loop2: p36 start 1 is beyond EOD, truncated [ 995.255105] loop2: p37 start 1 is beyond EOD, truncated [ 995.255125] loop2: p38 start 1 is beyond EOD, truncated [ 995.255145] loop2: p39 start 1 is beyond EOD, truncated [ 995.255333] loop2: p40 start 1 is beyond EOD, truncated [ 995.255354] loop2: p41 start 1 is beyond EOD, truncated [ 995.255405] loop2: p42 start 1 is beyond EOD, truncated [ 995.255460] loop2: p43 start 1 is beyond EOD, truncated [ 995.255480] loop2: p44 start 1 is beyond EOD, truncated [ 995.255500] loop2: p45 start 1 is beyond EOD, truncated ** 214 printk messages dropped ** [ 995.328883] netlink: 16 bytes leftover after parsing attributes in process `syz-executor3'. [ 995.343525] loop1: p3 start 201 is beyond EOD, truncated [ 995.343602] loop1: p4 start 301 is beyond EOD, truncated [ 995.343624] loop1: p5 start 1 is beyond EOD, truncated [ 995.343655] loop1: p6 start 1 is beyond EOD, truncated [ 995.343676] loop1: p7 start 1 is beyond EOD, truncated [ 995.343724] loop1: p8 start 1 is beyond EOD, truncated [ 995.343784] loop1: p9 start 1 is beyond EOD, truncated [ 995.343824] loop1: p10 start 1 is beyond EOD, truncated [ 995.343845] loop1: p11 start 1 is beyond EOD, truncated [ 995.343876] loop1: p12 start 1 is beyond EOD, truncated [ 995.343917] loop1: p13 start 1 is beyond EOD, truncated 14:40:09 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:09 executing program 1: 14:40:09 executing program 5: 14:40:09 executing program 2: 14:40:09 executing program 4: 14:40:09 executing program 3: 14:40:09 executing program 2: 14:40:09 executing program 4: [ 995.343963] loop1: p14 start 1 is beyond EOD, truncated [ 995.344001] loop1: p15 start 1 is beyond EOD, truncated [ 995.344084] loop1: p16 start 1 is beyond EOD, truncated [ 995.344116] loop1: p17 start 1 is beyond EOD, truncated [ 995.344154] loop1: p18 start 1 is beyond EOD, truncated [ 995.347682] loop1: p19 start 1 is beyond EOD, truncated [ 995.347785] loop1: p20 start 1 is beyond EOD, truncated 14:40:09 executing program 4: [ 995.347816] loop1: p21 start 1 is beyond EOD, truncated 14:40:09 executing program 1: 14:40:09 executing program 3: 14:40:09 executing program 5: [ 995.347837] loop1: p22 start 1 is beyond EOD, truncated [ 995.347905] loop1: p23 start 1 is beyond EOD, truncated [ 995.347944] loop1: p24 start 1 is beyond EOD, truncated [ 995.347963] loop1: p25 start 1 is beyond EOD, truncated [ 995.347984] loop1: p26 start 1 is beyond EOD, truncated [ 995.348023] loop1: p27 start 1 is beyond EOD, truncated [ 995.348064] loop1: p28 start 1 is beyond EOD, truncated [ 995.348085] loop1: p29 start 1 is beyond EOD, truncated [ 995.348126] loop1: p30 start 1 is beyond EOD, truncated [ 995.348157] loop1: p31 start 1 is beyond EOD, truncated [ 995.348195] loop1: p32 start 1 is beyond EOD, truncated [ 995.348223] loop1: p33 start 1 is beyond EOD, truncated [ 995.348243] loop1: p34 start 1 is beyond EOD, truncated [ 995.348263] loop1: p35 start 1 is beyond EOD, truncated [ 995.348284] loop1: p36 start 1 is beyond EOD, truncated ** 226 printk messages dropped ** [ 995.384206] loop5: p7 start 1 is beyond EOD, truncated [ 995.384226] loop5: p8 start 1 is beyond EOD, truncated [ 995.384241] loop5: p9 start 1 is beyond EOD, truncated [ 995.384287] loop5: p10 start 1 is beyond EOD, truncated [ 995.384306] loop5: p11 start 1 is beyond EOD, truncated [ 995.384325] loop5: p12 start 1 is beyond EOD, truncated 14:40:09 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:09 executing program 2: 14:40:09 executing program 3: 14:40:09 executing program 1: 14:40:09 executing program 4: 14:40:09 executing program 5: [ 995.384367] loop5: p13 start 1 is beyond EOD, truncated [ 995.384409] loop5: p14 start 1 is beyond EOD, truncated [ 995.384439] loop5: p15 start 1 is beyond EOD, truncated [ 995.384458] loop5: p16 start 1 is beyond EOD, truncated [ 995.384477] loop5: p17 start 1 is beyond EOD, truncated [ 995.384500] loop5: p18 start 1 is beyond EOD, truncated [ 995.384528] loop5: p19 start 1 is beyond EOD, truncated 14:40:09 executing program 1: 14:40:09 executing program 4: 14:40:09 executing program 2: 14:40:09 executing program 3: [ 995.384556] loop5: p20 start 1 is beyond EOD, truncated [ 995.384575] loop5: p21 start 1 is beyond EOD, truncated [ 995.384616] loop5: p22 start 1 is beyond EOD, truncated 14:40:09 executing program 5: 14:40:09 executing program 1: [ 995.384635] loop5: p23 start 1 is beyond EOD, truncated [ 995.384655] loop5: p24 start 1 is beyond EOD, truncated [ 995.384676] loop5: p25 start 1 is beyond EOD, truncated [ 995.384696] loop5: p26 start 1 is beyond EOD, truncated [ 995.384716] loop5: p27 start 1 is beyond EOD, truncated [ 995.384735] loop5: p28 start 1 is beyond EOD, truncated [ 995.384799] loop5: p29 start 1 is beyond EOD, truncated [ 995.384827] loop5: p30 start 1 is beyond EOD, truncated [ 995.384845] loop5: p31 start 1 is beyond EOD, truncated [ 995.384861] loop5: p32 start 1 is beyond EOD, truncated [ 995.384906] loop5: p33 start 1 is beyond EOD, truncated [ 995.384921] loop5: p34 start 1 is beyond EOD, truncated [ 995.384956] loop5: p35 start 1 is beyond EOD, truncated [ 995.384971] loop5: p36 start 1 is beyond EOD, truncated [ 995.385015] loop5: p37 start 1 is beyond EOD, truncated [ 995.385057] loop5: p38 start 1 is beyond EOD, truncated [ 995.385076] loop5: p39 start 1 is beyond EOD, truncated [ 995.385091] loop5: p40 start 1 is beyond EOD, truncated [ 995.385136] loop5: p41 start 1 is beyond EOD, truncated [ 995.385149] loop5: p42 start 1 is beyond EOD, truncated [ 995.385176] loop5: p43 start 1 is beyond EOD, truncated [ 995.385190] loop5: p44 start 1 is beyond EOD, truncated [ 995.385227] loop5: p45 start 1 is beyond EOD, truncated [ 995.385246] loop5: p46 start 1 is beyond EOD, truncated ** 113 printk messages dropped ** [ 995.388665] loop5: p160 start 1 is beyond EOD, truncated ** 102 printk messages dropped ** [ 995.606327] loop0: p7 start 1 is beyond EOD, truncated [ 995.606333] loop0: p8 start 1 is beyond EOD, truncated [ 995.606339] loop0: p9 start 1 is beyond EOD, truncated [ 995.606345] loop0: p10 start 1 is beyond EOD, truncated [ 995.606351] loop0: p11 start 1 is beyond EOD, truncated [ 995.606357] loop0: p12 start 1 is beyond EOD, truncated [ 995.606372] loop0: p13 start 1 is beyond EOD, truncated [ 995.606378] loop0: p14 start 1 is beyond EOD, truncated [ 995.606384] loop0: p15 start 1 is beyond EOD, truncated [ 995.606389] loop0: p16 start 1 is beyond EOD, truncated [ 995.606395] loop0: p17 start 1 is beyond EOD, truncated [ 995.606401] loop0: p18 start 1 is beyond EOD, truncated [ 995.606406] loop0: p19 start 1 is beyond EOD, truncated [ 995.606412] loop0: p20 start 1 is beyond EOD, truncated [ 995.606418] loop0: p21 start 1 is beyond EOD, truncated [ 995.606423] loop0: p22 start 1 is beyond EOD, truncated [ 995.606429] loop0: p23 start 1 is beyond EOD, truncated [ 995.606435] loop0: p24 start 1 is beyond EOD, truncated [ 995.606440] loop0: p25 start 1 is beyond EOD, truncated [ 995.606446] loop0: p26 start 1 is beyond EOD, truncated [ 995.606452] loop0: p27 start 1 is beyond EOD, truncated 14:40:10 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:10 executing program 3: 14:40:10 executing program 2: 14:40:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYPTR64], 0x1}], 0x1, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) setrlimit(0x7, &(0x7f0000000100)) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x1, 0x0, 0x0) 14:40:10 executing program 1: 14:40:10 executing program 4: 14:40:10 executing program 2: [ 995.606457] loop0: p28 start 1 is beyond EOD, truncated [ 995.606463] loop0: p29 start 1 is beyond EOD, truncated [ 995.606469] loop0: p30 start 1 is beyond EOD, truncated [ 995.606474] loop0: p31 start 1 is beyond EOD, truncated [ 995.606481] loop0: p32 start 1 is beyond EOD, truncated [ 995.606486] loop0: p33 start 1 is beyond EOD, truncated 14:40:10 executing program 4: 14:40:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000015, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)) 14:40:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, 0x0, 0x0) r2 = accept(r0, 0x0, &(0x7f0000000140)=0xffffffffffffffb9) sendto$packet(r2, &(0x7f0000000040), 0x0, 0x3, 0x0, 0x0) [ 995.606492] loop0: p34 start 1 is beyond EOD, truncated 14:40:10 executing program 4: socket(0x1e, 0x5, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x29, 0x1, 0x0, 0x0, {0x1}, [@nested={0x18, 0x0, [@typed={0x6, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x19, 0xfcffffff], [], @remote}}]}]}, 0x2c}}, 0x0) 14:40:10 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x0, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 995.606497] loop0: p35 start 1 is beyond EOD, truncated [ 995.606503] loop0: p36 start 1 is beyond EOD, truncated [ 995.606508] loop0: p37 start 1 is beyond EOD, truncated [ 995.606514] loop0: p38 start 1 is beyond EOD, truncated [ 995.606520] loop0: p39 start 1 is beyond EOD, truncated [ 995.606526] loop0: p40 start 1 is beyond EOD, truncated [ 995.606532] loop0: p41 start 1 is beyond EOD, truncated [ 995.606537] loop0: p42 start 1 is beyond EOD, truncated [ 995.606543] loop0: p43 start 1 is beyond EOD, truncated [ 995.606548] loop0: p44 start 1 is beyond EOD, truncated [ 995.606554] loop0: p45 start 1 is beyond EOD, truncated [ 995.606559] loop0: p46 start 1 is beyond EOD, truncated [ 995.606565] loop0: p47 start 1 is beyond EOD, truncated [ 995.606571] loop0: p48 start 1 is beyond EOD, truncated [ 995.606576] loop0: p49 start 1 is beyond EOD, truncated [ 995.606582] loop0: p50 start 1 is beyond EOD, truncated [ 995.606588] loop0: p51 start 1 is beyond EOD, truncated [ 995.606594] loop0: p52 start 1 is beyond EOD, truncated ** 67 printk messages dropped ** [ 995.606987] loop0: p120 start 1 is beyond EOD, truncated ** 141 printk messages dropped ** [ 996.163688] loop0: p4 start 301 is beyond EOD, truncated [ 996.163695] loop0: p5 start 1 is beyond EOD, truncated [ 996.163701] loop0: p6 start 1 is beyond EOD, truncated [ 996.163708] loop0: p7 start 1 is beyond EOD, truncated [ 996.163714] loop0: p8 start 1 is beyond EOD, truncated [ 996.163721] loop0: p9 start 1 is beyond EOD, truncated [ 996.163727] loop0: p10 start 1 is beyond EOD, truncated [ 996.163733] loop0: p11 start 1 is beyond EOD, truncated [ 996.163740] loop0: p12 start 1 is beyond EOD, truncated [ 996.163747] loop0: p13 start 1 is beyond EOD, truncated [ 996.163753] loop0: p14 start 1 is beyond EOD, truncated [ 996.163759] loop0: p15 start 1 is beyond EOD, truncated [ 996.163766] loop0: p16 start 1 is beyond EOD, truncated [ 996.163773] loop0: p17 start 1 is beyond EOD, truncated [ 996.163780] loop0: p18 start 1 is beyond EOD, truncated [ 996.163787] loop0: p19 start 1 is beyond EOD, truncated [ 996.163793] loop0: p20 start 1 is beyond EOD, truncated [ 996.163800] loop0: p21 start 1 is beyond EOD, truncated [ 996.163807] loop0: p22 start 1 is beyond EOD, truncated [ 996.163814] loop0: p23 start 1 is beyond EOD, truncated 14:40:10 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYPTR64], 0x1}], 0x1, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) setrlimit(0x7, &(0x7f0000000100)) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x1, 0x0, 0x0) 14:40:10 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:10 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:40:10 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x0, 0x3}, 0x0, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 996.163833] loop0: p24 start 1 is beyond EOD, truncated ** 9 printk messages dropped ** [ 996.163892] loop0: p34 start 1 is beyond EOD, truncated ** 225 printk messages dropped ** [ 996.505481] loop0: p4 start 301 is beyond EOD, truncated [ 996.505488] loop0: p5 start 1 is beyond EOD, truncated [ 996.505494] loop0: p6 start 1 is beyond EOD, truncated [ 996.505501] loop0: p7 start 1 is beyond EOD, truncated [ 996.505508] loop0: p8 start 1 is beyond EOD, truncated [ 996.505516] loop0: p9 start 1 is beyond EOD, truncated [ 996.505523] loop0: p10 start 1 is beyond EOD, truncated [ 996.505529] loop0: p11 start 1 is beyond EOD, truncated [ 996.505536] loop0: p12 start 1 is beyond EOD, truncated [ 996.505543] loop0: p13 start 1 is beyond EOD, truncated 14:40:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYPTR64], 0x1}], 0x1, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) setrlimit(0x7, &(0x7f0000000100)) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x1, 0x0, 0x0) [ 996.505550] loop0: p14 start 1 is beyond EOD, truncated [ 996.505557] loop0: p15 start 1 is beyond EOD, truncated [ 996.505564] loop0: p16 start 1 is beyond EOD, truncated [ 996.505572] loop0: p17 start 1 is beyond EOD, truncated ** 3 printk messages dropped ** [ 996.505599] loop0: p21 start 1 is beyond EOD, truncated 14:40:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYPTR64], 0x1}], 0x1, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) setrlimit(0x7, &(0x7f0000000100)) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x1, 0x0, 0x0) ** 18 printk messages dropped ** [ 996.505719] loop0: p40 start 1 is beyond EOD, truncated ** 16 printk messages dropped ** [ 996.506012] loop0: p57 start 1 is beyond EOD, truncated ** 235 printk messages dropped ** [ 997.018123] loop0: p14 start 1 is beyond EOD, truncated 14:40:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYPTR64], 0x1}], 0x1, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x1, 0x0, 0x0) [ 997.018130] loop0: p15 start 1 is beyond EOD, truncated ** 385 printk messages dropped ** [ 997.414149] loop0: p145 start 1 is beyond EOD, truncated ** 107 printk messages dropped ** [ 997.414794] loop0: p253 start 1 is beyond EOD, truncated [ 997.414800] loop0: p254 start 1 is beyond EOD, truncated [ 997.414805] loop0: p255 start 1 is beyond EOD, truncated 14:40:10 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 997.742433] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 14:40:10 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:10 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:40:10 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 997.742780] loop0: p1 start 1 is beyond EOD, truncated [ 997.742786] loop0: p2 size 2 extends beyond EOD, truncated [ 997.743618] loop0: p3 start 201 is beyond EOD, truncated [ 997.743625] loop0: p4 start 301 is beyond EOD, truncated [ 997.743631] loop0: p5 start 1 is beyond EOD, truncated [ 997.743637] loop0: p6 start 1 is beyond EOD, truncated [ 997.743642] loop0: p7 start 1 is beyond EOD, truncated [ 997.743648] loop0: p8 start 1 is beyond EOD, truncated [ 997.743654] loop0: p9 start 1 is beyond EOD, truncated [ 997.743661] loop0: p10 start 1 is beyond EOD, truncated [ 997.743666] loop0: p11 start 1 is beyond EOD, truncated [ 997.743672] loop0: p12 start 1 is beyond EOD, truncated ** 35 printk messages dropped ** [ 997.743896] loop0: p48 start 1 is beyond EOD, truncated ** 7 printk messages dropped ** [ 997.743943] loop0: p56 start 1 is beyond EOD, truncated [ 997.743949] loop0: p57 start 1 is beyond EOD, truncated ** 540 printk messages dropped ** [ 998.408532] loop0: p86 start 1 is beyond EOD, truncated ** 210 printk messages dropped ** [ 998.782077] loop2: p41 start 1 is beyond EOD, truncated ** 297 printk messages dropped ** [ 998.939391] loop0: p83 start 1 is beyond EOD, truncated [ 998.939411] loop0: p84 start 1 is beyond EOD, truncated [ 998.939431] loop0: p85 start 1 is beyond EOD, truncated [ 998.939450] loop0: p86 start 1 is beyond EOD, truncated [ 998.939479] loop0: p87 start 1 is beyond EOD, truncated [ 998.939500] loop0: p88 start 1 is beyond EOD, truncated [ 998.939531] loop0: p89 start 1 is beyond EOD, truncated [ 998.939567] loop0: p90 start 1 is beyond EOD, truncated [ 998.939582] loop0: p91 start 1 is beyond EOD, truncated [ 998.939628] loop0: p92 start 1 is beyond EOD, truncated [ 998.939646] loop0: p93 start 1 is beyond EOD, truncated [ 998.939688] loop0: p94 start 1 is beyond EOD, truncated [ 998.939707] loop0: p95 start 1 is beyond EOD, truncated [ 998.939722] loop0: p96 start 1 is beyond EOD, truncated [ 998.939873] loop0: p97 start 1 is beyond EOD, truncated ** 5 printk messages dropped ** [ 998.940106] loop0: p103 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 998.940166] loop0: p105 start 1 is beyond EOD, truncated ** 11 printk messages dropped ** [ 998.940563] loop0: p117 start 1 is beyond EOD, truncated ** 193 printk messages dropped ** [ 999.153205] loop2: p49 start 1 is beyond EOD, truncated [ 999.153224] loop2: p50 start 1 is beyond EOD, truncated [ 999.153242] loop2: p51 start 1 is beyond EOD, truncated [ 999.153284] loop2: p52 start 1 is beyond EOD, truncated [ 999.153298] loop2: p53 start 1 is beyond EOD, truncated [ 999.153325] loop2: p54 start 1 is beyond EOD, truncated [ 999.153345] loop2: p55 start 1 is beyond EOD, truncated [ 999.153363] loop2: p56 start 1 is beyond EOD, truncated [ 999.153499] loop2: p57 start 1 is beyond EOD, truncated [ 999.153520] loop2: p58 start 1 is beyond EOD, truncated [ 999.153562] loop2: p59 start 1 is beyond EOD, truncated [ 999.153581] loop2: p60 start 1 is beyond EOD, truncated [ 999.153601] loop2: p61 start 1 is beyond EOD, truncated [ 999.153620] loop2: p62 start 1 is beyond EOD, truncated 14:40:11 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYPTR64], 0x1}], 0x1, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x1, 0x0, 0x0) 14:40:11 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:11 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) socket$nl_netfilter(0x10, 0x3, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:11 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:11 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) [ 999.153640] loop2: p63 start 1 is beyond EOD, truncated [ 999.153659] loop2: p64 start 1 is beyond EOD, truncated [ 999.153710] loop2: p65 start 1 is beyond EOD, truncated [ 999.153750] loop2: p66 start 1 is beyond EOD, truncated [ 999.153769] loop2: p67 start 1 is beyond EOD, truncated 14:40:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYPTR64], 0x1}], 0x1, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x1, 0x0, 0x0) [ 999.153810] loop2: p68 start 1 is beyond EOD, truncated [ 999.153829] loop2: p69 start 1 is beyond EOD, truncated [ 999.153863] loop2: p70 start 1 is beyond EOD, truncated [ 999.153883] loop2: p71 start 1 is beyond EOD, truncated [ 999.153929] loop2: p72 start 1 is beyond EOD, truncated [ 999.153963] loop2: p73 start 1 is beyond EOD, truncated [ 999.153989] loop2: p74 start 1 is beyond EOD, truncated [ 999.154029] loop2: p75 start 1 is beyond EOD, truncated [ 999.154081] loop2: p76 start 1 is beyond EOD, truncated [ 999.154100] loop2: p77 start 1 is beyond EOD, truncated ** 24 printk messages dropped ** [ 999.155018] loop2: p102 start 1 is beyond EOD, truncated ** 18 printk messages dropped ** [ 999.155488] loop2: p121 start 1 is beyond EOD, truncated ** 3 printk messages dropped ** [ 999.155566] loop2: p125 start 1 is beyond EOD, truncated ** 698 printk messages dropped ** [ 999.660692] loop2: p39 start 1 is beyond EOD, truncated ** 390 printk messages dropped ** [ 999.667446] truncated 14:40:11 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ** 34 printk messages dropped ** [ 999.667686] loop4: p151 start 1 is beyond EOD, [ 999.667691] truncated [ 999.667697] truncated [ 999.667705] loop4: p152 start 1 is beyond EOD, [ 999.667714] loop3: p72 start 1 is beyond EOD, [ 999.667717] truncated 14:40:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r1) setrlimit(0x7, &(0x7f0000000100)) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x1, 0x0, 0x0) [ 999.667725] loop4: p153 start 1 is beyond EOD, [ 999.667726] truncated [ 999.667737] truncated 14:40:11 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) bind$netlink(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 999.667745] loop4: p154 start 1 is beyond EOD, 14:40:12 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 999.667753] loop3: p73 start 1 is beyond EOD, [ 999.667757] truncated [ 999.667765] loop4: p155 start 1 is beyond EOD, [ 999.667766] truncated [ 999.667776] truncated 14:40:12 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 999.667784] loop4: p156 start 1 is beyond EOD, [ 999.667792] loop3: p74 start 1 is beyond EOD, [ 999.667796] truncated [ 999.667804] loop4: p157 start 1 is beyond EOD, [ 999.667806] truncated [ 999.667816] truncated [ 999.667824] loop4: p158 start 1 is beyond EOD, ** 5 printk messages dropped ** [ 999.667856] truncated ** 3 printk messages dropped ** [ 999.667876] truncated [ 999.667884] loop4: p161 start 1 is beyond EOD, [ 999.667885] truncated [ 999.667894] loop3: p78 start 1 is beyond EOD, truncated ** 212 printk messages dropped ** [ 999.669673] loop3: p131 start 1 is beyond EOD, ** 152 printk messages dropped ** [ 999.675212] loop1: p112 start 1 is beyond EOD, truncated ** 1 printk messages dropped ** [ 999.675250] loop1: p114 start 1 is beyond EOD, truncated ** 493 printk messages dropped ** [ 999.973008] loop0: p35 start 1 is beyond EOD, truncated ** 41 printk messages dropped ** [ 999.974209] loop0: p77 start 1 is beyond EOD, truncated ** 27 printk messages dropped ** [ 999.975003] loop0: p105 start 1 is beyond EOD, truncated ** 104 printk messages dropped ** [ 999.978263] loop0: p210 start 1 is beyond EOD, truncated ** 50 printk messages dropped ** ** 3 printk messages dropped ** [ 1000.245659] loop2: p1 start 1 is beyond EOD, truncated [ 1000.245697] loop2: p2 size 2 extends beyond EOD, truncated ** 1 printk messages dropped ** [ 1000.252455] loop3: p2 size 2 extends beyond EOD, truncated [ 1000.259743] loop1: p3 start 201 is beyond EOD, truncated [ 1000.259782] loop1: p4 start 301 is beyond EOD, truncated [ 1000.259802] loop1: p5 start 1 is beyond EOD, truncated [ 1000.259821] loop1: p6 start 1 is beyond EOD, truncated [ 1000.259840] loop1: p7 start 1 is beyond EOD, truncated [ 1000.259860] loop1: p8 start 1 is beyond EOD, truncated [ 1000.259893] loop1: p9 start 1 is beyond EOD, truncated [ 1000.259922] loop1: p10 start 1 is beyond EOD, truncated [ 1000.259942] loop1: p11 start 1 is beyond EOD, truncated [ 1000.259966] loop1: p12 start 1 is beyond EOD, truncated [ 1000.260804] loop4: p3 start 201 is beyond EOD, truncated [ 1000.260843] loop4: p4 start 301 is beyond EOD, truncated [ 1000.260863] loop4: p5 start 1 is beyond EOD, truncated [ 1000.260882] loop4: p6 start 1 is beyond EOD, truncated [ 1000.260902] loop4: p7 start 1 is beyond EOD, truncated [ 1000.260922] loop4: p8 start 1 is beyond EOD, truncated [ 1000.260941] loop4: p9 start 1 is beyond EOD, truncated [ 1000.260983] loop4: p10 start 1 is beyond EOD, truncated [ 1000.261002] loop4: p11 start 1 is beyond EOD, truncated [ 1000.261021] loop4: p12 start 1 is beyond EOD, truncated 14:40:12 executing program 0: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000005c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:12 executing program 4: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) 14:40:12 executing program 1: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) socket$nl_netfilter(0x10, 0x3, 0xc) request_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:12 executing program 3: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000880)={{}, {0x0, @local}, 0x0, {0x2, 0x4e20, @local}, 'irlan0\x00'}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x0, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) bind$inet6(0xffffffffffffffff, &(0x7f0000000780)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @local, @multicast1}, &(0x7f0000001600)=0xc) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 14:40:12 executing program 2: mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x100000002132, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000700)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000740)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000005c0)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80800020}, 0xc) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1, 0x4e23, 0x7, 0x0, 0x200, 0xa, 0xa0, 0x0, 0x2f}, {0x0, 0xb8d, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa75}, {0x1000, 0x2c3f, 0x3}, 0x4, 0x6e6bb4, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local}, 0x0, @in6, 0x0, 0x0, 0x3, 0x0, 0x1}}, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) io_setup(0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_generic(0x10, 0x3, 0x10) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 1000.261063] loop4: p13 start 1 is beyond EOD, truncated [ 1000.261103] loop4: p14 start 1 is beyond EOD, truncated [ 1000.261123] loop4: p15 start 1 is beyond EOD, truncated [ 1000.261142] loop4: p16 start 1 is beyond EOD, truncated [ 1000.261161] loop4: p17 start 1 is beyond EOD, truncated [ 1000.261176] loop4: p18 start 1 is beyond EOD, truncated [ 1000.261222] loop4: p19 start 1 is beyond EOD, truncated [ 1000.261237] loop4: p20 start 1 is beyond EOD, truncated [ 1000.261282] loop4: p21 start 1 is beyond EOD, truncated [ 1000.261301] loop4: p22 start 1 is beyond EOD, truncated [ 1000.261343] loop4: p23 start 1 is beyond EOD, truncated [ 1000.261361] loop4: p24 start 1 is beyond EOD, truncated [ 1000.261376] loop4: p25 start 1 is beyond EOD, truncated [ 1000.261422] loop4: p26 start 1 is beyond EOD, truncated [ 1000.261437] loop4: p27 start 1 is beyond EOD, truncated 14:40:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYPTR64], 0x1}], 0x1, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) setrlimit(0x7, &(0x7f0000000100)) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x1, 0x0, 0x0) [ 1000.261484] loop4: p28 start 1 is beyond EOD, truncated [ 1000.261504] loop4: p29 start 1 is beyond EOD, truncated ** 15 printk messages dropped ** [ 1000.261964] loop1: p21 start 1 is beyond EOD, truncated ** 277 printk messages dropped ** [ 1000.269456] loop3: p4 start 301 is beyond EOD, ** 2 printk messages dropped ** [ 1000.269477] loop3: p5 start 1 is beyond EOD, truncated ** 862 printk messages dropped ** [ 1000.306292] loop2: p205 start 1 is beyond EOD, truncated ** 91 printk messages dropped ** [ 1000.656768] loop4: p40 start 1 is beyond EOD, truncated ** 307 printk messages dropped ** [ 1000.725076] loop1: p84 start 1 is beyond EOD, truncated [ 1000.725096] loop1: p85 start 1 is beyond EOD, truncated [ 1000.725115] loop1: p86 start 1 is beyond EOD, truncated [ 1000.725135] loop1: p87 start 1 is beyond EOD, truncated [ 1000.725155] loop1: p88 start 1 is beyond EOD, truncated [ 1000.725170] loop1: p89 start 1 is beyond EOD, truncated [ 1000.725208] loop1: p90 start 1 is beyond EOD, truncated [ 1000.725236] loop1: p91 start 1 is beyond EOD, truncated [ 1000.725255] loop1: p92 start 1 is beyond EOD, truncated [ 1000.725275] loop1: p93 start 1 is beyond EOD, truncated [ 1000.725295] loop1: p94 start 1 is beyond EOD, truncated [ 1000.725315] loop1: p95 start 1 is beyond EOD, truncated [ 1000.725330] loop1: p96 start 1 is beyond EOD, truncated [ 1000.725397] loop1: p97 start 1 is beyond EOD, truncated [ 1000.725416] loop1: p98 start 1 is beyond EOD, truncated [ 1000.725436] loop1: p99 start 1 is beyond EOD, truncated [ 1000.725455] loop1: p100 start 1 is beyond EOD, truncated [ 1000.725476] loop1: p101 start 1 is beyond EOD, truncated [ 1000.725495] loop1: p102 start 1 is beyond EOD, truncated [ 1000.725514] loop1: p103 start 1 is beyond EOD, truncated [ 1000.725555] loop1: p104 start 1 is beyond EOD, truncated [ 1000.725570] loop1: p105 start 1 is beyond EOD, truncated [ 1000.725608] loop1: p106 start 1 is beyond EOD, truncated [ 1000.725637] loop1: p107 start 1 is beyond EOD, truncated [ 1000.725657] loop1: p108 start 1 is beyond EOD, truncated [ 1000.725677] loop1: p109 start 1 is beyond EOD, truncated [ 1000.725697] loop1: p110 start 1 is beyond EOD, truncated [ 1000.725717] loop1: p111 start 1 is beyond EOD, truncated [ 1000.725737] loop1: p112 start 1 is beyond EOD, truncated [ 1000.725757] loop1: p113 start 1 is beyond EOD, truncated [ 1000.725796] loop1: p114 start 1 is beyond EOD, truncated [ 1000.725815] loop1: p115 start 1 is beyond EOD, truncated [ 1000.725835] loop1: p116 start 1 is beyond EOD, truncated [ 1000.725856] loop1: p117 start 1 is beyond EOD, truncated [ 1000.725875] loop1: p118 start 1 is beyond EOD, truncated [ 1000.725896] loop1: p119 start 1 is beyond EOD, truncated [ 1000.725923] loop1: p120 start 1 is beyond EOD, truncated [ 1000.725967] loop1: p121 start 1 is beyond EOD, truncated [ 1000.725986] loop1: p122 start 1 is beyond EOD, truncated [ 1000.726006] loop1: p123 start 1 is beyond EOD, truncated [ 1000.726026] loop1: p124 start 1 is beyond EOD, truncated [ 1000.726045] loop1: p125 start 1 is beyond EOD, truncated [ 1000.726065] loop1: p126 start 1 is beyond EOD, truncated [ 1000.726086] loop1: p127 start 1 is beyond EOD, truncated [ 1000.726106] loop1: p128 start 1 is beyond EOD, truncated [ 1000.726127] loop1: p129 start 1 is beyond EOD, truncated [ 1000.726147] loop1: p130 start 1 is beyond EOD, truncated [ 1000.726167] loop1: p131 start 1 is beyond EOD, truncated [ 1000.726187] loop1: p132 start 1 is beyond EOD, truncated [ 1000.726206] loop1: p133 start 1 is beyond EOD, truncated [ 1000.726226] loop1: p134 start 1 is beyond EOD, truncated [ 1000.726286] loop1: p135 start 1 is beyond EOD, truncated [ 1000.726306] loop1: p136 start 1 is beyond EOD, truncated [ 1000.726326] loop1: p137 start 1 is beyond EOD, truncated [ 1000.726346] loop1: p138 start 1 is beyond EOD, truncated [ 1000.726366] loop1: p139 start 1 is beyond EOD, truncated [ 1000.726386] loop1: p140 start 1 is beyond EOD, truncated [ 1000.726405] loop1: p141 start 1 is beyond EOD, truncated [ 1000.726426] loop1: p142 start 1 is beyond EOD, truncated [ 1000.726446] loop1: p143 start 1 is beyond EOD, truncated [ 1000.726466] loop1: p144 start 1 is beyond EOD, truncated [ 1000.726486] loop1: p145 start 1 is beyond EOD, truncated [ 1000.726506] loop1: p146 start 1 is beyond EOD, truncated [ 1000.726526] loop1: p147 start 1 is beyond EOD, truncated [ 1000.726606] loop1: p148 start 1 is beyond EOD, truncated [ 1000.726626] loop1: p149 start 1 is beyond EOD, truncated [ 1000.726647] loop1: p150 start 1 is beyond EOD, truncated [ 1000.726666] loop1: p151 start 1 is beyond EOD, truncated [ 1000.726687] loop1: p152 start 1 is beyond EOD, truncated [ 1000.726707] loop1: p153 start 1 is beyond EOD, truncated [ 1000.726727] loop1: p154 start 1 is beyond EOD, truncated [ 1000.726747] loop1: p155 start 1 is beyond EOD, truncated [ 1000.726767] loop1: p156 start 1 is beyond EOD, truncated [ 1000.726787] loop1: p157 start 1 is beyond EOD, truncated [ 1000.726826] loop1: p158 start 1 is beyond EOD, truncated [ 1000.726846] loop1: p159 start 1 is beyond EOD, truncated [ 1000.726867] loop1: p160 start 1 is beyond EOD, truncated [ 1000.726907] loop1: p161 start 1 is beyond EOD, truncated [ 1000.726946] loop1: p162 start 1 is beyond EOD, truncated [ 1000.726966] loop1: p163 start 1 is beyond EOD, truncated [ 1000.726985] loop1: p164 start 1 is beyond EOD, truncated [ 1000.727026] loop1: p165 start 1 is beyond EOD, truncated [ 1000.727049] loop1: p166 start 1 is beyond EOD, truncated [ 1000.727079] loop1: p167 start 1 is beyond EOD, truncated [ 1000.727100] loop1: p168 start 1 is beyond EOD, truncated [ 1000.727120] loop1: p169 start 1 is beyond EOD, truncated [ 1000.727159] loop1: p170 start 1 is beyond EOD, truncated [ 1000.727199] loop1: p171 start 1 is beyond EOD, truncated [ 1000.727219] loop1: p172 start 1 is beyond EOD, truncated [ 1000.727240] loop1: p173 start 1 is beyond EOD, truncated [ 1000.727279] loop1: p174 start 1 is beyond EOD, truncated [ 1000.727300] loop1: p175 start 1 is beyond EOD, truncated [ 1000.727339] loop1: p176 start 1 is beyond EOD, truncated [ 1000.727359] loop1: p177 start 1 is beyond EOD, truncated [ 1000.727380] loop1: p178 start 1 is beyond EOD, truncated [ 1000.727417] loop1: p179 start 1 is beyond EOD, truncated [ 1000.727437] loop1: p180 start 1 is beyond EOD, truncated [ 1000.727456] loop1: p181 start 1 is beyond EOD, truncated [ 1000.727476] loop1: p182 start 1 is beyond EOD, truncated [ 1000.727496] loop1: p183 start 1 is beyond EOD, truncated [ 1000.727516] loop1: p184 start 1 is beyond EOD, truncated [ 1000.727590] loop1: p185 start 1 is beyond EOD, truncated [ 1000.727649] loop1: p186 start 1 is beyond EOD, truncated [ 1000.727670] loop1: p187 start 1 is beyond EOD, truncated [ 1000.727709] loop1: p188 start 1 is beyond EOD, truncated [ 1000.727764] loop1: p189 start 1 is beyond EOD, truncated [ 1000.727799] loop1: p190 start 1 is beyond EOD, truncated [ 1000.727818] loop1: p191 start 1 is beyond EOD, truncated [ 1000.727847] loop1: p192 start 1 is beyond EOD, truncated [ 1000.727867] loop1: p193 start 1 is beyond EOD, truncated [ 1000.727886] loop1: p194 start 1 is beyond EOD, truncated [ 1000.727906] loop1: p195 start 1 is beyond EOD, truncated [ 1000.727947] loop1: p196 start 1 is beyond EOD, truncated [ 1000.727967] loop1: p197 start 1 is beyond EOD, truncated [ 1000.727987] loop1: p198 start 1 is beyond EOD, truncated [ 1000.728027] loop1: p199 start 1 is beyond EOD, truncated [ 1000.728046] loop1: p200 start 1 is beyond EOD, truncated [ 1000.728067] loop1: p201 start 1 is beyond EOD, truncated [ 1000.728086] loop1: p202 start 1 is beyond EOD, truncated [ 1000.728107] loop1: p203 start 1 is beyond EOD, truncated [ 1000.728147] loop1: p204 start 1 is beyond EOD, truncated [ 1000.728166] loop1: p205 start 1 is beyond EOD, truncated [ 1000.728186] loop1: p206 start 1 is beyond EOD, truncated [ 1000.728206] loop1: p207 start 1 is beyond EOD, truncated [ 1000.728226] loop1: p208 start 1 is beyond EOD, truncated [ 1000.728246] loop1: p209 start 1 is beyond EOD, truncated [ 1000.728265] loop1: p210 start 1 is beyond EOD, truncated [ 1000.728284] loop1: p211 start 1 is beyond EOD, truncated [ 1000.728319] loop1: p212 start 1 is beyond EOD, truncated [ 1000.728338] loop1: p213 start 1 is beyond EOD, truncated [ 1000.728367] loop1: p214 start 1 is beyond EOD, truncated [ 1000.728406] loop1: p215 start 1 is beyond EOD, truncated [ 1000.728426] loop1: p216 start 1 is beyond EOD, truncated [ 1000.728446] loop1: p217 start 1 is beyond EOD, truncated [ 1000.728465] loop1: p218 start 1 is beyond EOD, truncated [ 1000.728485] loop1: p219 start 1 is beyond EOD, truncated [ 1000.728505] loop1: p220 start 1 is beyond EOD, truncated [ 1000.728597] loop1: p221 start 1 is beyond EOD, truncated [ 1000.728617] loop1: p222 start 1 is beyond EOD, truncated [ 1000.728636] loop1: p223 start 1 is beyond EOD, truncated [ 1000.728656] loop1: p224 start 1 is beyond EOD, truncated [ 1000.728676] loop1: p225 start 1 is beyond EOD, truncated [ 1000.728696] loop1: p226 start 1 is beyond EOD, truncated [ 1000.728715] loop1: p227 start 1 is beyond EOD, truncated [ 1000.728735] loop1: p228 start 1 is beyond EOD, truncated [ 1000.728789] loop1: p229 start 1 is beyond EOD, truncated [ 1000.728810] loop1: p230 start 1 is beyond EOD, truncated [ 1000.728850] loop1: p231 start 1 is beyond EOD, truncated [ 1000.728890] loop1: p232 start 1 is beyond EOD, truncated [ 1000.728947] loop1: p233 start 1 is beyond EOD, truncated [ 1000.728967] loop1: p234 start 1 is beyond EOD, truncated [ 1000.728988] loop1: p235 start 1 is beyond EOD, truncated [ 1000.729027] loop1: p236 start 1 is beyond EOD, truncated [ 1000.729088] loop1: p237 start 1 is beyond EOD, truncated [ 1000.729119] loop1: p238 start 1 is beyond EOD, truncated [ 1000.729139] loop1: p239 start 1 is beyond EOD, truncated [ 1000.729159] loop1: p240 start 1 is beyond EOD, truncated [ 1000.729219] loop1: p241 start 1 is beyond EOD, truncated [ 1000.729240] loop1: p242 start 1 is beyond EOD, truncated [ 1000.729266] loop1: p243 start 1 is beyond EOD, truncated [ 1000.729286] loop1: p244 start 1 is beyond EOD, truncated [ 1000.729306] loop1: p245 start 1 is beyond EOD, truncated [ 1000.729327] loop1: p246 start 1 is beyond EOD, truncated [ 1000.729371] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 1000.729376] loop1: p247 start 1 is beyond EOD, truncated [ 1000.729397] loop1: p248 start 1 is beyond EOD, truncated [ 1000.729417] loop1: p249 start 1 is beyond EOD, truncated [ 1000.729447] loop1: p250 start 1 is beyond EOD, truncated [ 1000.729458] loop1: p251 start 1 is beyond EOD, truncated [ 1000.729497] loop1: p252 start 1 is beyond EOD, truncated [ 1000.729518] loop1: p253 start 1 is beyond EOD, truncated [ 1000.729550] loop1: p254 start 1 is beyond EOD, truncated [ 1000.729590] loop1: p255 start 1 is beyond EOD, truncated [ 1000.730414] truncated [ 1000.730433] loop3: p7 start 1 is beyond EOD, truncated [ 1000.730454] loop3: p8 start 1 is beyond EOD, truncated [ 1000.730513] loop3: p9 start 1 is beyond EOD, truncated [ 1000.730554] loop3: p10 start 1 is beyond EOD, truncated [ 1000.730575] loop3: p11 start 1 is beyond EOD, truncated [ 1000.730615] loop3: p12 start 1 is beyond EOD, truncated [ 1000.730653] loop3: p13 start 1 is beyond EOD, truncated [ 1000.730674] loop3: p14 start 1 is beyond EOD, truncated [ 1000.730693] loop3: p15 start 1 is beyond EOD, truncated [ 1000.730713] loop3: p16 start 1 is beyond EOD, truncated [ 1000.730734] loop3: p17 start 1 is beyond EOD, truncated [ 1000.730754] loop3: p18 start 1 is beyond EOD, truncated [ 1000.730774] loop3: p19 start 1 is beyond EOD, truncated [ 1000.730795] loop3: p20 start 1 is beyond EOD, truncated [ 1000.730814] loop3: p21 start 1 is beyond EOD, truncated [ 1000.730834] loop3: p22 start 1 is beyond EOD, truncated [ 1000.730854] loop3: p23 start 1 is beyond EOD, truncated [ 1000.730873] loop3: p24 start 1 is beyond EOD, truncated [ 1000.730893] loop3: p25 start 1 is beyond EOD, truncated [ 1000.730913] loop3: p26 start 1 is beyond EOD, truncated [ 1000.730944] loop3: p27 start 1 is beyond EOD, truncated [ 1000.730964] loop3: p28 start 1 is beyond EOD, truncated [ 1000.731034] loop3: p29 start 1 is beyond EOD, truncated [ 1000.731190] loop3: p30 start 1 is beyond EOD, truncated [ 1000.731210] loop3: p31 start 1 is beyond EOD, truncated [ 1000.731231] loop3: p32 start 1 is beyond EOD, truncated [ 1000.731252] loop3: p33 start 1 is beyond EOD, truncated [ 1000.731293] loop3: p34 start 1 is beyond EOD, truncated [ 1000.731353] loop3: p35 start 1 is beyond EOD, truncated [ 1000.731530] loop3: p36 start 1 is beyond EOD, truncated [ 1000.731583] loop3: p37 start 1 is beyond EOD, truncated [ 1000.731633] loop3: p38 start 1 is beyond EOD, truncated [ 1000.731665] loop3: p39 start 1 is beyond EOD, truncated [ 1000.731679] loop3: p40 start 1 is beyond EOD, truncated [ 1000.731715] loop3: p41 start 1 is beyond EOD, truncated [ 1000.731734] loop3: p42 start 1 is beyond EOD, truncated [ 1000.731767] loop3: p43 start 1 is beyond EOD, truncated [ 1000.731795] loop3: p44 start 1 is beyond EOD, truncated [ 1000.731815] loop3: p45 start 1 is beyond EOD, truncated [ 1000.731836] loop3: p46 start 1 is beyond EOD, truncated [ 1000.731857] loop3: p47 start 1 is beyond EOD, truncated [ 1000.731877] loop3: p48 start 1 is beyond EOD, truncated [ 1000.731897] loop3: p49 start 1 is beyond EOD, truncated [ 1000.731926] loop3: p50 start 1 is beyond EOD, truncated [ 1000.731946] loop3: p51 start 1 is beyond EOD, truncated [ 1000.731967] loop3: p52 start 1 is beyond EOD, truncated [ 1000.732005] loop3: p53 start 1 is beyond EOD, truncated [ 1000.732026] loop3: p54 start 1 is beyond EOD, truncated [ 1000.732046] loop3: p55 start 1 is beyond EOD, truncated [ 1000.732067] loop3: p56 start 1 is beyond EOD, truncated [ 1000.732085] loop3: p57 start 1 is beyond EOD, truncated [ 1000.732105] loop3: p58 start 1 is beyond EOD, truncated [ 1000.732125] loop3: p59 start 1 is beyond EOD, truncated [ 1000.732147] loop3: p60 start 1 is beyond EOD, truncated [ 1000.732185] loop3: p61 start 1 is beyond EOD, truncated [ 1000.732198] loop3: p62 start 1 is beyond EOD, truncated [ 1000.732218] loop3: p63 start 1 is beyond EOD, truncated [ 1000.732265] loop3: p64 start 1 is beyond EOD, truncated [ 1000.732285] loop3: p65 start 1 is beyond EOD, truncated [ 1000.732305] loop3: p66 start 1 is beyond EOD, truncated [ 1000.732326] loop3: p67 start 1 is beyond EOD, truncated [ 1000.732346] loop3: p68 start 1 is beyond EOD, truncated [ 1000.732366] loop3: p69 start 1 is beyond EOD, truncated [ 1000.732385] loop3: p70 start 1 is beyond EOD, truncated [ 1000.732406] loop3: p71 start 1 is beyond EOD, truncated [ 1000.732426] loop3: p72 start 1 is beyond EOD, truncated [ 1000.732446] loop3: p73 start 1 is beyond EOD, truncated [ 1000.732466] loop3: p74 start 1 is beyond EOD, truncated [ 1000.732486] loop3: p75 start 1 is beyond EOD, truncated [ 1000.732692] loop3: p76 start 1 is beyond EOD, truncated [ 1000.732740] loop3: p77 start 1 is beyond EOD, truncated [ 1000.732779] loop3: p78 start 1 is beyond EOD, truncated [ 1000.732800] loop3: p79 start 1 is beyond EOD, truncated [ 1000.732820] loop3: p80 start 1 is beyond EOD, truncated [ 1000.732859] loop3: p81 start 1 is beyond EOD, truncated [ 1000.732880] loop3: p82 start 1 is beyond EOD, truncated [ 1000.732926] loop3: p83 start 1 is beyond EOD, truncated [ 1000.732962] loop3: p84 start 1 is beyond EOD, truncated [ 1000.733011] loop3: p85 start 1 is beyond EOD, truncated [ 1000.733050] loop3: p86 start 1 is beyond EOD, truncated [ 1000.733090] loop3: p87 start 1 is beyond EOD, truncated [ 1000.733149] loop3: p88 start 1 is beyond EOD, truncated [ 1000.733170] loop3: p89 start 1 is beyond EOD, truncated [ 1000.733209] loop3: p90 start 1 is beyond EOD, truncated [ 1000.733229] loop3: p91 start 1 is beyond EOD, truncated [ 1000.733247] loop3: p92 start 1 is beyond EOD, truncated [ 1000.733308] loop3: p93 start 1 is beyond EOD, truncated [ 1000.733328] loop3: p94 start 1 is beyond EOD, truncated [ 1000.733348] loop3: p95 start 1 is beyond EOD, truncated [ 1000.733367] loop3: p96 start 1 is beyond EOD, truncated [ 1000.733389] loop3: p97 start 1 is beyond EOD, truncated [ 1000.733408] loop3: p98 start 1 is beyond EOD, truncated [ 1000.733449] loop3: p99 start 1 is beyond EOD, truncated [ 1000.733469] loop3: p100 start 1 is beyond EOD, truncated [ 1000.733489] loop3: p101 start 1 is beyond EOD, truncated [ 1000.733509] loop3: p102 start 1 is beyond EOD, truncated [ 1000.733530] loop3: p103 start 1 is beyond EOD, truncated [ 1000.733572] loop3: p104 start 1 is beyond EOD, truncated [ 1000.733619] loop3: p105 start 1 is beyond EOD, truncated [ 1000.733640] loop3: p106 start 1 is beyond EOD, truncated [ 1000.733816] loop3: p107 start 1 is beyond EOD, truncated [ 1000.733998] loop3: p108 start 1 is beyond EOD, truncated [ 1000.734038] loop3: p109 start 1 is beyond EOD, truncated [ 1000.734077] loop3: p110 start 1 is beyond EOD, truncated [ 1000.734098] loop3: p111 start 1 is beyond EOD, truncated [ 1000.734139] loop3: p112 start 1 is beyond EOD, truncated [ 1000.734178] loop3: p113 start 1 is beyond EOD, truncated [ 1000.734217] loop3: p114 start 1 is beyond EOD, truncated [ 1000.734238] loop3: p115 start 1 is beyond EOD, truncated [ 1000.734259] loop3: p116 start 1 is beyond EOD, truncated [ 1000.734298] loop3: p117 start 1 is beyond EOD, truncated [ 1000.734319] loop3: p118 start 1 is beyond EOD, truncated [ 1000.734358] loop3: p119 start 1 is beyond EOD, truncated [ 1000.734378] loop3: p120 start 1 is beyond EOD, truncated [ 1000.734398] loop3: p121 start 1 is beyond EOD, truncated [ 1000.734418] loop3: p122 start 1 is beyond EOD, truncated [ 1000.734437] loop3: p123 start 1 is beyond EOD, truncated [ 1000.734458] loop3: p124 start 1 is beyond EOD, truncated [ 1000.734477] loop3: p125 start 1 is beyond EOD, truncated [ 1000.734497] loop3: p126 start 1 is beyond EOD, truncated [ 1000.734518] loop3: p127 start 1 is beyond EOD, truncated [ 1000.734555] loop3: p128 start 1 is beyond EOD, truncated [ 1000.734576] loop3: p129 start 1 is beyond EOD, truncated [ 1000.734597] loop3: p130 start 1 is beyond EOD, truncated [ 1000.734617] loop3: p131 start 1 is beyond EOD, truncated [ 1000.734637] loop3: p132 start 1 is beyond EOD, truncated [ 1000.734658] loop3: p133 start 1 is beyond EOD, truncated [ 1000.734678] loop3: p134 start 1 is beyond EOD, truncated [ 1000.734717] loop3: p135 start 1 is beyond EOD, truncated [ 1000.734738] loop3: p136 start 1 is beyond EOD, truncated [ 1000.734944] loop3: p137 start 1 is beyond EOD, truncated [ 1000.734964] loop3: p138 start 1 is beyond EOD, truncated [ 1000.734985] loop3: p139 start 1 is beyond EOD, truncated [ 1000.735024] loop3: p140 start 1 is beyond EOD, truncated [ 1000.735044] loop3: p141 start 1 is beyond EOD, truncated [ 1000.735064] loop3: p142 start 1 is beyond EOD, truncated [ 1000.735084] loop3: p143 start 1 is beyond EOD, truncated [ 1000.735104] loop3: p144 start 1 is beyond EOD, truncated [ 1000.735124] loop3: p145 start 1 is beyond EOD, truncated [ 1000.735155] loop3: p146 start 1 is beyond EOD, truncated [ 1000.735174] loop3: p147 start 1 is beyond EOD, truncated [ 1000.735189] loop3: p148 start 1 is beyond EOD, truncated [ 1000.735254] loop3: p149 start 1 is beyond EOD, truncated [ 1000.735274] loop3: p150 start 1 is beyond EOD, truncated [ 1000.735294] loop3: p151 start 1 is beyond EOD, truncated [ 1000.735314] loop3: p152 start 1 is beyond EOD, truncated [ 1000.735334] loop3: p153 start 1 is beyond EOD, truncated [ 1000.735355] loop3: p154 start 1 is beyond EOD, truncated [ 1000.735374] loop3: p155 start 1 is beyond EOD, truncated [ 1000.735394] loop3: p156 start 1 is beyond EOD, truncated [ 1000.735415] loop3: p157 start 1 is beyond EOD, truncated [ 1000.735435] loop3: p158 start 1 is beyond EOD, truncated [ 1000.735455] loop3: p159 start 1 is beyond EOD, truncated [ 1000.735476] loop3: p160 start 1 is beyond EOD, truncated [ 1000.735514] loop3: p161 start 1 is beyond EOD, truncated [ 1000.735538] loop3: p162 start 1 is beyond EOD, truncated [ 1000.735617] loop3: p163 start 1 is beyond EOD, truncated [ 1000.735637] loop3: p164 start 1 is beyond EOD, truncated [ 1000.735665] loop3: p165 start 1 is beyond EOD, truncated [ 1000.735684] loop3: p166 start 1 is beyond EOD, truncated [ 1000.735704] loop3: p167 start 1 is beyond EOD, truncated [ 1000.735722] loop3: p168 start 1 is beyond EOD, truncated [ 1000.735763] loop3: p169 start 1 is beyond EOD, truncated [ 1000.735804] loop3: p170 start 1 is beyond EOD, truncated [ 1000.735824] loop3: p171 start 1 is beyond EOD, truncated [ 1000.735843] loop3: p172 start 1 is beyond EOD, truncated [ 1000.737206] loop3: p173 start 1 is beyond EOD, truncated [ 1000.737266] loop3: p174 start 1 is beyond EOD, truncated [ 1000.737287] loop3: p175 start 1 is beyond EOD, truncated [ 1000.737326] loop3: p176 start 1 is beyond EOD, truncated [ 1000.737345] loop3: p177 start 1 is beyond EOD, truncated [ 1000.737365] loop3: p178 start 1 is beyond EOD, truncated [ 1000.737385] loop3: p179 start 1 is beyond EOD, truncated [ 1000.737405] loop3: p180 start 1 is beyond EOD, truncated [ 1000.737420] loop3: p181 start 1 is beyond EOD, truncated [ 1000.737466] loop3: p182 start 1 is beyond EOD, truncated [ 1000.737486] loop3: p183 start 1 is beyond EOD, truncated [ 1000.737505] loop3: p184 start 1 is beyond EOD, truncated [ 1000.737520] loop3: p185 start 1 is beyond EOD, truncated [ 1000.737577] loop3: p186 start 1 is beyond EOD, truncated [ 1000.737596] loop3: p187 start 1 is beyond EOD, truncated [ 1000.737615] loop3: p188 start 1 is beyond EOD, truncated [ 1000.737629] loop3: p189 start 1 is beyond EOD, truncated [ 1000.737674] loop3: p190 start 1 is beyond EOD, truncated [ 1000.737694] loop3: p191 start 1 is beyond EOD, truncated [ 1000.737735] loop3: p192 start 1 is beyond EOD, truncated [ 1000.737754] loop3: p193 start 1 is beyond EOD, truncated [ 1000.737774] loop3: p194 start 1 is beyond EOD, truncated [ 1000.737796] loop3: p195 start 1 is beyond EOD, truncated [ 1000.737816] loop3: p196 start 1 is beyond EOD, truncated [ 1000.737837] loop3: p197 start 1 is beyond EOD, truncated [ 1000.737876] loop3: p198 start 1 is beyond EOD, truncated [ 1000.737896] loop3: p199 start 1 is beyond EOD, truncated [ 1000.737946] loop3: p200 start 1 is beyond EOD, truncated [ 1000.737966] loop3: p201 start 1 is beyond EOD, truncated [ 1000.737987] loop3: p202 start 1 is beyond EOD, truncated [ 1000.738026] loop3: p203 start 1 is beyond EOD, truncated [ 1000.738045] loop3: p204 start 1 is beyond EOD, truncated [ 1000.738065] loop3: p205 start 1 is beyond EOD, truncated [ 1000.738086] loop3: p206 start 1 is beyond EOD, truncated [ 1000.738106] loop3: p207 start 1 is beyond EOD, truncated [ 1000.738125] loop3: p208 start 1 is beyond EOD, truncated [ 1000.738146] loop3: p209 start 1 is beyond EOD, truncated [ 1000.738166] loop3: p210 start 1 is beyond EOD, truncated [ 1000.739484] loop3: p211 start 1 is beyond EOD, truncated [ 1000.739505] loop3: p212 start 1 is beyond EOD, truncated [ 1000.739525] loop3: p213 start 1 is beyond EOD, truncated [ 1000.739587] loop3: p214 start 1 is beyond EOD, truncated [ 1000.739615] loop3: p215 start 1 is beyond EOD, truncated [ 1000.739634] loop3: p216 start 1 is beyond EOD, [ 1000.746822] loop2: p1 start 1 is beyond EOD, truncated [ 1000.746860] loop2: p2 size 2 extends beyond EOD, truncated [ 1000.748633] truncated [ 1000.748654] loop3: p217 start 1 is beyond EOD, truncated [ 1000.748685] loop3: p218 start 1 is beyond EOD, truncated [ 1000.748707] loop3: p219 start 1 is beyond EOD, truncated [ 1000.748732] loop3: p220 start 1 is beyond EOD, truncated [ 1000.748752] loop3: p221 start 1 is beyond EOD, truncated [ 1000.748772] loop3: p222 start 1 is beyond EOD, truncated [ 1000.748791] loop3: p223 start 1 is beyond EOD, truncated [ 1000.748812] loop3: p224 start 1 is beyond EOD, truncated [ 1000.748831] loop3: p225 start 1 is beyond EOD, truncated [ 1000.748851] loop3: p226 start 1 is beyond EOD, truncated [ 1000.748885] loop3: p227 start 1 is beyond EOD, truncated [ 1000.748905] loop3: p228 start 1 is beyond EOD, truncated [ 1000.748935] loop3: p229 start 1 is beyond EOD, truncated [ 1000.748955] loop3: p230 start 1 is beyond EOD, truncated [ 1000.749003] loop3: p231 start 1 is beyond EOD, truncated [ 1000.749023] loop3: p232 start 1 is beyond EOD, truncated [ 1000.749044] loop3: p233 start 1 is beyond EOD, truncated [ 1000.749076] loop3: p234 start 1 is beyond EOD, truncated [ 1000.749116] loop3: p235 start 1 is beyond EOD, truncated [ 1000.749136] loop3: p236 start 1 is beyond EOD, truncated [ 1000.749176] loop3: p237 start 1 is beyond EOD, truncated [ 1000.749216] loop3: p238 start 1 is beyond EOD, truncated [ 1000.749236] loop3: p239 start 1 is beyond EOD, truncated [ 1000.749276] loop3: p240 start 1 is beyond EOD, truncated [ 1000.749351] loop3: p241 start 1 is beyond EOD, truncated [ 1000.749371] loop3: p242 start 1 is beyond EOD, truncated [ 1000.749391] loop3: p243 start 1 is beyond EOD, truncated [ 1000.749411] loop3: p244 start 1 is beyond EOD, truncated [ 1000.749431] loop3: p245 start 1 is beyond EOD, truncated [ 1000.749451] loop3: p246 start 1 is beyond EOD, truncated [ 1000.749471] loop3: p247 start 1 is beyond EOD, truncated [ 1000.749492] loop3: p248 start 1 is beyond EOD, truncated [ 1000.749512] loop3: p249 start 1 is beyond EOD, truncated [ 1000.749535] loop3: p250 start 1 is beyond EOD, truncated [ 1000.750859] loop3: p251 start 1 is beyond EOD, truncated [ 1000.750910] loop3: p252 start 1 is beyond EOD, truncated [ 1000.750956] loop3: p253 start 1 is beyond EOD, truncated [ 1000.750977] loop3: p254 start 1 is beyond EOD, truncated [ 1000.750997] loop3: p255 start 1 is beyond EOD, truncated [ 1000.792217] loop2: p3 start 201 is beyond EOD, truncated [ 1000.792291] loop2: p4 start 301 is beyond EOD, truncated [ 1000.792346] loop2: p5 start 1 is beyond EOD, truncated [ 1000.792372] loop2: p6 start 1 is beyond EOD, truncated [ 1000.792393] loop2: p7 start 1 is beyond EOD, truncated [ 1000.792414] loop2: p8 start 1 is beyond EOD, truncated [ 1000.792434] loop2: p9 start 1 is beyond EOD, truncated [ 1000.792453] loop2: p10 start 1 is beyond EOD, truncated [ 1000.792473] loop2: p11 start 1 is beyond EOD, truncated [ 1000.792493] loop2: p12 start 1 is beyond EOD, truncated [ 1000.792514] loop2: p13 start 1 is beyond EOD, truncated [ 1000.792534] loop2: p14 start 1 is beyond EOD, truncated [ 1000.792554] loop2: p15 start 1 is beyond EOD, truncated [ 1000.792573] loop2: p16 start 1 is beyond EOD, truncated [ 1000.792593] loop2: p17 start 1 is beyond EOD, truncated [ 1000.792613] loop2: p18 start 1 is beyond EOD, truncated [ 1000.792634] loop2: p19 start 1 is beyond EOD, truncated [ 1000.792653] loop2: p20 start 1 is beyond EOD, truncated [ 1000.792673] loop2: p21 start 1 is beyond EOD, truncated [ 1000.792693] loop2: p22 start 1 is beyond EOD, truncated [ 1000.792713] loop2: p23 start 1 is beyond EOD, truncated [ 1000.792753] loop2: p24 start 1 is beyond EOD, truncated [ 1000.792773] loop2: p25 start 1 is beyond EOD, truncated [ 1000.792794] loop2: p26 start 1 is beyond EOD, truncated [ 1000.792834] loop2: p27 start 1 is beyond EOD, truncated [ 1000.792854] loop2: p28 start 1 is beyond EOD, truncated [ 1000.792894] loop2: p29 start 1 is beyond EOD, truncated [ 1000.792922] loop2: p30 start 1 is beyond EOD, truncated [ 1000.792943] loop2: p31 start 1 is beyond EOD, truncated [ 1000.799964] loop2: p32 start 1 is beyond EOD, truncated [ 1000.799984] loop2: p33 start 1 is beyond EOD, truncated [ 1000.800004] loop2: p34 start 1 is beyond EOD, truncated [ 1000.800183] loop2: p35 start 1 is beyond EOD, truncated [ 1000.800203] loop2: p36 start 1 is beyond EOD, truncated [ 1000.800223] loop2: p37 start 1 is beyond EOD, truncated [ 1000.800242] loop2: p38 start 1 is beyond EOD, truncated [ 1000.800277] loop2: p39 start 1 is beyond EOD, truncated [ 1000.800296] loop2: p40 start 1 is beyond EOD, truncated [ 1000.800316] loop2: p41 start 1 is beyond EOD, truncated [ 1000.800344] loop2: p42 start 1 is beyond EOD, truncated [ 1000.800363] loop2: p43 start 1 is beyond EOD, truncated [ 1000.800383] loop2: p44 start 1 is beyond EOD, truncated [ 1000.800402] loop2: p45 start 1 is beyond EOD, truncated [ 1000.800445] loop2: p46 start 1 is beyond EOD, truncated [ 1000.800465] loop2: p47 start 1 is beyond EOD, truncated [ 1000.800483] loop2: p48 start 1 is beyond EOD, truncated [ 1000.800502] loop2: p49 start 1 is beyond EOD, truncated [ 1000.800545] loop2: p50 start 1 is beyond EOD, truncated [ 1000.800563] loop2: p51 start 1 is beyond EOD, truncated [ 1000.800583] loop2: p52 start 1 is beyond EOD, truncated [ 1000.800598] loop2: p53 start 1 is beyond EOD, truncated [ 1000.800643] loop2: p54 start 1 is beyond EOD, truncated [ 1000.800663] loop2: p55 start 1 is beyond EOD, truncated [ 1000.800678] loop2: p56 start 1 is beyond EOD, truncated [ 1000.800724] loop2: p57 start 1 is beyond EOD, truncated [ 1000.800743] loop2: p58 start 1 is beyond EOD, truncated [ 1000.800758] loop2: p59 start 1 is beyond EOD, truncated [ 1000.800804] loop2: p60 start 1 is beyond EOD, truncated [ 1000.800822] loop2: p61 start 1 is beyond EOD, truncated [ 1000.800864] loop2: p62 start 1 is beyond EOD, truncated [ 1000.802218] loop2: p63 start 1 is beyond EOD, truncated [ 1000.802238] loop2: p64 start 1 is beyond EOD, truncated [ 1000.802257] loop2: p65 start 1 is beyond EOD, truncated [ 1000.802276] loop2: p66 start 1 is beyond EOD, truncated [ 1000.802309] loop2: p67 start 1 is beyond EOD, truncated [ 1000.802337] loop2: p68 start 1 is beyond EOD, truncated [ 1000.802356] loop2: p69 start 1 is beyond EOD, truncated [ 1000.802376] loop2: p70 start 1 is beyond EOD, truncated [ 1000.802391] loop2: p71 start 1 is beyond EOD, truncated [ 1000.802437] loop2: p72 start 1 is beyond EOD, truncated [ 1000.802457] loop2: p73 start 1 is beyond EOD, truncated [ 1000.802476] loop2: p74 start 1 is beyond EOD, truncated [ 1000.802496] loop2: p75 start 1 is beyond EOD, truncated [ 1000.802537] loop2: p76 start 1 is beyond EOD, truncated [ 1000.802556] loop2: p77 start 1 is beyond EOD, truncated [ 1000.802598] loop2: p78 start 1 is beyond EOD, truncated [ 1000.802617] loop2: p79 start 1 is beyond EOD, truncated [ 1000.802636] loop2: p80 start 1 is beyond EOD, truncated [ 1000.802651] loop2: p81 start 1 is beyond EOD, truncated [ 1000.802696] loop2: p82 start 1 is beyond EOD, truncated [ 1000.802711] loop2: p83 start 1 is beyond EOD, truncated [ 1000.802757] loop2: p84 start 1 is beyond EOD, truncated [ 1000.802776] loop2: p85 start 1 is beyond EOD, truncated [ 1000.802818] loop2: p86 start 1 is beyond EOD, truncated [ 1000.802837] loop2: p87 start 1 is beyond EOD, truncated [ 1000.802856] loop2: p88 start 1 is beyond EOD, truncated [ 1000.802889] loop2: p89 start 1 is beyond EOD, truncated [ 1000.802924] loop2: p90 start 1 is beyond EOD, truncated [ 1000.802966] loop2: p91 start 1 is beyond EOD, truncated [ 1000.802982] loop2: p92 start 1 is beyond EOD, truncated [ 1000.803030] loop2: p93 start 1 is beyond EOD, truncated [ 1000.803067] loop2: p94 start 1 is beyond EOD, truncated [ 1000.803085] loop2: p95 start 1 is beyond EOD, truncated [ 1000.803127] loop2: p96 start 1 is beyond EOD, truncated [ 1000.804462] loop2: p97 start 1 is beyond EOD, truncated [ 1000.804482] loop2: p98 start 1 is beyond EOD, truncated [ 1000.804501] loop2: p99 start 1 is beyond EOD, truncated [ 1000.804521] loop2: p100 start 1 is beyond EOD, truncated [ 1000.804536] loop2: p101 start 1 is beyond EOD, truncated [ 1000.804581] loop2: p102 start 1 is beyond EOD, truncated [ 1000.804600] loop2: p103 start 1 is beyond EOD, truncated [ 1000.804660] loop2: p104 start 1 is beyond EOD, truncated [ 1000.804703] loop2: p105 start 1 is beyond EOD, truncated [ 1000.804722] loop2: p106 start 1 is beyond EOD, truncated [ 1000.804741] loop2: p107 start 1 is beyond EOD, truncated [ 1000.804760] loop2: p108 start 1 is beyond EOD, truncated [ 1000.804801] loop2: p109 start 1 is beyond EOD, truncated [ 1000.804820] loop2: p110 start 1 is beyond EOD, truncated [ 1000.804840] loop2: p111 start 1 is beyond EOD, truncated [ 1000.804882] loop2: p112 start 1 is beyond EOD, truncated [ 1000.804901] loop2: p113 start 1 is beyond EOD, truncated [ 1000.804922] loop2: p114 start 1 is beyond EOD, truncated [ 1000.804953] loop2: p115 start 1 is beyond EOD, truncated [ 1000.804981] loop2: p116 start 1 is beyond EOD, truncated [ 1000.804999] loop2: p117 start 1 is beyond EOD, truncated [ 1000.805041] loop2: p118 start 1 is beyond EOD, truncated [ 1000.805060] loop2: p119 start 1 is beyond EOD, truncated [ 1000.805075] loop2: p120 start 1 is beyond EOD, truncated [ 1000.805121] loop2: p121 start 1 is beyond EOD, truncated [ 1000.805135] loop2: p122 start 1 is beyond EOD, truncated [ 1000.805181] loop2: p123 start 1 is beyond EOD, truncated [ 1000.805196] loop2: p124 start 1 is beyond EOD, truncated [ 1000.805242] loop2: p125 start 1 is beyond EOD, truncated [ 1000.805261] loop2: p126 start 1 is beyond EOD, truncated [ 1000.805276] loop2: p127 start 1 is beyond EOD, truncated [ 1000.805314] loop2: p128 start 1 is beyond EOD, truncated [ 1000.805341] loop2: p129 start 1 is beyond EOD, truncated [ 1000.805376] loop2: p130 start 1 is beyond EOD, truncated [ 1000.805396] loop2: p131 start 1 is beyond EOD, truncated [ 1000.806392] loop2: p132 start 1 is beyond EOD, truncated [ 1000.806431] loop2: p133 start 1 is beyond EOD, truncated [ 1000.806451] loop2: p134 start 1 is beyond EOD, truncated [ 1000.806478] loop2: p135 start 1 is beyond EOD, truncated [ 1000.806498] loop2: p136 start 1 is beyond EOD, truncated [ 1000.817588] loop2: p137 start 1 is beyond EOD, truncated [ 1000.817626] loop2: p138 start 1 is beyond EOD, truncated [ 1000.817646] loop2: p139 start 1 is beyond EOD, truncated [ 1000.817661] loop2: p140 start 1 is beyond EOD, truncated [ 1000.817707] loop2: p141 start 1 is beyond EOD, truncated [ 1000.817725] loop2: p142 start 1 is beyond EOD, truncated [ 1000.817767] loop2: p143 start 1 is beyond EOD, truncated [ 1000.817787] loop2: p144 start 1 is beyond EOD, truncated [ 1000.817807] loop2: p145 start 1 is beyond EOD, truncated [ 1000.817826] loop2: p146 start 1 is beyond EOD, truncated [ 1000.817846] loop2: p147 start 1 is beyond EOD, truncated [ 1000.817866] loop2: p148 start 1 is beyond EOD, truncated [ 1000.817886] loop2: p149 start 1 is beyond EOD, truncated [ 1000.817905] loop2: p150 start 1 is beyond EOD, truncated [ 1000.817957] loop2: p151 start 1 is beyond EOD, truncated [ 1000.817976] loop2: p152 start 1 is beyond EOD, truncated [ 1000.817991] loop2: p153 start 1 is beyond EOD, truncated [ 1000.818034] loop2: p154 start 1 is beyond EOD, truncated [ 1000.818056] loop2: p155 start 1 is beyond EOD, truncated [ 1000.818075] loop2: p156 start 1 is beyond EOD, truncated [ 1000.818117] loop2: p157 start 1 is beyond EOD, truncated [ 1000.818137] loop2: p158 start 1 is beyond EOD, truncated [ 1000.818156] loop2: p159 start 1 is beyond EOD, truncated [ 1000.818176] loop2: p160 start 1 is beyond EOD, truncated [ 1000.818209] loop2: p161 start 1 is beyond EOD, truncated [ 1000.818236] loop2: p162 start 1 is beyond EOD, truncated [ 1000.818251] loop2: p163 start 1 is beyond EOD, truncated [ 1000.818297] loop2: p164 start 1 is beyond EOD, truncated [ 1000.818316] loop2: p165 start 1 is beyond EOD, truncated [ 1000.818331] loop2: p166 start 1 is beyond EOD, truncated [ 1000.818377] loop2: p167 start 1 is beyond EOD, truncated [ 1000.818396] loop2: p168 start 1 is beyond EOD, truncated [ 1000.818415] loop2: p169 start 1 is beyond EOD, truncated [ 1000.818449] loop2: p170 start 1 is beyond EOD, truncated [ 1000.818476] loop2: p171 start 1 is beyond EOD, truncated [ 1000.818496] loop2: p172 start 1 is beyond EOD, truncated [ 1000.818511] loop2: p173 start 1 is beyond EOD, [ 1000.824410] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 1000.826816] truncated [ 1000.826836] loop2: p174 start 1 is beyond EOD, truncated [ 1000.826856] loop2: p175 start 1 is beyond EOD, truncated [ 1000.826875] loop2: p176 start 1 is beyond EOD, truncated [ 1000.826896] loop2: p177 start 1 is beyond EOD, truncated [ 1000.826930] loop2: p178 start 1 is beyond EOD, truncated [ 1000.826996] loop2: p179 start 1 is beyond EOD, truncated [ 1000.827015] loop2: p180 start 1 is beyond EOD, truncated [ 1000.827068] loop2: p181 start 1 is beyond EOD, truncated [ 1000.827097] loop2: p182 start 1 is beyond EOD, truncated [ 1000.827116] loop2: p183 start 1 is beyond EOD, truncated [ 1000.827135] loop2: p184 start 1 is beyond EOD, truncated [ 1000.827155] loop2: p185 start 1 is beyond EOD, truncated [ 1000.827174] loop2: p186 start 1 is beyond EOD, truncated [ 1000.827190] loop2: p187 start 1 is beyond EOD, truncated [ 1000.827256] loop2: p188 start 1 is beyond EOD, truncated [ 1000.827277] loop2: p189 start 1 is beyond EOD, truncated [ 1000.827297] loop2: p190 start 1 is beyond EOD, truncated [ 1000.827337] loop2: p191 start 1 is beyond EOD, truncated [ 1000.827357] loop2: p192 start 1 is beyond EOD, truncated [ 1000.827377] loop2: p193 start 1 is beyond EOD, truncated [ 1000.827398] loop2: p194 start 1 is beyond EOD, truncated [ 1000.827417] loop2: p195 start 1 is beyond EOD, truncated [ 1000.827437] loop2: p196 start 1 is beyond EOD, truncated [ 1000.827476] loop2: p197 start 1 is beyond EOD, truncated [ 1000.827496] loop2: p198 start 1 is beyond EOD, truncated [ 1000.827517] loop2: p199 start 1 is beyond EOD, truncated [ 1000.827537] loop2: p200 start 1 is beyond EOD, truncated [ 1000.827576] loop2: p201 start 1 is beyond EOD, truncated [ 1000.827597] loop2: p202 start 1 is beyond EOD, truncated [ 1000.827617] loop2: p203 start 1 is beyond EOD, truncated [ 1000.827638] loop2: p204 start 1 is beyond EOD, truncated [ 1000.827697] loop2: p205 start 1 is beyond EOD, truncated [ 1000.827717] loop2: p206 start 1 is beyond EOD, truncated [ 1000.827757] loop2: p207 start 1 is beyond EOD, truncated [ 1000.839937] loop2: p208 start 1 is beyond EOD, truncated [ 1000.839994] loop2: p209 start 1 is beyond EOD, truncated [ 1000.840082] loop2: p210 start 1 is beyond EOD, truncated [ 1000.841078] loop2: p211 start 1 is beyond EOD, truncated [ 1000.841099] loop2: p212 start 1 is beyond EOD, truncated [ 1000.841119] loop2: p213 start 1 is beyond EOD, truncated [ 1000.841138] loop2: p214 start 1 is beyond EOD, truncated [ 1000.841158] loop2: p215 start 1 is beyond EOD, truncated [ 1000.841178] loop2: p216 start 1 is beyond EOD, truncated [ 1000.841198] loop2: p217 start 1 is beyond EOD, truncated [ 1000.841218] loop2: p218 start 1 is beyond EOD, truncated [ 1000.841238] loop2: p219 start 1 is beyond EOD, truncated [ 1000.841257] loop2: p220 start 1 is beyond EOD, truncated [ 1000.841277] loop2: p221 start 1 is beyond EOD, truncated [ 1000.841298] loop2: p222 start 1 is beyond EOD, truncated [ 1000.841317] loop2: p223 start 1 is beyond EOD, truncated [ 1000.841337] loop2: p224 start 1 is beyond EOD, truncated [ 1000.841357] loop2: p225 start 1 is beyond EOD, truncated [ 1000.841376] loop2: p226 start 1 is beyond EOD, truncated [ 1000.841411] loop2: p227 start 1 is beyond EOD, truncated [ 1000.841430] loop2: p228 start 1 is beyond EOD, truncated [ 1000.841450] loop2: p229 start 1 is beyond EOD, truncated [ 1000.841478] loop2: p230 start 1 is beyond EOD, truncated [ 1000.841498] loop2: p231 start 1 is beyond EOD, truncated [ 1000.841517] loop2: p232 start 1 is beyond EOD, truncated [ 1000.841537] loop2: p233 start 1 is beyond EOD, truncated [ 1000.841557] loop2: p234 start 1 is beyond EOD, truncated [ 1000.841577] loop2: p235 start 1 is beyond EOD, truncated [ 1000.841597] loop2: p236 start 1 is beyond EOD, truncated [ 1000.841617] loop2: p237 start 1 is beyond EOD, truncated [ 1000.841637] loop2: p238 start 1 is beyond EOD, truncated [ 1000.841657] loop2: p239 start 1 is beyond EOD, truncated [ 1000.841676] loop2: p240 start 1 is beyond EOD, truncated [ 1000.841696] loop2: p241 start 1 is beyond EOD, truncated [ 1000.841730] loop2: p242 start 1 is beyond EOD, truncated [ 1000.841759] loop2: p243 start 1 is beyond EOD, truncated [ 1000.841778] loop2: p244 start 1 is beyond EOD, truncated [ 1000.841798] loop2: p245 start 1 is beyond EOD, truncated [ 1000.841817] loop2: p246 start 1 is beyond EOD, truncated [ 1000.841838] loop2: p247 start 1 is beyond EOD, truncated [ 1000.841859] loop2: p248 start 1 is beyond EOD, truncated [ 1000.841897] loop2: p249 start 1 is beyond EOD, truncated [ 1000.841925] loop2: p250 start 1 is beyond EOD, truncated [ 1000.841967] loop2: p251 start 1 is beyond EOD, truncated [ 1000.841988] loop2: p252 start 1 is beyond EOD, truncated [ 1000.842009] loop2: p253 start 1 is beyond EOD, truncated [ 1000.860483] loop2: p254 start 1 is beyond EOD, truncated [ 1000.860521] loop2: p255 start 1 is beyond EOD, truncated [ 1001.259696] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 1001.264081] loop2: p1 start 1 is beyond EOD, truncated [ 1001.264101] loop2: p2 size 2 extends beyond EOD, truncated [ 1001.272829] loop3: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 1001.283826] loop4: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 1001.287604] loop1: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 1001.291798] loop2: p3 start 201 is beyond EOD, truncated [ 1001.291829] loop2: p4 start 301 is beyond EOD, truncated [ 1001.291848] loop2: p5 start 1 is beyond EOD, truncated [ 1001.291906] loop2: p6 start 1 is beyond EOD, truncated [ 1001.291925] loop2: p7 start 1 is beyond EOD, truncated [ 1001.291944] loop2: p8 start 1 is beyond EOD, truncated [ 1001.291989] loop2: p9 start 1 is beyond EOD, truncated [ 1001.292026] loop2: p10 start 1 is beyond EOD, truncated [ 1001.292045] loop2: p11 start 1 is beyond EOD, truncated [ 1001.292060] loop2: p12 start 1 is beyond EOD, truncated [ 1001.292106] loop2: p13 start 1 is beyond EOD, truncated [ 1001.292124] loop2: p14 start 1 is beyond EOD, truncated [ 1001.292140] loop2: p15 start 1 is beyond EOD, truncated [ 1001.292159] loop2: p16 start 1 is beyond EOD, truncated [ 1001.292179] loop2: p17 start 1 is beyond EOD, truncated [ 1001.292206] loop2: p18 start 1 is beyond EOD, truncated [ 1001.292225] loop2: p19 start 1 is beyond EOD, truncated [ 1001.292244] loop2: p20 start 1 is beyond EOD, truncated [ 1001.292286] loop2: p21 start 1 is beyond EOD, truncated [ 1001.292305] loop2: p22 start 1 is beyond EOD, truncated [ 1001.292324] loop2: p23 start 1 is beyond EOD, truncated [ 1001.292366] loop2: p24 start 1 is beyond EOD, truncated [ 1001.292385] loop2: p25 start 1 is beyond EOD, truncated [ 1001.292400] loop2: p26 start 1 is beyond EOD, truncated [ 1001.292445] loop2: p27 start 1 is beyond EOD, truncated [ 1001.292464] loop2: p28 start 1 is beyond EOD, truncated [ 1001.292506] loop2: p29 start 1 is beyond EOD, truncated [ 1001.292525] loop2: p30 start 1 is beyond EOD, truncated [ 1001.292540] loop2: p31 start 1 is beyond EOD, truncated [ 1001.292766] loop2: p32 start 1 is beyond EOD, truncated [ 1001.292787] loop2: p33 start 1 is beyond EOD, truncated [ 1001.292806] loop2: p34 start 1 is beyond EOD, truncated [ 1001.292825] loop2: p35 start 1 is beyond EOD, truncated [ 1001.292876] loop2: p36 start 1 is beyond EOD, truncated [ 1001.292917] loop2: p37 start 1 is beyond EOD, truncated [ 1001.292936] loop2: p38 start 1 is beyond EOD, truncated [ 1001.292957] loop2: p39 start 1 is beyond EOD, truncated [ 1001.292971] loop2: p40 start 1 is beyond EOD, truncated [ 1001.293028] loop2: p41 start 1 is beyond EOD, truncated [ 1001.293048] loop2: p42 start 1 is beyond EOD, truncated [ 1001.293068] loop2: p43 start 1 is beyond EOD, truncated [ 1001.293088] loop2: p44 start 1 is beyond EOD, truncated [ 1001.293109] loop2: p45 start 1 is beyond EOD, truncated [ 1001.293128] loop2: p46 start 1 is beyond EOD, truncated [ 1001.293149] loop2: p47 start 1 is beyond EOD, truncated [ 1001.293168] loop2: p48 start 1 is beyond EOD, truncated [ 1001.293188] loop2: p49 start 1 is beyond EOD, truncated [ 1001.293208] loop2: p50 start 1 is beyond EOD, truncated [ 1001.293227] loop2: p51 start 1 is beyond EOD, truncated [ 1001.293247] loop2: p52 start 1 is beyond EOD, truncated [ 1001.293267] loop2: p53 start 1 is beyond EOD, truncated [ 1001.293287] loop2: p54 start 1 is beyond EOD, truncated [ 1001.293308] loop2: p55 start 1 is beyond EOD, truncated [ 1001.293327] loop2: p56 start 1 is beyond EOD, truncated [ 1001.293346] loop2: p57 start 1 is beyond EOD, truncated [ 1001.293366] loop2: p58 start 1 is beyond EOD, truncated [ 1001.293381] loop2: p59 start 1 is beyond EOD, truncated [ 1001.293428] loop2: p60 start 1 is beyond EOD, truncated [ 1001.293448] loop2: p61 start 1 is beyond EOD, truncated [ 1001.293467] loop2: p62 start 1 is beyond EOD, truncated [ 1001.293486] loop2: p63 start 1 is beyond EOD, truncated [ 1001.293506] loop2: p64 start 1 is beyond EOD, truncated [ 1001.293522] loop2: p65 start 1 is beyond EOD, truncated [ 1001.293588] loop2: p66 start 1 is beyond EOD, truncated [ 1001.293608] loop2: p67 start 1 is beyond EOD, truncated [ 1001.293628] loop2: p68 start 1 is beyond EOD, truncated [ 1001.293648] loop2: p69 start 1 is beyond EOD, truncated [ 1001.293667] loop2: p70 start 1 is beyond EOD, truncated [ 1001.293911] loop2: p71 start 1 is beyond EOD, truncated [ 1001.293942] loop2: p72 start 1 is beyond EOD, truncated [ 1001.293962] loop2: p73 start 1 is beyond EOD, truncated [ 1001.293990] loop2: p74 start 1 is beyond EOD, truncated [ 1001.294009] loop2: p75 start 1 is beyond EOD, truncated [ 1001.294030] loop2: p76 start 1 is beyond EOD, truncated [ 1001.294050] loop2: p77 start 1 is beyond EOD, truncated [ 1001.294069] loop2: p78 start 1 is beyond EOD, truncated [ 1001.294090] loop2: p79 start 1 is beyond EOD, truncated [ 1001.294110] loop2: p80 start 1 is beyond EOD, truncated [ 1001.294129] loop2: p81 start 1 is beyond EOD, truncated [ 1001.294149] loop2: p82 start 1 is beyond EOD, truncated [ 1001.294168] loop2: p83 start 1 is beyond EOD, truncated [ 1001.294189] loop2: p84 start 1 is beyond EOD, truncated [ 1001.294209] loop2: p85 start 1 is beyond EOD, truncated [ 1001.294229] loop2: p86 start 1 is beyond EOD, truncated [ 1001.294248] loop2: p87 start 1 is beyond EOD, truncated [ 1001.294268] loop2: p88 start 1 is beyond EOD, truncated [ 1001.294288] loop2: p89 start 1 is beyond EOD, truncated [ 1001.294307] loop2: p90 start 1 is beyond EOD, truncated [ 1001.294370] loop2: p91 start 1 is beyond EOD, truncated [ 1001.294390] loop2: p92 start 1 is beyond EOD, truncated [ 1001.294410] loop2: p93 start 1 is beyond EOD, truncated [ 1001.294429] loop2: p94 start 1 is beyond EOD, truncated [ 1001.294449] loop2: p95 start 1 is beyond EOD, truncated [ 1001.294469] loop2: p96 start 1 is beyond EOD, truncated [ 1001.294488] loop2: p97 start 1 is beyond EOD, truncated [ 1001.294507] loop2: p98 start 1 is beyond EOD, truncated [ 1001.294542] loop2: p99 start 1 is beyond EOD, truncated [ 1001.294589] loop2: p100 start 1 is beyond EOD, truncated [ 1001.294609] loop2: p101 start 1 is beyond EOD, truncated [ 1001.294628] loop2: p102 start 1 is beyond EOD, truncated [ 1001.294648] loop2: p103 start 1 is beyond EOD, truncated [ 1001.294667] loop2: p104 start 1 is beyond EOD, truncated [ 1001.294702] loop2: p105 start 1 is beyond EOD, truncated [ 1001.294723] loop2: p106 start 1 is beyond EOD, truncated [ 1001.294770] loop2: p107 start 1 is beyond EOD, truncated [ 1001.294789] loop2: p108 start 1 is beyond EOD, truncated [ 1001.294808] loop2: p109 start 1 is beyond EOD, truncated [ 1001.294828] loop2: p110 start 1 is beyond EOD, truncated [ 1001.295057] loop2: p111 start 1 is beyond EOD, truncated [ 1001.295096] loop2: p112 start 1 is beyond EOD, truncated [ 1001.295116] loop2: p113 start 1 is beyond EOD, truncated [ 1001.295137] loop2: p114 start 1 is beyond EOD, truncated [ 1001.295157] loop2: p115 start 1 is beyond EOD, truncated [ 1001.295177] loop2: p116 start 1 is beyond EOD, truncated [ 1001.295197] loop2: p117 start 1 is beyond EOD, truncated [ 1001.295217] loop2: p118 start 1 is beyond EOD, truncated [ 1001.295256] loop2: p119 start 1 is beyond EOD, truncated [ 1001.295276] loop2: p120 start 1 is beyond EOD, truncated [ 1001.295295] loop2: p121 start 1 is beyond EOD, truncated [ 1001.295316] loop2: p122 start 1 is beyond EOD, truncated [ 1001.295336] loop2: p123 start 1 is beyond EOD, truncated [ 1001.295375] loop2: p124 start 1 is beyond EOD, truncated [ 1001.295396] loop2: p125 start 1 is beyond EOD, truncated [ 1001.295416] loop2: p126 start 1 is beyond EOD, truncated [ 1001.295436] loop2: p127 start 1 is beyond EOD, truncated [ 1001.295456] loop2: p128 start 1 is beyond EOD, truncated [ 1001.295476] loop2: p129 start 1 is beyond EOD, truncated [ 1001.295496] loop2: p130 start 1 is beyond EOD, truncated [ 1001.295515] loop2: p131 start 1 is beyond EOD, truncated [ 1001.295536] loop2: p132 start 1 is beyond EOD, truncated [ 1001.295555] loop2: p133 start 1 is beyond EOD, truncated [ 1001.295575] loop2: p134 start 1 is beyond EOD, truncated [ 1001.295594] loop2: p135 start 1 is beyond EOD, truncated [ 1001.295614] loop2: p136 start 1 is beyond EOD, truncated [ 1001.295630] loop2: p137 start 1 is beyond EOD, truncated [ 1001.295668] loop2: p138 start 1 is beyond EOD, truncated [ 1001.295688] loop2: p139 start 1 is beyond EOD, truncated [ 1001.295708] loop2: p140 start 1 is beyond EOD, truncated [ 1001.295729] loop2: p141 start 1 is beyond EOD, truncated [ 1001.295767] loop2: p142 start 1 is beyond EOD, truncated [ 1001.295789] loop2: p143 start 1 is beyond EOD, truncated [ 1001.295836] loop2: p144 start 1 is beyond EOD, truncated [ 1001.295856] loop2: p145 start 1 is beyond EOD, truncated [ 1001.295907] loop2: p146 start 1 is beyond EOD, truncated [ 1001.295936] loop2: p147 start 1 is beyond EOD, truncated [ 1001.295956] loop2: p148 start 1 is beyond EOD, truncated [ 1001.295976] loop2: p149 start 1 is beyond EOD, truncated [ 1001.296196] loop2: p150 start 1 is beyond EOD, truncated [ 1001.296226] loop2: p151 start 1 is beyond EOD, truncated [ 1001.296246] loop2: p152 start 1 is beyond EOD, truncated [ 1001.296266] loop2: p153 start 1 is beyond EOD, truncated [ 1001.296287] loop2: p154 start 1 is beyond EOD, truncated [ 1001.296353] loop2: p155 start 1 is beyond EOD, truncated [ 1001.296374] loop2: p156 start 1 is beyond EOD, truncated [ 1001.296394] loop2: p157 start 1 is beyond EOD, truncated [ 1001.296415] loop2: p158 start 1 is beyond EOD, truncated [ 1001.296435] loop2: p159 start 1 is beyond EOD, truncated [ 1001.296455] loop2: p160 start 1 is beyond EOD, truncated [ 1001.296475] loop2: p161 start 1 is beyond EOD, truncated [ 1001.296494] loop2: p162 start 1 is beyond EOD, truncated [ 1001.296515] loop2: p163 start 1 is beyond EOD, truncated [ 1001.296535] loop2: p164 start 1 is beyond EOD, truncated [ 1001.296555] loop2: p165 start 1 is beyond EOD, truncated [ 1001.296575] loop2: p166 start 1 is beyond EOD, truncated [ 1001.296594] loop2: p167 start 1 is beyond EOD, truncated [ 1001.296615] loop2: p168 start 1 is beyond EOD, truncated [ 1001.296634] loop2: p169 start 1 is beyond EOD, truncated [ 1001.296654] loop2: p170 start 1 is beyond EOD, truncated [ 1001.296674] loop2: p171 start 1 is beyond EOD, truncated [ 1001.296694] loop2: p172 start 1 is beyond EOD, truncated [ 1001.296713] loop2: p173 start 1 is beyond EOD, truncated [ 1001.296733] loop2: p174 start 1 is beyond EOD, truncated [ 1001.296753] loop2: p175 start 1 is beyond EOD, truncated [ 1001.296768] loop2: p176 start 1 is beyond EOD, truncated [ 1001.296807] loop2: p177 start 1 is beyond EOD, truncated [ 1001.296827] loop2: p178 start 1 is beyond EOD, truncated [ 1001.296846] loop2: p179 start 1 is beyond EOD, truncated [ 1001.296875] loop2: p180 start 1 is beyond EOD, truncated [ 1001.296895] loop2: p181 start 1 is beyond EOD, truncated [ 1001.296915] loop2: p182 start 1 is beyond EOD, truncated [ 1001.296945] loop2: p183 start 1 is beyond EOD, truncated [ 1001.296974] loop2: p184 start 1 is beyond EOD, truncated [ 1001.297027] loop2: p185 start 1 is beyond EOD, truncated [ 1001.297046] loop2: p186 start 1 is beyond EOD, truncated [ 1001.297067] loop2: p187 start 1 is beyond EOD, truncated [ 1001.297086] loop2: p188 start 1 is beyond EOD, truncated [ 1001.297115] loop2: p189 start 1 is beyond EOD, truncated [ 1001.297134] loop2: p190 start 1 is beyond EOD, truncated [ 1001.297365] loop2: p191 start 1 is beyond EOD, truncated [ 1001.297405] loop2: p192 start 1 is beyond EOD, truncated [ 1001.297443] loop2: p193 start 1 is beyond EOD, truncated [ 1001.297463] loop2: p194 start 1 is beyond EOD, truncated [ 1001.297483] loop2: p195 start 1 is beyond EOD, truncated [ 1001.297502] loop2: p196 start 1 is beyond EOD, truncated [ 1001.297522] loop2: p197 start 1 is beyond EOD, truncated [ 1001.297542] loop2: p198 start 1 is beyond EOD, truncated [ 1001.297562] loop2: p199 start 1 is beyond EOD, truncated [ 1001.297582] loop2: p200 start 1 is beyond EOD, truncated [ 1001.297663] loop2: p201 start 1 is beyond EOD, truncated [ 1001.297682] loop2: p202 start 1 is beyond EOD, truncated [ 1001.297702] loop2: p203 start 1 is beyond EOD, truncated [ 1001.297722] loop2: p204 start 1 is beyond EOD, truncated [ 1001.297803] loop2: p205 start 1 is beyond EOD, truncated [ 1001.297823] loop2: p206 start 1 is beyond EOD, truncated [ 1001.297843] loop2: p207 start 1 is beyond EOD, truncated [ 1001.297863] loop2: p208 start 1 is beyond EOD, truncated [ 1001.297925] loop2: p209 start 1 is beyond EOD, truncated [ 1001.297954] loop2: p210 start 1 is beyond EOD, truncated [ 1001.297974] loop2: p211 start 1 is beyond EOD, truncated [ 1001.297997] loop2: p212 start 1 is beyond EOD, truncated [ 1001.298045] loop2: p213 start 1 is beyond EOD, truncated [ 1001.298093] loop2: p214 start 1 is beyond EOD, truncated [ 1001.298113] loop2: p215 start 1 is beyond EOD, truncated [ 1001.298133] loop2: p216 start 1 is beyond EOD, truncated [ 1001.298152] loop2: p217 start 1 is beyond EOD, truncated [ 1001.298172] loop2: p218 start 1 is beyond EOD, truncated [ 1001.298192] loop2: p219 start 1 is beyond EOD, truncated [ 1001.298211] loop2: p220 start 1 is beyond EOD, truncated [ 1001.298246] loop2: p221 start 1 is beyond EOD, truncated [ 1001.298266] loop2: p222 start 1 is beyond EOD, truncated [ 1001.298286] loop2: p223 start 1 is beyond EOD, truncated [ 1001.298521] loop2: p224 start 1 is beyond EOD, truncated [ 1001.298542] loop2: p225 start 1 is beyond EOD, truncated [ 1001.298561] loop2: p226 start 1 is beyond EOD, truncated [ 1001.298581] loop2: p227 start 1 is beyond EOD, truncated [ 1001.298601] loop2: p228 start 1 is beyond EOD, truncated [ 1001.298621] loop2: p229 start 1 is beyond EOD, truncated [ 1001.298642] loop2: p230 start 1 is beyond EOD, truncated [ 1001.298662] loop2: p231 start 1 is beyond EOD, truncated [ 1001.298682] loop2: p232 start 1 is beyond EOD, truncated [ 1001.298702] loop2: p233 start 1 is beyond EOD, truncated [ 1001.298722] loop2: p234 start 1 is beyond EOD, truncated [ 1001.298742] loop2: p235 start 1 is beyond EOD, truncated [ 1001.298762] loop2: p236 start 1 is beyond EOD, truncated [ 1001.298783] loop2: p237 start 1 is beyond EOD, truncated [ 1001.298802] loop2: p238 start 1 is beyond EOD, truncated [ 1001.298823] loop2: p239 start 1 is beyond EOD, truncated [ 1001.298842] loop2: p240 start 1 is beyond EOD, truncated [ 1001.298862] loop2: p241 start 1 is beyond EOD, truncated [ 1001.298905] loop2: p242 start 1 is beyond EOD, truncated [ 1001.298971] loop2: p243 start 1 is beyond EOD, truncated [ 1001.299052] loop2: p244 start 1 is beyond EOD, truncated [ 1001.299072] loop2: p245 start 1 is beyond EOD, truncated [ 1001.299092] loop2: p246 start 1 is beyond EOD, truncated [ 1001.299112] loop2: p247 start 1 is beyond EOD, truncated [ 1001.299132] loop2: p248 start 1 is beyond EOD, truncated [ 1001.299152] loop2: p249 start 1 is beyond EOD, truncated [ 1001.299172] loop2: p250 start 1 is beyond EOD, truncated [ 1001.299192] loop2: p251 start 1 is beyond EOD, truncated [ 1001.299212] loop2: p252 start 1 is beyond EOD, truncated [ 1001.299231] loop2: p253 start 1 is beyond EOD, truncated [ 1001.299252] loop2: p254 start 1 is beyond EOD, truncated [ 1001.299271] loop2: p255 start 1 is beyond EOD, truncated [ 1001.304444] loop3: p1 start 1 is beyond EOD, truncated [ 1001.304475] loop3: p2 size 2 extends beyond EOD, truncated [ 1001.309912] loop4: p1 start 1 is beyond EOD, truncated [ 1001.312647] loop4: p2 size 2 extends beyond EOD, truncated [ 1001.328851] loop1: p1 start 1 is beyond EOD, truncated [ 1001.328909] loop1: p2 size 2 extends beyond EOD, truncated [ 1001.359452] loop1: p3 start 201 is beyond EOD, truncated [ 1001.359483] loop1: p4 start 301 is beyond EOD, truncated [ 1001.359529] loop1: p5 start 1 is beyond EOD, truncated [ 1001.359548] loop1: p6 start 1 is beyond EOD, truncated [ 1001.359581] loop1: p7 start 1 is beyond EOD, truncated [ 1001.359609] loop1: p8 start 1 is beyond EOD, truncated [ 1001.359629] loop1: p9 start 1 is beyond EOD, truncated [ 1001.359648] loop1: p10 start 1 is beyond EOD, truncated [ 1001.359682] loop1: p11 start 1 is beyond EOD, truncated [ 1001.359710] loop1: p12 start 1 is beyond EOD, truncated [ 1001.359729] loop1: p13 start 1 is beyond EOD, truncated [ 1001.359749] loop1: p14 start 1 is beyond EOD, truncated [ 1001.359768] loop1: p15 start 1 is beyond EOD, truncated [ 1001.359809] loop1: p16 start 1 is beyond EOD, truncated [ 1001.359828] loop1: p17 start 1 is beyond EOD, truncated [ 1001.359844] loop1: p18 start 1 is beyond EOD, truncated [ 1001.359891] loop1: p19 start 1 is beyond EOD, truncated [ 1001.359910] loop1: p20 start 1 is beyond EOD, truncated [ 1001.359929] loop1: p21 start 1 is beyond EOD, truncated [ 1001.359948] loop1: p22 start 1 is beyond EOD, truncated [ 1001.359963] loop1: p23 start 1 is beyond EOD, truncated [ 1001.360766] loop1: p24 start 1 is beyond EOD, truncated [ 1001.360787] loop1: p25 start 1 is beyond EOD, truncated [ 1001.360807] loop1: p26 start 1 is beyond EOD, truncated [ 1001.360827] loop1: p27 start 1 is beyond EOD, truncated [ 1001.360846] loop1: p28 start 1 is beyond EOD, truncated [ 1001.360871] loop1: p29 start 1 is beyond EOD, truncated [ 1001.360925] loop1: p30 start 1 is beyond EOD, truncated [ 1001.360944] loop1: p31 start 1 is beyond EOD, truncated [ 1001.360993] loop1: p32 start 1 is beyond EOD, truncated [ 1001.361025] loop1: p33 start 1 is beyond EOD, truncated [ 1001.361044] loop1: p34 start 1 is beyond EOD, truncated [ 1001.361086] loop1: p35 start 1 is beyond EOD, truncated [ 1001.361105] loop1: p36 start 1 is beyond EOD, truncated [ 1001.361124] loop1: p37 start 1 is beyond EOD, truncated [ 1001.361158] loop1: p38 start 1 is beyond EOD, truncated [ 1001.361186] loop1: p39 start 1 is beyond EOD, truncated [ 1001.361224] loop1: p40 start 1 is beyond EOD, truncated [ 1001.361259] loop1: p41 start 1 is beyond EOD, truncated [ 1001.361299] loop1: p42 start 1 is beyond EOD, truncated [ 1001.361340] loop1: p43 start 1 is beyond EOD, truncated [ 1001.361379] loop1: p44 start 1 is beyond EOD, truncated [ 1001.361447] loop1: p45 start 1 is beyond EOD, truncated [ 1001.361507] loop1: p46 start 1 is beyond EOD, truncated [ 1001.361547] loop1: p47 start 1 is beyond EOD, truncated [ 1001.361587] loop1: p48 start 1 is beyond EOD, truncated [ 1001.361757] loop1: p49 start 1 is beyond EOD, truncated [ 1001.361956] loop1: p50 start 1 is beyond EOD, truncated [ 1001.361996] loop1: p51 start 1 is beyond EOD, truncated [ 1001.362037] loop1: p52 start 1 is beyond EOD, truncated [ 1001.362076] loop1: p53 start 1 is beyond EOD, truncated [ 1001.362096] loop1: p54 start 1 is beyond EOD, truncated [ 1001.362136] loop1: p55 start 1 is beyond EOD, truncated [ 1001.362157] loop1: p56 start 1 is beyond EOD, truncated [ 1001.362295] loop1: p57 start 1 is beyond EOD, truncated [ 1001.362316] loop1: p58 start 1 is beyond EOD, truncated [ 1001.362342] loop1: p59 start 1 is beyond EOD, truncated [ 1001.362363] loop1: p60 start 1 is beyond EOD, truncated [ 1001.362397] loop1: p61 start 1 is beyond EOD, truncated [ 1001.362446] loop1: p62 start 1 is beyond EOD, truncated [ 1001.362493] loop1: p63 start 1 is beyond EOD, truncated [ 1001.362513] loop1: p64 start 1 is beyond EOD, truncated [ 1001.362533] loop1: p65 start 1 is beyond EOD, truncated [ 1001.362553] loop1: p66 start 1 is beyond EOD, truncated [ 1001.362573] loop1: p67 start 1 is beyond EOD, truncated [ 1001.362592] loop1: p68 start 1 is beyond EOD, truncated [ 1001.362613] loop1: p69 start 1 is beyond EOD, truncated [ 1001.362633] loop1: p70 start 1 is beyond EOD, truncated [ 1001.362653] loop1: p71 start 1 is beyond EOD, truncated [ 1001.362672] loop1: p72 start 1 is beyond EOD, truncated [ 1001.362692] loop1: p73 start 1 is beyond EOD, truncated [ 1001.362712] loop1: p74 start 1 is beyond EOD, truncated [ 1001.362873] loop1: p75 start 1 is beyond EOD, truncated [ 1001.362894] loop1: p76 start 1 is beyond EOD, truncated [ 1001.363066] loop1: p77 start 1 is beyond EOD, truncated [ 1001.363097] loop1: p78 start 1 is beyond EOD, truncated [ 1001.363117] loop1: p79 start 1 is beyond EOD, truncated [ 1001.363156] loop1: p80 start 1 is beyond EOD, truncated [ 1001.363196] loop1: p81 start 1 is beyond EOD, truncated [ 1001.363216] loop1: p82 start 1 is beyond EOD, truncated [ 1001.363237] loop1: p83 start 1 is beyond EOD, truncated [ 1001.363277] loop1: p84 start 1 is beyond EOD, truncated [ 1001.363316] loop1: p85 start 1 is beyond EOD, truncated [ 1001.363336] loop1: p86 start 1 is beyond EOD, truncated [ 1001.363357] loop1: p87 start 1 is beyond EOD, truncated [ 1001.363396] loop1: p88 start 1 is beyond EOD, truncated [ 1001.363416] loop1: p89 start 1 is beyond EOD, truncated [ 1001.363436] loop1: p90 start 1 is beyond EOD, truncated [ 1001.363456] loop1: p91 start 1 is beyond EOD, truncated [ 1001.363476] loop1: p92 start 1 is beyond EOD, truncated [ 1001.363504] loop1: p93 start 1 is beyond EOD, truncated [ 1001.363524] loop1: p94 start 1 is beyond EOD, truncated [ 1001.363544] loop1: p95 start 1 is beyond EOD, truncated [ 1001.363578] loop1: p96 start 1 is beyond EOD, truncated [ 1001.363634] loop1: p97 start 1 is beyond EOD, truncated [ 1001.363653] loop1: p98 start 1 is beyond EOD, truncated [ 1001.363673] loop1: p99 start 1 is beyond EOD, truncated [ 1001.363693] loop1: p100 start 1 is beyond EOD, truncated [ 1001.363713] loop1: p101 start 1 is beyond EOD, truncated [ 1001.363733] loop1: p102 start 1 is beyond EOD, truncated [ 1001.363753] loop1: p103 start 1 is beyond EOD, truncated [ 1001.363773] loop1: p104 start 1 is beyond EOD, truncated [ 1001.363793] loop1: p105 start 1 is beyond EOD, truncated [ 1001.363813] loop1: p106 start 1 is beyond EOD, truncated [ 1001.363832] loop1: p107 start 1 is beyond EOD, truncated [ 1001.363852] loop1: p108 start 1 is beyond EOD, truncated [ 1001.364015] loop1: p109 start 1 is beyond EOD, truncated [ 1001.364054] loop1: p110 start 1 is beyond EOD, [ 1001.364400] loop4: p3 start 201 is beyond EOD, truncated [ 1001.364459] loop4: p4 start 301 is beyond EOD, truncated [ 1001.364498] loop4: p5 start 1 is beyond EOD, truncated [ 1001.364519] loop4: p6 start 1 is beyond EOD, truncated [ 1001.364558] loop4: p7 start 1 is beyond EOD, truncated [ 1001.364578] loop4: p8 start 1 is beyond EOD, truncated [ 1001.364598] loop4: p9 start 1 is beyond EOD, truncated [ 1001.364618] loop4: p10 start 1 is beyond EOD, truncated [ 1001.364638] loop4: p11 start 1 is beyond EOD, truncated [ 1001.364659] loop4: p12 start 1 is beyond EOD, truncated [ 1001.364698] loop4: p13 start 1 is beyond EOD, truncated [ 1001.364718] loop4: p14 start 1 is beyond EOD, truncated [ 1001.364758] loop4: p15 start 1 is beyond EOD, truncated [ 1001.364778] loop4: p16 start 1 is beyond EOD, truncated [ 1001.364817] loop4: p17 start 1 is beyond EOD, truncated [ 1001.364837] loop4: p18 start 1 is beyond EOD, truncated [ 1001.364859] loop4: p19 start 1 is beyond EOD, truncated [ 1001.364887] loop4: p20 start 1 is beyond EOD, truncated [ 1001.364908] loop4: p21 start 1 is beyond EOD, truncated [ 1001.364927] loop4: p22 start 1 is beyond EOD, truncated [ 1001.364948] loop4: p23 start 1 is beyond EOD, truncated [ 1001.364967] loop4: p24 start 1 is beyond EOD, truncated [ 1001.364991] loop4: p25 start 1 is beyond EOD, [ 1001.365133] truncated [ 1001.365161] loop1: p111 start 1 is beyond EOD, truncated [ 1001.365311] loop1: p112 start 1 is beyond EOD, truncated [ 1001.365351] loop1: p113 start 1 is beyond EOD, truncated [ 1001.365372] loop1: p114 start 1 is beyond EOD, truncated [ 1001.365439] loop1: p115 start 1 is beyond EOD, truncated [ 1001.365459] loop1: p116 start 1 is beyond EOD, truncated [ 1001.365479] loop1: p117 start 1 is beyond EOD, truncated [ 1001.365499] loop1: p118 start 1 is beyond EOD, truncated [ 1001.365519] loop1: p119 start 1 is beyond EOD, truncated [ 1001.365539] loop1: p120 start 1 is beyond EOD, truncated [ 1001.365559] loop1: p121 start 1 is beyond EOD, truncated [ 1001.365579] loop1: p122 start 1 is beyond EOD, truncated [ 1001.365599] loop1: p123 start 1 is beyond EOD, truncated [ 1001.365619] loop1: p124 start 1 is beyond EOD, truncated [ 1001.365639] loop1: p125 start 1 is beyond EOD, truncated [ 1001.365659] loop1: p126 start 1 is beyond EOD, truncated [ 1001.365679] loop1: p127 start 1 is beyond EOD, truncated [ 1001.365699] loop1: p128 start 1 is beyond EOD, truncated [ 1001.365719] loop1: p129 start 1 is beyond EOD, truncated [ 1001.365738] loop1: p130 start 1 is beyond EOD, truncated [ 1001.365759] loop1: p131 start 1 is beyond EOD, [ 1001.365767] loop3: p3 start 201 is beyond EOD, [ 1001.365771] truncated [ 1001.365779] loop1: p132 start 1 is beyond EOD, [ 1001.365785] truncated [ 1001.365790] truncated [ 1001.365797] loop1: p133 start 1 is beyond EOD, [ 1001.365805] loop3: p4 start 301 is beyond EOD, [ 1001.365809] truncated [ 1001.365817] loop1: p134 start 1 is beyond EOD, [ 1001.365823] truncated [ 1001.365837] loop3: p5 start 1 is beyond EOD, truncated [ 1001.365852] truncated [ 1001.365857] loop3: p6 start 1 is beyond EOD, truncated [ 1001.365898] loop1: p135 start 1 is beyond EOD, [ 1001.365906] loop3: p7 start 1 is beyond EOD, [ 1001.365910] truncated [ 1001.365918] loop1: p136 start 1 is beyond EOD, [ 1001.365924] truncated [ 1001.365930] truncated [ 1001.365937] loop1: p137 start 1 is beyond EOD, [ 1001.365944] loop3: p8 start 1 is beyond EOD, truncated [ 1001.365964] loop3: p9 start 1 is beyond EOD, [ 1001.365980] truncated [ 1001.365984] truncated [ 1001.365997] loop1: p138 start 1 is beyond EOD, [ 1001.366005] loop3: p10 start 1 is beyond EOD, [ 1001.366010] truncated [ 1001.366018] loop1: p139 start 1 is beyond EOD, [ 1001.366023] truncated [ 1001.366029] truncated [ 1001.366037] loop1: p140 start 1 is beyond EOD, [ 1001.366046] loop3: p11 start 1 is beyond EOD, [ 1001.366050] truncated [ 1001.366058] loop1: p141 start 1 is beyond EOD, [ 1001.366064] truncated [ 1001.366069] truncated [ 1001.366077] loop1: p142 start 1 is beyond EOD, [ 1001.366084] loop3: p12 start 1 is beyond EOD, truncated [ 1001.366097] truncated [ 1001.366104] loop3: p13 start 1 is beyond EOD, truncated [ 1001.366125] loop3: p14 start 1 is beyond EOD, truncated [ 1001.366145] loop3: p15 start 1 is beyond EOD, truncated [ 1001.366165] loop3: p16 start 1 is beyond EOD, truncated [ 1001.366205] loop3: p17 start 1 is beyond EOD, truncated [ 1001.366245] loop3: p18 start 1 is beyond EOD, truncated [ 1001.366264] loop3: p19 start 1 is beyond EOD, truncated [ 1001.366283] loop3: p20 start 1 is beyond EOD, truncated [ 1001.366299] loop3: p21 start 1 is beyond EOD, truncated [ 1001.366323] loop3: p22 start 1 is beyond EOD, truncated [ 1001.366344] loop3: p23 start 1 is beyond EOD, truncated [ 1001.366366] loop3: p24 start 1 is beyond EOD, truncated [ 1001.366406] loop3: p25 start 1 is beyond EOD, truncated [ 1001.366465] loop3: p26 start 1 is beyond EOD, truncated [ 1001.366499] loop3: p27 start 1 is beyond EOD, truncated [ 1001.366564] loop3: p28 start 1 is beyond EOD, truncated [ 1001.366584] loop3: p29 start 1 is beyond EOD, truncated [ 1001.366603] loop3: p30 start 1 is beyond EOD, truncated [ 1001.366666] loop3: p31 start 1 is beyond EOD, truncated [ 1001.366706] loop3: p32 start 1 is beyond EOD, truncated [ 1001.366746] loop3: p33 start 1 is beyond EOD, truncated [ 1001.366765] loop3: p34 start 1 is beyond EOD, truncated [ 1001.366804] loop3: p35 start 1 is beyond EOD, [ 1001.366982] truncated [ 1001.367026] loop4: p26 start 1 is beyond EOD, truncated [ 1001.367041] loop4: p27 start 1 is beyond EOD, truncated [ 1001.367087] loop4: p28 start 1 is beyond EOD, truncated [ 1001.367108] loop4: p29 start 1 is beyond EOD, truncated [ 1001.367147] loop4: p30 start 1 is beyond EOD, truncated [ 1001.367188] loop4: p31 start 1 is beyond EOD, truncated [ 1001.367399] loop1: p143 start 1 is beyond EOD, truncated [ 1001.367541] loop1: p144 start 1 is beyond EOD, truncated [ 1001.367561] loop1: p145 start 1 is beyond EOD, truncated [ 1001.367600] loop1: p146 start 1 is beyond EOD, truncated [ 1001.367619] loop1: p147 start 1 is beyond EOD, truncated [ 1001.367660] loop1: p148 start 1 is beyond EOD, truncated [ 1001.367679] loop1: p149 start 1 is beyond EOD, truncated [ 1001.367700] loop1: p150 start 1 is beyond EOD, truncated [ 1001.367720] loop1: p151 start 1 is beyond EOD, truncated [ 1001.367740] loop1: p152 start 1 is beyond EOD, truncated [ 1001.367759] loop1: p153 start 1 is beyond EOD, truncated [ 1001.367779] loop1: p154 start 1 is beyond EOD, truncated [ 1001.367800] loop1: p155 start 1 is beyond EOD, truncated [ 1001.367821] loop1: p156 start 1 is beyond EOD, truncated [ 1001.367841] loop1: p157 start 1 is beyond EOD, truncated [ 1001.367871] loop1: p158 start 1 is beyond EOD, truncated [ 1001.367911] loop1: p159 start 1 is beyond EOD, truncated [ 1001.367930] loop1: p160 start 1 is beyond EOD, truncated [ 1001.367950] loop1: p161 start 1 is beyond EOD, truncated [ 1001.367969] loop1: p162 start 1 is beyond EOD, truncated [ 1001.368080] loop1: p163 start 1 is beyond EOD, truncated [ 1001.368099] loop1: p164 start 1 is beyond EOD, truncated [ 1001.368114] loop1: p165 start 1 is beyond EOD, truncated [ 1001.368154] loop1: p166 start 1 is beyond EOD, truncated [ 1001.368202] loop1: p167 start 1 is beyond EOD, truncated [ 1001.368221] loop1: p168 start 1 is beyond EOD, truncated [ 1001.368240] loop1: p169 start 1 is beyond EOD, truncated [ 1001.368258] loop1: p170 start 1 is beyond EOD, truncated [ 1001.368313] loop1: p171 start 1 is beyond EOD, truncated [ 1001.368380] loop1: p172 start 1 is beyond EOD, [ 1001.368636] loop4: p32 start 1 is beyond EOD, truncated [ 1001.368686] loop4: p33 start 1 is beyond EOD, truncated [ 1001.368726] loop4: p34 start 1 is beyond EOD, truncated [ 1001.368751] loop4: p35 start 1 is beyond EOD, truncated [ 1001.368771] loop4: p36 start 1 is beyond EOD, truncated [ 1001.368792] loop4: p37 start 1 is beyond EOD, truncated [ 1001.368812] loop4: p38 start 1 is beyond EOD, truncated [ 1001.368832] loop4: p39 start 1 is beyond EOD, truncated [ 1001.368852] loop4: p40 start 1 is beyond EOD, truncated [ 1001.368891] loop4: p41 start 1 is beyond EOD, truncated [ 1001.368913] loop4: p42 start 1 is beyond EOD, [ 1001.368977] truncated [ 1001.369000] loop3: p36 start 1 is beyond EOD, truncated [ 1001.369026] truncated [ 1001.369034] loop4: p43 start 1 is beyond EOD, [ 1001.369043] loop3: p37 start 1 is beyond EOD, [ 1001.369047] truncated [ 1001.369054] truncated [ 1001.369063] loop3: p38 start 1 is beyond EOD, [ 1001.369074] loop4: p44 start 1 is beyond EOD, [ 1001.369076] truncated [ 1001.369086] truncated [ 1001.369094] loop4: p45 start 1 is beyond EOD, [ 1001.369104] loop3: p39 start 1 is beyond EOD, [ 1001.369106] truncated [ 1001.369114] loop4: p46 start 1 is beyond EOD, [ 1001.369116] truncated [ 1001.369126] truncated [ 1001.369134] loop4: p47 start 1 is beyond EOD, [ 1001.369144] loop3: p40 start 1 is beyond EOD, [ 1001.369146] truncated [ 1001.369154] loop4: p48 start 1 is beyond EOD, [ 1001.369156] truncated [ 1001.369167] truncated [ 1001.369174] loop3: p41 start 1 is beyond EOD, truncated [ 1001.369194] loop4: p49 start 1 is beyond EOD, [ 1001.369201] loop3: p42 start 1 is beyond EOD, [ 1001.369205] truncated [ 1001.369213] loop4: p50 start 1 is beyond EOD, [ 1001.369215] truncated [ 1001.369223] loop3: p43 start 1 is beyond EOD, [ 1001.369225] truncated [ 1001.369233] loop4: p51 start 1 is beyond EOD, [ 1001.369235] truncated [ 1001.369245] truncated [ 1001.369254] loop4: p52 start 1 is beyond EOD, [ 1001.369262] loop3: p44 start 1 is beyond EOD, [ 1001.369266] truncated [ 1001.369273] loop4: p53 start 1 is beyond EOD, [ 1001.369275] truncated [ 1001.369285] truncated [ 1001.369293] loop4: p54 start 1 is beyond EOD, [ 1001.369303] loop3: p45 start 1 is beyond EOD, [ 1001.369306] truncated [ 1001.369314] loop4: p55 start 1 is beyond EOD, [ 1001.369316] truncated [ 1001.369325] truncated [ 1001.369333] loop4: p56 start 1 is beyond EOD, truncated [ 1001.369353] loop4: p57 start 1 is beyond EOD, [ 1001.369362] loop3: p46 start 1 is beyond EOD, [ 1001.369365] truncated [ 1001.369373] loop4: p58 start 1 is beyond EOD, [ 1001.369375] truncated [ 1001.369385] truncated [ 1001.369393] loop4: p59 start 1 is beyond EOD, [ 1001.369403] loop3: p47 start 1 is beyond EOD, [ 1001.369404] truncated [ 1001.369413] loop4: p60 start 1 is beyond EOD, [ 1001.369415] truncated [ 1001.369422] loop3: p48 start 1 is beyond EOD, [ 1001.369425] truncated [ 1001.369432] loop4: p61 start 1 is beyond EOD, [ 1001.369435] truncated [ 1001.369442] loop3: p49 start 1 is beyond EOD, [ 1001.369444] truncated [ 1001.369452] loop4: p62 start 1 is beyond EOD, [ 1001.369454] truncated [ 1001.369462] loop3: p50 start 1 is beyond EOD, [ 1001.369465] truncated [ 1001.369472] loop4: p63 start 1 is beyond EOD, [ 1001.369474] truncated [ 1001.369484] truncated [ 1001.369492] loop4: p64 start 1 is beyond EOD, [ 1001.369495] loop3: p51 start 1 is beyond EOD, [ 1001.369504] truncated [ 1001.369512] loop4: p65 start 1 is beyond EOD, [ 1001.369521] truncated [ 1001.369540] loop3: p52 start 1 is beyond EOD, truncated [ 1001.369576] loop3: p53 start 1 is beyond EOD, truncated [ 1001.369596] loop3: p54 start 1 is beyond EOD, truncated [ 1001.369620] loop3: p55 start 1 is beyond EOD, truncated [ 1001.369642] loop3: p56 start 1 is beyond EOD, truncated [ 1001.369682] loop3: p57 start 1 is beyond EOD, truncated [ 1001.369703] loop3: p58 start 1 is beyond EOD, truncated [ 1001.369723] loop3: p59 start 1 is beyond EOD, truncated [ 1001.369754] truncated [ 1001.369762] loop3: p60 start 1 is beyond EOD, [ 1001.369773] loop1: p173 start 1 is beyond EOD, [ 1001.369775] truncated [ 1001.369781] loop3: p61 start 1 is beyond EOD, [ 1001.369783] truncated [ 1001.369793] truncated [ 1001.369800] loop1: p174 start 1 is beyond EOD, [ 1001.369803] loop3: p62 start 1 is beyond EOD, [ 1001.369813] truncated [ 1001.369820] loop1: p175 start 1 is beyond EOD, [ 1001.369822] truncated [ 1001.369832] truncated [ 1001.369835] loop3: p63 start 1 is beyond EOD, [ 1001.369841] loop1: p176 start 1 is beyond EOD, [ 1001.369843] truncated [ 1001.369853] truncated [ 1001.369868] loop3: p64 start 1 is beyond EOD, [ 1001.369872] loop1: p177 start 1 is beyond EOD, truncated [ 1001.369893] truncated [ 1001.369901] loop3: p65 start 1 is beyond EOD, [ 1001.369911] loop1: p178 start 1 is beyond EOD, [ 1001.369914] truncated [ 1001.369922] loop3: p66 start 1 is beyond EOD, [ 1001.369924] truncated [ 1001.369934] truncated [ 1001.369942] loop3: p67 start 1 is beyond EOD, [ 1001.369952] loop1: p179 start 1 is beyond EOD, [ 1001.369954] truncated [ 1001.369963] loop3: p68 start 1 is beyond EOD, [ 1001.369964] truncated [ 1001.369974] truncated [ 1001.369982] loop3: p69 start 1 is beyond EOD, [ 1001.369993] loop1: p180 start 1 is beyond EOD, [ 1001.369995] truncated [ 1001.370001] loop3: p70 start 1 is beyond EOD, [ 1001.370003] truncated [ 1001.370225] truncated [ 1001.370235] loop4: p66 start 1 is beyond EOD, truncated [ 1001.370293] loop4: p67 start 1 is beyond EOD, truncated [ 1001.370332] loop4: p68 start 1 is beyond EOD, truncated [ 1001.370352] loop4: p69 start 1 is beyond EOD, truncated [ 1001.370373] loop4: p70 start 1 is beyond EOD, truncated [ 1001.370393] loop4: p71 start 1 is beyond EOD, truncated [ 1001.370413] loop4: p72 start 1 is beyond EOD, truncated [ 1001.370432] loop4: p73 start 1 is beyond EOD, truncated [ 1001.370452] loop4: p74 start 1 is beyond EOD, truncated [ 1001.370472] loop4: p75 start 1 is beyond EOD, truncated [ 1001.370492] loop4: p76 start 1 is beyond EOD, truncated [ 1001.370512] loop4: p77 start 1 is beyond EOD, truncated [ 1001.370531] loop4: p78 start 1 is beyond EOD, truncated [ 1001.370551] loop4: p79 start 1 is beyond EOD, truncated [ 1001.370572] loop4: p80 start 1 is beyond EOD, truncated [ 1001.370592] loop4: p81 start 1 is beyond EOD, truncated [ 1001.370612] loop4: p82 start 1 is beyond EOD, truncated [ 1001.370631] loop4: p83 start 1 is beyond EOD, truncated [ 1001.370651] loop4: p84 start 1 is beyond EOD, truncated [ 1001.370670] loop4: p85 start 1 is beyond EOD, [ 1001.370707] truncated [ 1001.370731] loop3: p71 start 1 is beyond EOD, truncated [ 1001.370752] loop3: p72 start 1 is beyond EOD, truncated [ 1001.370773] loop3: p73 start 1 is beyond EOD, truncated [ 1001.370835] loop3: p74 start 1 is beyond EOD, truncated [ 1001.370904] loop3: p75 start 1 is beyond EOD, [ 1001.370914] loop1: p181 start 1 is beyond EOD, [ 1001.370916] truncated [ 1001.370927] truncated [ 1001.370935] loop1: p182 start 1 is beyond EOD, [ 1001.370944] loop3: p76 start 1 is beyond EOD, [ 1001.370947] truncated [ 1001.370955] loop1: p183 start 1 is beyond EOD, [ 1001.370957] truncated [ 1001.370966] truncated [ 1001.370975] loop1: p184 start 1 is beyond EOD, [ 1001.370984] loop3: p77 start 1 is beyond EOD, truncated [ 1001.371003] loop3: p78 start 1 is beyond EOD, [ 1001.371006] truncated [ 1001.371014] loop1: p185 start 1 is beyond EOD, [ 1001.371016] truncated [ 1001.371023] loop3: p79 start 1 is beyond EOD, [ 1001.371026] truncated [ 1001.371034] loop1: p186 start 1 is beyond EOD, [ 1001.371036] truncated [ 1001.371047] truncated [ 1001.371055] loop1: p187 start 1 is beyond EOD, [ 1001.371063] loop3: p80 start 1 is beyond EOD, [ 1001.371067] truncated [ 1001.371075] loop1: p188 start 1 is beyond EOD, [ 1001.371076] truncated [ 1001.371086] truncated [ 1001.371095] loop1: p189 start 1 is beyond EOD, [ 1001.371103] loop3: p81 start 1 is beyond EOD, [ 1001.371107] truncated [ 1001.371115] loop1: p190 start 1 is beyond EOD, [ 1001.371116] truncated [ 1001.371126] truncated [ 1001.371134] loop1: p191 start 1 is beyond EOD, [ 1001.371143] loop3: p82 start 1 is beyond EOD, [ 1001.371146] truncated [ 1001.371154] loop1: p192 start 1 is beyond EOD, [ 1001.371156] truncated [ 1001.371166] truncated [ 1001.371174] loop1: p193 start 1 is beyond EOD, [ 1001.371183] loop3: p83 start 1 is beyond EOD, [ 1001.371186] truncated [ 1001.371194] loop1: p194 start 1 is beyond EOD, [ 1001.371196] truncated [ 1001.371204] loop3: p84 start 1 is beyond EOD, [ 1001.371206] truncated [ 1001.371214] loop1: p195 start 1 is beyond EOD, [ 1001.371216] truncated [ 1001.371223] loop3: p85 start 1 is beyond EOD, [ 1001.371226] truncated [ 1001.371234] loop1: p196 start 1 is beyond EOD, [ 1001.371236] truncated [ 1001.371243] loop3: p86 start 1 is beyond EOD, [ 1001.371246] truncated [ 1001.371254] loop1: p197 start 1 is beyond EOD, truncated [ 1001.371274] loop1: p198 start 1 is beyond EOD, truncated [ 1001.371294] loop1: p199 start 1 is beyond EOD, truncated [ 1001.371313] loop1: p200 start 1 is beyond EOD, truncated [ 1001.371328] loop1: p201 start 1 is beyond EOD, truncated [ 1001.371364] truncated [ 1001.371374] loop1: p202 start 1 is beyond EOD, [ 1001.371378] loop3: p87 start 1 is beyond EOD, [ 1001.371386] truncated [ 1001.371394] loop1: p203 start 1 is beyond EOD, [ 1001.371400] truncated [ 1001.371406] truncated [ 1001.371413] loop1: p204 start 1 is beyond EOD, [ 1001.371421] loop3: p88 start 1 is beyond EOD, truncated [ 1001.371434] truncated [ 1001.371442] loop3: p89 start 1 is beyond EOD, [ 1001.371448] loop1: p205 start 1 is beyond EOD, [ 1001.371454] truncated [ 1001.371473] truncated [ 1001.371484] loop3: p90 start 1 is beyond EOD, [ 1001.371495] loop1: p206 start 1 is beyond EOD, [ 1001.371500] truncated [ 1001.371507] truncated [ 1001.371514] loop1: p207 start 1 is beyond EOD, [ 1001.371521] loop3: p91 start 1 is beyond EOD, [ 1001.371526] truncated [ 1001.371534] loop1: p208 start 1 is beyond EOD, [ 1001.371535] truncated [ 1001.371545] truncated [ 1001.371553] loop1: p209 start 1 is beyond EOD, [ 1001.371563] loop3: p92 start 1 is beyond EOD, [ 1001.371565] truncated [ 1001.371574] loop1: p210 start 1 is beyond EOD, [ 1001.371579] truncated [ 1001.371586] truncated [ 1001.371593] loop1: p211 start 1 is beyond EOD, [ 1001.371601] loop3: p93 start 1 is beyond EOD, truncated [ 1001.371614] truncated [ 1001.371623] loop3: p94 start 1 is beyond EOD, [ 1001.371628] loop1: p212 start 1 is beyond EOD, [ 1001.371635] truncated [ 1001.371653] truncated [ 1001.371662] loop3: p95 start 1 is beyond EOD, [ 1001.371667] loop1: p213 start 1 is beyond EOD, truncated [ 1001.371674] truncated [ 1001.371701] loop3: p96 start 1 is beyond EOD, [ 1001.371714] loop1: p214 start 1 is beyond EOD, [ 1001.371715] truncated [ 1001.371726] truncated [ 1001.371734] loop1: p215 start 1 is beyond EOD, [ 1001.371742] loop3: p97 start 1 is beyond EOD, [ 1001.371746] truncated [ 1001.371754] loop1: p216 start 1 is beyond EOD, [ 1001.371755] truncated [ 1001.371765] truncated [ 1001.371773] loop1: p217 start 1 is beyond EOD, [ 1001.371782] loop3: p98 start 1 is beyond EOD, [ 1001.371786] truncated [ 1001.371793] loop1: p218 start 1 is beyond EOD, [ 1001.371795] truncated [ 1001.371841] loop3: p99 start 1 is beyond EOD, truncated [ 1001.371868] loop3: p100 start 1 is beyond EOD, truncated [ 1001.371924] loop3: p101 start 1 is beyond EOD, truncated [ 1001.371944] loop3: p102 start 1 is beyond EOD, truncated [ 1001.371964] loop3: p103 start 1 is beyond EOD, truncated [ 1001.372031] loop3: p104 start 1 is beyond EOD, truncated [ 1001.372051] loop3: p105 start 1 is beyond EOD, truncated [ 1001.372071] loop3: p106 start 1 is beyond EOD, truncated [ 1001.372085] loop3: p107 start 1 is beyond EOD, truncated [ 1001.372112] loop3: p108 start 1 is beyond EOD, truncated [ 1001.372133] loop3: p109 start 1 is beyond EOD, truncated [ 1001.372174] loop3: p110 start 1 is beyond EOD, truncated [ 1001.372204] loop3: p111 start 1 is beyond EOD, truncated [ 1001.372271] loop3: p112 start 1 is beyond EOD, truncated [ 1001.372292] loop3: p113 start 1 is beyond EOD, truncated [ 1001.372331] loop3: p114 start 1 is beyond EOD, truncated [ 1001.372350] loop3: p115 start 1 is beyond EOD, truncated [ 1001.372434] loop3: p116 start 1 is beyond EOD, truncated [ 1001.372494] loop3: p117 start 1 is beyond EOD, truncated [ 1001.372514] loop3: p118 start 1 is beyond EOD, truncated [ 1001.372534] loop3: p119 start 1 is beyond EOD, truncated [ 1001.372573] loop3: p120 start 1 is beyond EOD, truncated [ 1001.372594] loop3: p121 start 1 is beyond EOD, truncated [ 1001.372614] loop3: p122 start 1 is beyond EOD, truncated [ 1001.372645] loop3: p123 start 1 is beyond EOD, truncated [ 1001.372665] loop3: p124 start 1 is beyond EOD, truncated [ 1001.372686] loop3: p125 start 1 is beyond EOD, truncated [ 1001.372734] loop3: p126 start 1 is beyond EOD, truncated [ 1001.372753] loop3: p127 start 1 is beyond EOD, truncated [ 1001.372773] loop3: p128 start 1 is beyond EOD, truncated [ 1001.372793] loop3: p129 start 1 is beyond EOD, truncated [ 1001.372813] loop3: p130 start 1 is beyond EOD, truncated [ 1001.372833] loop3: p131 start 1 is beyond EOD, truncated [ 1001.372853] loop3: p132 start 1 is beyond EOD, truncated [ 1001.372916] loop3: p133 start 1 is beyond EOD, truncated [ 1001.372936] loop3: p134 start 1 is beyond EOD, truncated [ 1001.372984] loop3: p135 start 1 is beyond EOD, truncated [ 1001.373015] loop3: p136 start 1 is beyond EOD, truncated [ 1001.373036] loop3: p137 start 1 is beyond EOD, truncated [ 1001.373056] loop3: p138 start 1 is beyond EOD, truncated [ 1001.373076] loop3: p139 start 1 is beyond EOD, truncated [ 1001.373116] loop3: p140 start 1 is beyond EOD, truncated [ 1001.373136] loop3: p141 start 1 is beyond EOD, truncated [ 1001.373156] loop3: p142 start 1 is beyond EOD, truncated [ 1001.373178] truncated [ 1001.373197] loop4: p86 start 1 is beyond EOD, [ 1001.373204] loop3: p143 start 1 is beyond EOD, truncated [ 1001.373221] truncated [ 1001.373236] loop4: p87 start 1 is beyond EOD, [ 1001.373243] loop3: p144 start 1 is beyond EOD, [ 1001.373244] truncated [ 1001.373255] truncated [ 1001.373262] loop4: p88 start 1 is beyond EOD, [ 1001.373265] loop3: p145 start 1 is beyond EOD, [ 1001.373274] truncated [ 1001.373281] loop4: p89 start 1 is beyond EOD, [ 1001.373283] truncated [ 1001.373293] truncated [ 1001.373296] loop3: p146 start 1 is beyond EOD, [ 1001.373303] loop4: p90 start 1 is beyond EOD, truncated [ 1001.373317] truncated [ 1001.373324] loop4: p91 start 1 is beyond EOD, truncated [ 1001.373343] loop3: p147 start 1 is beyond EOD, [ 1001.373346] loop4: p92 start 1 is beyond EOD, [ 1001.373355] truncated [ 1001.373362] loop3: p148 start 1 is beyond EOD, [ 1001.373364] truncated [ 1001.373374] truncated [ 1001.373377] loop4: p93 start 1 is beyond EOD, [ 1001.373384] loop3: p149 start 1 is beyond EOD, truncated [ 1001.373401] truncated [ 1001.373404] loop3: p150 start 1 is beyond EOD, truncated [ 1001.373442] loop4: p94 start 1 is beyond EOD, [ 1001.373445] loop3: p151 start 1 is beyond EOD, [ 1001.373454] truncated [ 1001.373462] loop4: p95 start 1 is beyond EOD, truncated [ 1001.373482] loop4: p96 start 1 is beyond EOD, truncated [ 1001.373502] loop4: p97 start 1 is beyond EOD, truncated [ 1001.373521] loop4: p98 start 1 is beyond EOD, truncated [ 1001.373536] loop4: p99 start 1 is beyond EOD, truncated [ 1001.373561] loop4: p100 start 1 is beyond EOD, truncated [ 1001.373616] truncated [ 1001.373623] loop4: p101 start 1 is beyond EOD, [ 1001.373627] loop3: p152 start 1 is beyond EOD, [ 1001.373635] truncated [ 1001.373643] loop4: p102 start 1 is beyond EOD, truncated [ 1001.373661] truncated [ 1001.373664] loop4: p103 start 1 is beyond EOD, [ 1001.373675] loop3: p153 start 1 is beyond EOD, [ 1001.373677] truncated [ 1001.373682] truncated [ 1001.373696] loop3: p154 start 1 is beyond EOD, [ 1001.373705] loop4: p104 start 1 is beyond EOD, [ 1001.373714] truncated [ 1001.373716] truncated [ 1001.373722] loop3: p155 start 1 is beyond EOD, [ 1001.373725] loop4: p105 start 1 is beyond EOD, [ 1001.373735] truncated [ 1001.373737] truncated [ 1001.373743] loop3: p156 start 1 is beyond EOD, truncated [ 1001.373763] loop4: p106 start 1 is beyond EOD, truncated [ 1001.373782] loop3: p157 start 1 is beyond EOD, [ 1001.373786] loop4: p107 start 1 is beyond EOD, [ 1001.373795] truncated [ 1001.373802] loop3: p158 start 1 is beyond EOD, [ 1001.373804] truncated [ 1001.373814] truncated [ 1001.373817] loop4: p108 start 1 is beyond EOD, [ 1001.373824] loop3: p159 start 1 is beyond EOD, truncated [ 1001.373841] truncated [ 1001.373855] loop4: p109 start 1 is beyond EOD, truncated [ 1001.373872] loop3: p160 start 1 is beyond EOD, truncated [ 1001.373892] loop3: p161 start 1 is beyond EOD, [ 1001.373896] loop4: p110 start 1 is beyond EOD, [ 1001.373903] truncated [ 1001.373912] loop3: p162 start 1 is beyond EOD, [ 1001.373922] truncated [ 1001.373923] truncated [ 1001.373931] loop3: p163 start 1 is beyond EOD, [ 1001.373935] loop4: p111 start 1 is beyond EOD, truncated [ 1001.373952] truncated [ 1001.373955] loop4: p112 start 1 is beyond EOD, truncated [ 1001.373965] loop3: p164 start 1 is beyond EOD, truncated [ 1001.373974] loop4: p113 start 1 is beyond EOD, [ 1001.373985] loop3: p165 start 1 is beyond EOD, truncated [ 1001.374002] truncated [ 1001.374005] loop3: p166 start 1 is beyond EOD, truncated [ 1001.374016] loop4: p114 start 1 is beyond EOD, truncated [ 1001.374025] loop3: p167 start 1 is beyond EOD, truncated [ 1001.374035] loop4: p115 start 1 is beyond EOD, truncated [ 1001.374053] loop3: p168 start 1 is beyond EOD, [ 1001.374056] loop4: p116 start 1 is beyond EOD, [ 1001.374065] truncated [ 1001.374073] loop3: p169 start 1 is beyond EOD, truncated [ 1001.374093] loop3: p170 start 1 is beyond EOD, truncated [ 1001.374113] loop3: p171 start 1 is beyond EOD, truncated [ 1001.374133] loop3: p172 start 1 is beyond EOD, truncated [ 1001.374174] loop3: p173 start 1 is beyond EOD, truncated [ 1001.374213] loop3: p174 start 1 is beyond EOD, truncated [ 1001.374234] loop3: p175 start 1 is beyond EOD, truncated [ 1001.374274] loop3: p176 start 1 is beyond EOD, truncated [ 1001.374312] loop3: p177 start 1 is beyond EOD, [ 1001.374323] truncated [ 1001.374324] truncated [ 1001.374332] loop3: p178 start 1 is beyond EOD, [ 1001.374342] loop1: p219 start 1 is beyond EOD, [ 1001.374344] truncated [ 1001.374351] loop3: p179 start 1 is beyond EOD, [ 1001.374353] truncated [ 1001.374364] truncated [ 1001.374370] loop1: p220 start 1 is beyond EOD, [ 1001.374374] loop3: p180 start 1 is beyond EOD, [ 1001.374382] truncated [ 1001.374385] truncated [ 1001.374392] loop3: p181 start 1 is beyond EOD, [ 1001.374395] loop1: p221 start 1 is beyond EOD, [ 1001.374405] truncated [ 1001.374413] loop3: p182 start 1 is beyond EOD, [ 1001.374421] truncated [ 1001.374428] loop1: p222 start 1 is beyond EOD, [ 1001.374432] truncated [ 1001.374446] loop3: p183 start 1 is beyond EOD, truncated [ 1001.374467] truncated [ 1001.374474] loop3: p184 start 1 is beyond EOD, [ 1001.374490] loop1: p223 start 1 is beyond EOD, truncated [ 1001.374503] truncated [ 1001.374509] loop1: p224 start 1 is beyond EOD, [ 1001.374514] loop3: p185 start 1 is beyond EOD, [ 1001.374522] truncated [ 1001.374529] loop1: p225 start 1 is beyond EOD, [ 1001.374532] truncated [ 1001.374540] truncated [ 1001.374547] loop1: p226 start 1 is beyond EOD, [ 1001.374554] loop3: p186 start 1 is beyond EOD, [ 1001.374568] truncated [ 1001.374572] truncated [ 1001.374582] loop1: p227 start 1 is beyond EOD, truncated [ 1001.374602] loop1: p228 start 1 is beyond EOD, truncated [ 1001.374622] loop1: p229 start 1 is beyond EOD, truncated [ 1001.374643] loop1: p230 start 1 is beyond EOD, [ 1001.374650] loop3: p187 start 1 is beyond EOD, truncated [ 1001.374667] truncated [ 1001.374673] loop3: p188 start 1 is beyond EOD, truncated [ 1001.374690] loop1: p231 start 1 is beyond EOD, [ 1001.374693] loop3: p189 start 1 is beyond EOD, [ 1001.374702] truncated [ 1001.374710] loop1: p232 start 1 is beyond EOD, [ 1001.374711] truncated [ 1001.374721] truncated [ 1001.374724] loop3: p190 start 1 is beyond EOD, truncated [ 1001.374733] loop1: p233 start 1 is beyond EOD, truncated [ 1001.374753] loop3: p191 start 1 is beyond EOD, [ 1001.374762] loop1: p234 start 1 is beyond EOD, [ 1001.374765] truncated [ 1001.374768] truncated [ 1001.374783] loop1: p235 start 1 is beyond EOD, [ 1001.374791] loop3: p192 start 1 is beyond EOD, [ 1001.374792] truncated [ 1001.374803] truncated [ 1001.374809] loop1: p236 start 1 is beyond EOD, [ 1001.374812] loop3: p193 start 1 is beyond EOD, [ 1001.374821] truncated [ 1001.374828] loop1: p237 start 1 is beyond EOD, [ 1001.374831] truncated [ 1001.374840] truncated [ 1001.374844] loop1: p238 start 1 is beyond EOD, [ 1001.374853] loop3: p194 start 1 is beyond EOD, [ 1001.374880] truncated [ 1001.374885] loop1: p239 start 1 is beyond EOD, truncated [ 1001.374891] loop1: p240 start 1 is beyond EOD, [ 1001.374893] truncated [ 1001.374894] truncated [ 1001.374900] loop3: p195 start 1 is beyond EOD, [ 1001.374907] loop1: p241 start 1 is beyond EOD, truncated [ 1001.374936] truncated [ 1001.374941] loop1: p242 start 1 is beyond EOD, truncated [ 1001.374962] loop3: p196 start 1 is beyond EOD, [ 1001.374971] loop1: p243 start 1 is beyond EOD, [ 1001.374974] truncated [ 1001.374982] loop3: p197 start 1 is beyond EOD, truncated [ 1001.375001] loop3: p198 start 1 is beyond EOD, [ 1001.375003] truncated [ 1001.375013] truncated [ 1001.375021] loop3: p199 start 1 is beyond EOD, [ 1001.375030] loop1: p244 start 1 is beyond EOD, [ 1001.375033] truncated [ 1001.375041] loop3: p200 start 1 is beyond EOD, [ 1001.375042] truncated [ 1001.375050] loop1: p245 start 1 is beyond EOD, [ 1001.375053] truncated [ 1001.375060] loop3: p201 start 1 is beyond EOD, [ 1001.375062] truncated [ 1001.375070] loop1: p246 start 1 is beyond EOD, [ 1001.375073] truncated [ 1001.375080] loop3: p202 start 1 is beyond EOD, [ 1001.375082] truncated [ 1001.375090] loop1: p247 start 1 is beyond EOD, [ 1001.375093] truncated [ 1001.375100] loop3: p203 start 1 is beyond EOD, [ 1001.375102] truncated [ 1001.375110] loop1: p248 start 1 is beyond EOD, [ 1001.375112] truncated [ 1001.375120] loop3: p204 start 1 is beyond EOD, [ 1001.375122] truncated [ 1001.375130] loop1: p249 start 1 is beyond EOD, [ 1001.375132] truncated [ 1001.375140] loop3: p205 start 1 is beyond EOD, [ 1001.375142] truncated [ 1001.375150] loop1: p250 start 1 is beyond EOD, [ 1001.375152] truncated [ 1001.375160] loop3: p206 start 1 is beyond EOD, [ 1001.375162] truncated [ 1001.375170] loop1: p251 start 1 is beyond EOD, [ 1001.375173] truncated [ 1001.375180] loop3: p207 start 1 is beyond EOD, [ 1001.375182] truncated [ 1001.375190] loop1: p252 start 1 is beyond EOD, [ 1001.375192] truncated [ 1001.375201] loop3: p208 start 1 is beyond EOD, [ 1001.375202] truncated [ 1001.375210] loop1: p253 start 1 is beyond EOD, [ 1001.375213] truncated [ 1001.375221] loop3: p209 start 1 is beyond EOD, truncated [ 1001.375240] loop3: p210 start 1 is beyond EOD, truncated [ 1001.375261] loop3: p211 start 1 is beyond EOD, truncated [ 1001.375281] loop3: p212 start 1 is beyond EOD, truncated [ 1001.375302] loop3: p213 start 1 is beyond EOD, truncated [ 1001.375342] loop3: p214 start 1 is beyond EOD, truncated [ 1001.375402] loop3: p215 start 1 is beyond EOD, truncated [ 1001.375434] loop3: p216 start 1 is beyond EOD, truncated [ 1001.375455] loop3: p217 start 1 is beyond EOD, truncated [ 1001.375483] loop3: p218 start 1 is beyond EOD, truncated [ 1001.375503] loop3: p219 start 1 is beyond EOD, truncated [ 1001.375562] loop3: p220 start 1 is beyond EOD, truncated [ 1001.375582] loop3: p221 start 1 is beyond EOD, truncated [ 1001.375602] loop3: p222 start 1 is beyond EOD, truncated [ 1001.375622] loop3: p223 start 1 is beyond EOD, truncated [ 1001.375643] loop3: p224 start 1 is beyond EOD, truncated [ 1001.375732] loop3: p225 start 1 is beyond EOD, truncated [ 1001.375772] loop3: p226 start 1 is beyond EOD, truncated [ 1001.375810] loop3: p227 start 1 is beyond EOD, truncated [ 1001.375881] loop3: p228 start 1 is beyond EOD, truncated [ 1001.375888] loop3: p229 start 1 is beyond EOD, truncated [ 1001.375894] loop3: p230 start 1 is beyond EOD, truncated [ 1001.375905] loop3: p231 start 1 is beyond EOD, truncated [ 1001.375950] loop3: p232 start 1 is beyond EOD, truncated [ 1001.375989] loop3: p233 start 1 is beyond EOD, truncated [ 1001.376009] loop3: p234 start 1 is beyond EOD, truncated [ 1001.376030] loop3: p235 start 1 is beyond EOD, truncated [ 1001.376049] loop3: p236 start 1 is beyond EOD, truncated [ 1001.376069] loop3: p237 start 1 is beyond EOD, truncated [ 1001.376089] loop3: p238 start 1 is beyond EOD, truncated [ 1001.376101] loop3: p239 start 1 is beyond EOD, truncated [ 1001.376129] loop3: p240 start 1 is beyond EOD, truncated [ 1001.376149] loop3: p241 start 1 is beyond EOD, truncated [ 1001.376169] loop3: p242 start 1 is beyond EOD, truncated [ 1001.376190] loop3: p243 start 1 is beyond EOD, truncated [ 1001.376229] loop3: p244 start 1 is beyond EOD, truncated [ 1001.376249] loop3: p245 start 1 is beyond EOD, truncated [ 1001.376270] loop3: p246 start 1 is beyond EOD, truncated [ 1001.376309] loop3: p247 start 1 is beyond EOD, truncated [ 1001.376329] loop3: p248 start 1 is beyond EOD, truncated [ 1001.376369] loop3: p249 start 1 is beyond EOD, truncated [ 1001.376388] loop3: p250 start 1 is beyond EOD, truncated [ 1001.376410] loop3: p251 start 1 is beyond EOD, truncated [ 1001.376449] loop3: p252 start 1 is beyond EOD, [ 1001.376456] truncated [ 1001.376461] truncated [ 1001.376469] loop3: p253 start 1 is beyond EOD, truncated [ 1001.376509] loop3: p254 start 1 is beyond EOD, truncated [ 1001.376529] loop3: p255 start 1 is beyond EOD, truncated [ 1001.376676] loop4: p117 start 1 is beyond EOD, truncated [ 1001.376696] loop4: p118 start 1 is beyond EOD, truncated [ 1001.376737] loop4: p119 start 1 is beyond EOD, truncated [ 1001.376776] loop4: p120 start 1 is beyond EOD, truncated [ 1001.376797] loop4: p121 start 1 is beyond EOD, truncated [ 1001.376835] loop4: p122 start 1 is beyond EOD, truncated [ 1001.376856] loop4: p123 start 1 is beyond EOD, truncated [ 1001.376886] loop4: p124 start 1 is beyond EOD, truncated [ 1001.376905] loop4: p125 start 1 is beyond EOD, truncated [ 1001.376926] loop4: p126 start 1 is beyond EOD, truncated [ 1001.376945] loop4: p127 start 1 is beyond EOD, truncated [ 1001.376965] loop4: p128 start 1 is beyond EOD, truncated [ 1001.377026] loop4: p129 start 1 is beyond EOD, truncated [ 1001.377046] loop4: p130 start 1 is beyond EOD, truncated [ 1001.377066] loop4: p131 start 1 is beyond EOD, truncated [ 1001.377086] loop4: p132 start 1 is beyond EOD, truncated [ 1001.377105] loop4: p133 start 1 is beyond EOD, truncated [ 1001.377125] loop4: p134 start 1 is beyond EOD, truncated [ 1001.377145] loop4: p135 start 1 is beyond EOD, truncated [ 1001.377166] loop4: p136 start 1 is beyond EOD, truncated [ 1001.377186] loop4: p137 start 1 is beyond EOD, truncated [ 1001.377206] loop4: p138 start 1 is beyond EOD, truncated [ 1001.392129] loop4: p139 start 1 is beyond EOD, truncated [ 1001.392159] loop4: p140 start 1 is beyond EOD, truncated [ 1001.392207] loop4: p141 start 1 is beyond EOD, truncated [ 1001.392246] loop4: p142 start 1 is beyond EOD, truncated [ 1001.392266] loop4: p143 start 1 is beyond EOD, truncated [ 1001.392286] loop4: p144 start 1 is beyond EOD, truncated [ 1001.392306] loop4: p145 start 1 is beyond EOD, truncated [ 1001.392326] loop4: p146 start 1 is beyond EOD, truncated [ 1001.392346] loop4: p147 start 1 is beyond EOD, truncated [ 1001.392365] loop4: p148 start 1 is beyond EOD, truncated [ 1001.392385] loop4: p149 start 1 is beyond EOD, truncated [ 1001.392405] loop4: p150 start 1 is beyond EOD, truncated [ 1001.392425] loop4: p151 start 1 is beyond EOD, truncated [ 1001.392444] loop4: p152 start 1 is beyond EOD, truncated [ 1001.392460] loop4: p153 start 1 is beyond EOD, truncated [ 1001.392498] loop4: p154 start 1 is beyond EOD, truncated [ 1001.392774] truncated [ 1001.392793] loop1: p254 start 1 is beyond EOD, truncated [ 1001.392813] loop1: p255 start 1 is beyond EOD, truncated [ 1001.395022] loop4: p155 start 1 is beyond EOD, truncated [ 1001.395959] loop4: p156 start 1 is beyond EOD, truncated [ 1001.396161] loop4: p157 start 1 is beyond EOD, truncated [ 1001.397061] loop4: p158 start 1 is beyond EOD, truncated [ 1001.397091] loop4: p159 start 1 is beyond EOD, truncated [ 1001.397265] loop4: p160 start 1 is beyond EOD, truncated [ 1001.397363] loop4: p161 start 1 is beyond EOD, truncated [ 1001.397383] loop4: p162 start 1 is beyond EOD, truncated [ 1001.397423] loop4: p163 start 1 is beyond EOD, truncated [ 1001.397443] loop4: p164 start 1 is beyond EOD, truncated [ 1001.397463] loop4: p165 start 1 is beyond EOD, truncated [ 1001.397483] loop4: p166 start 1 is beyond EOD, truncated [ 1001.397522] loop4: p167 start 1 is beyond EOD, truncated [ 1001.397542] loop4: p168 start 1 is beyond EOD, truncated [ 1001.397562] loop4: p169 start 1 is beyond EOD, truncated [ 1001.397581] loop4: p170 start 1 is beyond EOD, truncated [ 1001.397601] loop4: p171 start 1 is beyond EOD, truncated [ 1001.397621] loop4: p172 start 1 is beyond EOD, truncated [ 1001.397641] loop4: p173 start 1 is beyond EOD, truncated [ 1001.397702] loop4: p174 start 1 is beyond EOD, truncated [ 1001.397781] loop4: p175 start 1 is beyond EOD, truncated [ 1001.397800] loop4: p176 start 1 is beyond EOD, truncated [ 1001.397841] loop4: p177 start 1 is beyond EOD, truncated [ 1001.397856] loop4: p178 start 1 is beyond EOD, truncated [ 1001.397942] loop4: p179 start 1 is beyond EOD, truncated [ 1001.397962] loop4: p180 start 1 is beyond EOD, truncated [ 1001.398016] loop4: p181 start 1 is beyond EOD, truncated [ 1001.400659] loop4: p182 start 1 is beyond EOD, truncated [ 1001.400690] loop4: p183 start 1 is beyond EOD, truncated [ 1001.400738] loop4: p184 start 1 is beyond EOD, truncated [ 1001.400758] loop4: p185 start 1 is beyond EOD, truncated [ 1001.400796] loop4: p186 start 1 is beyond EOD, truncated [ 1001.400812] loop4: p187 start 1 is beyond EOD, truncated [ 1001.400897] loop4: p188 start 1 is beyond EOD, truncated [ 1001.400917] loop4: p189 start 1 is beyond EOD, truncated [ 1001.400932] loop4: p190 start 1 is beyond EOD, truncated [ 1001.400980] loop4: p191 start 1 is beyond EOD, truncated [ 1001.400997] loop4: p192 start 1 is beyond EOD, truncated [ 1001.401015] loop4: p193 start 1 is beyond EOD, truncated [ 1001.401057] loop4: p194 start 1 is beyond EOD, truncated [ 1001.401072] loop4: p195 start 1 is beyond EOD, truncated [ 1001.401140] loop4: p196 start 1 is beyond EOD, truncated [ 1001.401160] loop4: p197 start 1 is beyond EOD, truncated [ 1001.401180] loop4: p198 start 1 is beyond EOD, truncated [ 1001.401209] loop4: p199 start 1 is beyond EOD, truncated [ 1001.401249] loop4: p200 start 1 is beyond EOD, truncated [ 1001.401289] loop4: p201 start 1 is beyond EOD, truncated [ 1001.401319] loop4: p202 start 1 is beyond EOD, truncated [ 1001.401348] loop4: p203 start 1 is beyond EOD, truncated [ 1001.401368] loop4: p204 start 1 is beyond EOD, truncated [ 1001.401388] loop4: p205 start 1 is beyond EOD, truncated [ 1001.401408] loop4: p206 start 1 is beyond EOD, truncated [ 1001.404720] loop4: p207 start 1 is beyond EOD, truncated [ 1001.404758] loop4: p208 start 1 is beyond EOD, truncated [ 1001.404778] loop4: p209 start 1 is beyond EOD, truncated [ 1001.404797] loop4: p210 start 1 is beyond EOD, truncated [ 1001.405271] loop4: p211 start 1 is beyond EOD, truncated [ 1001.405309] loop4: p212 start 1 is beyond EOD, truncated [ 1001.405329] loop4: p213 start 1 is beyond EOD, truncated [ 1001.405348] loop4: p214 start 1 is beyond EOD, truncated [ 1001.405389] loop4: p215 start 1 is beyond EOD, truncated [ 1001.405408] loop4: p216 start 1 is beyond EOD, truncated [ 1001.405427] loop4: p217 start 1 is beyond EOD, truncated [ 1001.405469] loop4: p218 start 1 is beyond EOD, truncated [ 1001.405484] loop4: p219 start 1 is beyond EOD, truncated [ 1001.405528] loop4: p220 start 1 is beyond EOD, truncated [ 1001.405548] loop4: p221 start 1 is beyond EOD, truncated [ 1001.405589] loop4: p222 start 1 is beyond EOD, truncated [ 1001.405609] loop4: p223 start 1 is beyond EOD, truncated [ 1001.405628] loop4: p224 start 1 is beyond EOD, truncated [ 1001.405670] loop4: p225 start 1 is beyond EOD, truncated [ 1001.405689] loop4: p226 start 1 is beyond EOD, truncated [ 1001.405709] loop4: p227 start 1 is beyond EOD, truncated [ 1001.405728] loop4: p228 start 1 is beyond EOD, truncated [ 1001.405770] loop4: p229 start 1 is beyond EOD, truncated [ 1001.405789] loop4: p230 start 1 is beyond EOD, truncated [ 1001.405808] loop4: p231 start 1 is beyond EOD, truncated [ 1001.405850] loop4: p232 start 1 is beyond EOD, truncated [ 1001.405900] loop4: p233 start 1 is beyond EOD, truncated [ 1001.405919] loop4: p234 start 1 is beyond EOD, truncated [ 1001.408630] loop4: p235 start 1 is beyond EOD, truncated [ 1001.408667] loop4: p236 start 1 is beyond EOD, truncated [ 1001.408680] loop4: p237 start 1 is beyond EOD, truncated [ 1001.408725] loop4: p238 start 1 is beyond EOD, truncated [ 1001.408746] loop4: p239 start 1 is beyond EOD, truncated [ 1001.408766] loop4: p240 start 1 is beyond EOD, truncated [ 1001.408787] loop4: p241 start 1 is beyond EOD, truncated [ 1001.408800] loop4: p242 start 1 is beyond EOD, truncated [ 1001.408846] loop4: p243 start 1 is beyond EOD, truncated [ 1001.408918] loop4: p244 start 1 is beyond EOD, truncated [ 1001.408951] loop4: p245 start 1 is beyond EOD, truncated [ 1001.408979] loop4: p246 start 1 is beyond EOD, truncated [ 1001.408997] loop4: p247 start 1 is beyond EOD, truncated [ 1001.409015] loop4: p248 start 1 is beyond EOD, truncated [ 1001.409049] loop4: p249 start 1 is beyond EOD, truncated [ 1001.409076] loop4: p250 start 1 is beyond EOD, truncated [ 1001.409095] loop4: p251 start 1 is beyond EOD, truncated [ 1001.409137] loop4: p252 start 1 is beyond EOD, truncated [ 1001.409156] loop4: p253 start 1 is beyond EOD, truncated [ 1001.409175] loop4: p254 start 1 is beyond EOD, truncated [ 1001.409217] loop4: p255 start 1 is beyond EOD, truncated [ 1001.411592] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) [ 1001.440952] INFO: task init:11467 blocked for more than 140 seconds. [ 1001.440958] Not tainted 4.14.87+ #19 [ 1001.440961] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1001.440964] init D28744 11467 1 0x00000000 [ 1001.440981] Call Trace: [ 1001.441002] ? __schedule+0x729/0x1ed0 [ 1001.441016] ? __sched_text_start+0x8/0x8 [ 1001.441026] ? lock_downgrade+0x560/0x560 [ 1001.441031] ? lock_acquire+0x10f/0x380 [ 1001.441038] ? __mutex_lock+0x1bc/0x1480 [ 1001.441050] schedule+0x7f/0x1b0 [ 1001.441059] schedule_preempt_disabled+0x13/0x20 [ 1001.441066] __mutex_lock+0x521/0x1480 [ 1001.441075] ? tty_open+0x3a8/0x980 [ 1001.441084] ? lock_downgrade+0x560/0x560 [ 1001.441092] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 1001.441107] ? fs_reclaim_acquire+0x10/0x10 [ 1001.441131] ? tty_init_dev+0x3a0/0x3a0 [ 1001.441136] ? tty_open+0x3a8/0x980 [ 1001.441142] tty_open+0x3a8/0x980 [ 1001.441154] ? tty_init_dev+0x3a0/0x3a0 [ 1001.441161] ? chrdev_open+0x7d/0x570 [ 1001.441189] ? refcount_inc_not_zero+0x6b/0xb0 [ 1001.441202] ? tty_init_dev+0x3a0/0x3a0 [ 1001.441208] chrdev_open+0x20d/0x570 [ 1001.441218] ? cdev_put.part.0+0x50/0x50 [ 1001.441236] do_dentry_open+0x426/0xda0 [ 1001.441243] ? cdev_put.part.0+0x50/0x50 [ 1001.441261] vfs_open+0x11c/0x210 [ 1001.441274] path_openat+0x5f9/0x2930 [ 1001.441291] ? path_mountpoint+0x9a0/0x9a0 [ 1001.441301] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 1001.441315] ? trace_hardirqs_on+0x10/0x10 [ 1001.441326] ? __lock_acquire+0x619/0x4320 [ 1001.441348] do_filp_open+0x197/0x270 [ 1001.441358] ? may_open_dev+0xd0/0xd0 [ 1001.441384] ? _raw_spin_unlock+0x29/0x40 [ 1001.441403] do_sys_open+0x2ef/0x580 [ 1001.441414] ? filp_open+0x60/0x60 [ 1001.441425] ? _raw_write_unlock_irq+0x24/0x50 [ 1001.441438] ? do_syscall_64+0x43/0x4b0 [ 1001.441446] ? do_sys_open+0x580/0x580 [ 1001.441453] do_syscall_64+0x19b/0x4b0 [ 1001.441468] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1001.441482] RIP: 0033:0x7f661ceba120 [ 1001.441486] RSP: 002b:00007fff8bdc9148 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1001.441494] RAX: ffffffffffffffda RBX: 00000000020ef1b0 RCX: 00007f661ceba120 [ 1001.441499] RDX: 0000000000000010 RSI: 0000000000000902 RDI: 00000000004072c8 [ 1001.441503] RBP: 0000000000000000 R08: 0000000000407370 R09: 0000000000000001 [ 1001.441508] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000902 [ 1001.441512] R13: 0000000000000102 R14: 00007fff8bdc92c0 R15: 00000000020ef1b8 [ 1001.441535] INFO: task init:11469 blocked for more than 140 seconds. [ 1001.441539] Not tainted 4.14.87+ #19 [ 1001.441542] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1001.441545] init D28520 11469 1 0x00000000 [ 1001.441573] Call Trace: [ 1001.441584] ? __schedule+0x729/0x1ed0 [ 1001.441625] ? __sched_text_start+0x8/0x8 [ 1001.441633] ? lock_downgrade+0x560/0x560 [ 1001.441638] ? lock_acquire+0x10f/0x380 [ 1001.441645] ? __mutex_lock+0x1bc/0x1480 [ 1001.441657] schedule+0x7f/0x1b0 [ 1001.441666] schedule_preempt_disabled+0x13/0x20 [ 1001.441673] __mutex_lock+0x521/0x1480 [ 1001.441680] ? tty_open+0x3a8/0x980 [ 1001.441689] ? lock_downgrade+0x560/0x560 [ 1001.441698] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 1001.441711] ? fs_reclaim_acquire+0x10/0x10 [ 1001.441735] ? tty_init_dev+0x3a0/0x3a0 [ 1001.441742] ? tty_open+0x3a8/0x980 [ 1001.441748] tty_open+0x3a8/0x980 [ 1001.441761] ? tty_init_dev+0x3a0/0x3a0 [ 1001.441767] ? chrdev_open+0x7d/0x570 [ 1001.441776] ? refcount_inc_not_zero+0x6b/0xb0 [ 1001.441789] ? tty_init_dev+0x3a0/0x3a0 [ 1001.441796] chrdev_open+0x20d/0x570 [ 1001.441805] ? cdev_put.part.0+0x50/0x50 [ 1001.441824] do_dentry_open+0x426/0xda0 [ 1001.441830] ? cdev_put.part.0+0x50/0x50 [ 1001.441848] vfs_open+0x11c/0x210 [ 1001.441869] path_openat+0x5f9/0x2930 [ 1001.441886] ? path_mountpoint+0x9a0/0x9a0 [ 1001.441893] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 1001.441906] ? trace_hardirqs_on+0x10/0x10 [ 1001.441916] ? __lock_acquire+0x619/0x4320 [ 1001.441938] do_filp_open+0x197/0x270 [ 1001.441947] ? may_open_dev+0xd0/0xd0 [ 1001.441990] ? _raw_spin_unlock+0x29/0x40 [ 1001.442011] do_sys_open+0x2ef/0x580 [ 1001.442022] ? filp_open+0x60/0x60 [ 1001.442033] ? _raw_write_unlock_irq+0x24/0x50 [ 1001.442044] ? do_syscall_64+0x43/0x4b0 [ 1001.442052] ? do_sys_open+0x580/0x580 [ 1001.442061] do_syscall_64+0x19b/0x4b0 [ 1001.442076] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1001.442080] RIP: 0033:0x7f661ceba120 [ 1001.442084] RSP: 002b:00007fff8bdc9148 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1001.442092] RAX: ffffffffffffffda RBX: 00000000020ef350 RCX: 00007f661ceba120 [ 1001.442096] RDX: 0000000000000010 RSI: 0000000000000902 RDI: 00000000004072c8 [ 1001.442100] RBP: 0000000000000000 R08: 0000000000407370 R09: 0000000000000001 [ 1001.442104] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000902 [ 1001.442108] R13: 0000000000000102 R14: 00007fff8bdc92c0 R15: 00000000020ef358 [ 1001.442131] INFO: task init:11470 blocked for more than 140 seconds. [ 1001.442135] Not tainted 4.14.87+ #19 [ 1001.442138] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1001.442141] init D29352 11470 1 0x00000000 [ 1001.442157] Call Trace: [ 1001.442170] ? __schedule+0x729/0x1ed0 [ 1001.442176] ? mutex_spin_on_owner+0x1c9/0x4a0 [ 1001.442189] ? __sched_text_start+0x8/0x8 [ 1001.442197] ? lock_downgrade+0x560/0x560 [ 1001.442203] ? lock_acquire+0x10f/0x380 [ 1001.442209] ? __mutex_lock+0x1bc/0x1480 [ 1001.442222] schedule+0x7f/0x1b0 [ 1001.442231] schedule_preempt_disabled+0x13/0x20 [ 1001.442237] __mutex_lock+0x521/0x1480 [ 1001.442245] ? tty_open+0x3a8/0x980 [ 1001.442259] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 1001.442272] ? fs_reclaim_acquire+0x10/0x10 [ 1001.442297] ? tty_init_dev+0x3a0/0x3a0 [ 1001.442304] ? tty_open+0x3a8/0x980 [ 1001.442310] tty_open+0x3a8/0x980 [ 1001.442323] ? tty_init_dev+0x3a0/0x3a0 [ 1001.442328] ? chrdev_open+0x7d/0x570 [ 1001.442336] ? refcount_inc_not_zero+0x6b/0xb0 [ 1001.442346] ? tty_init_dev+0x3a0/0x3a0 [ 1001.442352] chrdev_open+0x20d/0x570 [ 1001.442360] ? cdev_put.part.0+0x50/0x50 [ 1001.442376] do_dentry_open+0x426/0xda0 [ 1001.442382] ? cdev_put.part.0+0x50/0x50 [ 1001.442399] vfs_open+0x11c/0x210 [ 1001.442410] path_openat+0x5f9/0x2930 [ 1001.442427] ? path_mountpoint+0x9a0/0x9a0 [ 1001.442434] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 1001.442445] ? trace_hardirqs_on+0x10/0x10 [ 1001.442455] ? __lock_acquire+0x619/0x4320 [ 1001.442483] do_filp_open+0x197/0x270 [ 1001.442493] ? may_open_dev+0xd0/0xd0 [ 1001.442516] ? _raw_spin_unlock+0x29/0x40 [ 1001.442535] do_sys_open+0x2ef/0x580 [ 1001.442545] ? filp_open+0x60/0x60 [ 1001.442556] ? _raw_write_unlock_irq+0x24/0x50 [ 1001.442568] ? do_syscall_64+0x43/0x4b0 [ 1001.442575] ? do_sys_open+0x580/0x580 [ 1001.442584] do_syscall_64+0x19b/0x4b0 [ 1001.442596] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1001.442601] RIP: 0033:0x7f661ceba120 [ 1001.442605] RSP: 002b:00007fff8bdc9148 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1001.442613] RAX: ffffffffffffffda RBX: 00000000020ef280 RCX: 00007f661ceba120 [ 1001.442617] RDX: 0000000000000010 RSI: 0000000000000902 RDI: 00000000004072c8 [ 1001.442621] RBP: 0000000000000000 R08: 0000000000407370 R09: 0000000000000001 [ 1001.442625] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000902 [ 1001.442629] R13: 0000000000000102 R14: 00007fff8bdc92c0 R15: 00000000020ef288 [ 1001.442651] INFO: task init:11471 blocked for more than 140 seconds. [ 1001.442655] Not tainted 4.14.87+ #19 [ 1001.442657] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1001.442660] init D29352 11471 1 0x00000000 [ 1001.442675] Call Trace: [ 1001.442688] ? __schedule+0x729/0x1ed0 [ 1001.442703] ? __sched_text_start+0x8/0x8 [ 1001.442711] ? lock_downgrade+0x560/0x560 [ 1001.442717] ? lock_acquire+0x10f/0x380 [ 1001.442723] ? __mutex_lock+0x1bc/0x1480 [ 1001.442736] schedule+0x7f/0x1b0 [ 1001.442745] schedule_preempt_disabled+0x13/0x20 [ 1001.442751] __mutex_lock+0x521/0x1480 [ 1001.442759] ? tty_open+0x3a8/0x980 [ 1001.442769] ? lock_downgrade+0x560/0x560 [ 1001.442777] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 1001.442791] ? fs_reclaim_acquire+0x10/0x10 [ 1001.442815] ? tty_init_dev+0x3a0/0x3a0 [ 1001.442822] ? tty_open+0x3a8/0x980 [ 1001.442827] tty_open+0x3a8/0x980 [ 1001.442840] ? tty_init_dev+0x3a0/0x3a0 [ 1001.442845] ? chrdev_open+0x7d/0x570 [ 1001.442864] ? refcount_inc_not_zero+0x6b/0xb0 [ 1001.442876] ? tty_init_dev+0x3a0/0x3a0 [ 1001.442883] chrdev_open+0x20d/0x570 [ 1001.442892] ? cdev_put.part.0+0x50/0x50 [ 1001.442911] do_dentry_open+0x426/0xda0 [ 1001.442917] ? cdev_put.part.0+0x50/0x50 [ 1001.442934] vfs_open+0x11c/0x210 [ 1001.442946] path_openat+0x5f9/0x2930 [ 1001.442962] ? path_mountpoint+0x9a0/0x9a0 [ 1001.442970] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 1001.442982] ? trace_hardirqs_on+0x10/0x10 [ 1001.442993] ? __lock_acquire+0x619/0x4320 [ 1001.443015] do_filp_open+0x197/0x270 [ 1001.443023] ? may_open_dev+0xd0/0xd0 [ 1001.443048] ? _raw_spin_unlock+0x29/0x40 [ 1001.443082] do_sys_open+0x2ef/0x580 [ 1001.443092] ? filp_open+0x60/0x60 [ 1001.443103] ? _raw_write_unlock_irq+0x24/0x50 [ 1001.443116] ? do_syscall_64+0x43/0x4b0 [ 1001.443125] ? do_sys_open+0x580/0x580 [ 1001.443134] do_syscall_64+0x19b/0x4b0 [ 1001.443149] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1001.443154] RIP: 0033:0x7f661ceba120 [ 1001.443157] RSP: 002b:00007fff8bdc9148 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1001.443165] RAX: ffffffffffffffda RBX: 00000000020ef0e0 RCX: 00007f661ceba120 [ 1001.443169] RDX: 0000000000000010 RSI: 0000000000000902 RDI: 00000000004072c8 [ 1001.443173] RBP: 0000000000000000 R08: 0000000000407370 R09: 0000000000000001 [ 1001.443178] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000902 [ 1001.443182] R13: 0000000000000102 R14: 00007fff8bdc92c0 R15: 00000000020ef0e8 [ 1001.443208] INFO: task init:12243 blocked for more than 140 seconds. [ 1001.443212] Not tainted 4.14.87+ #19 [ 1001.443214] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1001.443217] init D29352 12243 1 0x00000000 [ 1001.443234] Call Trace: [ 1001.443247] ? __schedule+0x729/0x1ed0 [ 1001.443263] ? __sched_text_start+0x8/0x8 [ 1001.443272] ? lock_downgrade+0x560/0x560 [ 1001.443277] ? lock_acquire+0x10f/0x380 [ 1001.443284] ? __mutex_lock+0x1bc/0x1480 [ 1001.443297] schedule+0x7f/0x1b0 [ 1001.443307] schedule_preempt_disabled+0x13/0x20 [ 1001.443314] __mutex_lock+0x521/0x1480 [ 1001.443322] ? tty_open+0x3a8/0x980 [ 1001.443332] ? lock_downgrade+0x560/0x560 [ 1001.443341] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 1001.443355] ? fs_reclaim_acquire+0x10/0x10 [ 1001.443381] ? tty_init_dev+0x3a0/0x3a0 [ 1001.443388] ? tty_open+0x3a8/0x980 [ 1001.443394] tty_open+0x3a8/0x980 [ 1001.443407] ? tty_init_dev+0x3a0/0x3a0 [ 1001.443413] ? chrdev_open+0x7d/0x570 [ 1001.443421] ? refcount_inc_not_zero+0x6b/0xb0 [ 1001.443433] ? tty_init_dev+0x3a0/0x3a0 [ 1001.443440] chrdev_open+0x20d/0x570 [ 1001.443450] ? cdev_put.part.0+0x50/0x50 [ 1001.443483] do_dentry_open+0x426/0xda0 [ 1001.443491] ? cdev_put.part.0+0x50/0x50 [ 1001.443509] vfs_open+0x11c/0x210 [ 1001.443520] path_openat+0x5f9/0x2930 [ 1001.443538] ? path_mountpoint+0x9a0/0x9a0 [ 1001.443546] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 1001.443560] ? trace_hardirqs_on+0x10/0x10 [ 1001.443572] ? __lock_acquire+0x619/0x4320 [ 1001.443594] do_filp_open+0x197/0x270 [ 1001.443604] ? may_open_dev+0xd0/0xd0 [ 1001.443630] ? _raw_spin_unlock+0x29/0x40 [ 1001.443650] do_sys_open+0x2ef/0x580 [ 1001.443660] ? filp_open+0x60/0x60 [ 1001.443671] ? _raw_write_unlock_irq+0x24/0x50 [ 1001.443684] ? do_syscall_64+0x43/0x4b0 [ 1001.443693] ? do_sys_open+0x580/0x580 [ 1001.443702] do_syscall_64+0x19b/0x4b0 [ 1001.443716] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1001.443721] RIP: 0033:0x7f661ceba120 [ 1001.443725] RSP: 002b:00007fff8bdc9148 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1001.443733] RAX: ffffffffffffffda RBX: 00000000020ef010 RCX: 00007f661ceba120 [ 1001.443738] RDX: 0000000000000010 RSI: 0000000000000902 RDI: 00000000004072c8 [ 1001.443742] RBP: 0000000000000000 R08: 0000000000407370 R09: 0000000000000001 [ 1001.443746] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000902 [ 1001.443750] R13: 0000000000000102 R14: 00007fff8bdc92c0 R15: 00000000020ef018 [ 1001.443779] [ 1001.443779] Showing all locks held in the system: [ 1001.443788] 1 lock held by khungtaskd/23: [ 1001.443791] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x74/0x20f [ 1001.443813] 1 lock held by rsyslogd/1635: [ 1001.443816] #0: (&f->f_pos_lock){+.+.}, at: [] __fdget_pos+0xa2/0xc0 [ 1001.443835] 2 locks held by getty/1763: [ 1001.443837] #0: (&tty->ldisc_sem){++++}, at: [] tty_ldisc_ref_wait+0x20/0x80 [ 1001.443864] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1ff/0x1700 [ 1001.443885] 1 lock held by init/11467: [ 1001.443887] #0: (tty_mutex){+.+.}, at: [] tty_open+0x3a8/0x980 [ 1001.443903] 1 lock held by init/11469: [ 1001.443905] #0: (tty_mutex){+.+.}, at: [] tty_open+0x3a8/0x980 [ 1001.443921] 1 lock held by init/11470: [ 1001.443923] #0: (tty_mutex){+.+.}, at: [] tty_open+0x3a8/0x980 [ 1001.443939] 1 lock held by init/11471: [ 1001.443941] #0: (tty_mutex){+.+.}, at: [] tty_open+0x3a8/0x980 [ 1001.443957] 1 lock held by init/12243: [ 1001.443959] #0: (tty_mutex){+.+.}, at: [] tty_open+0x3a8/0x980 [ 1001.443975] 1 lock held by syz-executor3/24446: [ 1001.443977] #0: (&lo->lo_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x85/0x17d0 [ 1001.443996] [ 1001.443998] ============================================= [ 1001.443998] [ 1001.444001] NMI backtrace for cpu 1 [ 1001.444008] CPU: 1 PID: 23 Comm: khungtaskd Not tainted 4.14.87+ #19 [ 1001.444011] Call Trace: [ 1001.444020] dump_stack+0xb9/0x11b [ 1001.444032] ? irq_force_complete_move.cold.3+0x64/0x64 [ 1001.444039] nmi_cpu_backtrace.cold.0+0x47/0x85 [ 1001.444049] ? irq_force_complete_move.cold.3+0x64/0x64 [ 1001.444055] nmi_trigger_cpumask_backtrace+0x121/0x146 [ 1001.444066] watchdog+0x574/0xa70 [ 1001.444083] ? reset_hung_task_detector+0x10/0x10 [ 1001.444090] kthread+0x348/0x420 [ 1001.444098] ? kthread_create_on_node+0xe0/0xe0 [ 1001.444108] ret_from_fork+0x3a/0x50 [ 1001.444130] Sending NMI from CPU 1 to CPUs 0: [ 1001.444522] NMI backtrace for cpu 0 [ 1001.444525] CPU: 0 PID: 4609 Comm: udevd Not tainted 4.14.87+ #19 [ 1001.444528] task: ffff8881c46ade00 task.stack: ffff88819b8e0000 [ 1001.444530] RIP: 0010:sidtab_context_to_sid+0x1ed/0xf70 [ 1001.444532] RSP: 0018:ffff88819b8e7558 EFLAGS: 00000246 [ 1001.444536] RAX: 1ffff1103aa9200a RBX: ffff8881da29de00 RCX: 0000000000000000 [ 1001.444538] RDX: 0000000000000000 RSI: ffff88819b8e76c8 RDI: ffff8881d5490050 [ 1001.444541] RBP: dffffc0000000000 R08: ffffed103371cee1 R09: ffff88819b8e76f8 [ 1001.444544] R10: ffffed103371cee0 R11: ffff88819b8e7707 R12: 0000000000000363 [ 1001.444546] R13: 0000000000000007 R14: ffff88819b8e76c8 R15: 0000000000000000 [ 1001.444549] FS: 00007f00e42087a0(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 1001.444551] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1001.444554] CR2: 0000000000770470 CR3: 00000001c29d0004 CR4: 00000000001606b0 [ 1001.444556] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1001.444559] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1001.444560] Call Trace: [ 1001.444562] security_compute_sid.part.6+0x7c5/0x1080 [ 1001.444565] ? security_compute_validatetrans.part.4+0x4c0/0x4c0 [ 1001.444566] ? avc_has_perm+0x150/0x390 [ 1001.444568] ? lock_downgrade+0x560/0x560 [ 1001.444570] ? lock_acquire+0x10f/0x380 [ 1001.444572] ? avc_has_perm+0x9e/0x390 [ 1001.444574] ? check_preemption_disabled+0x34/0x1e0 [ 1001.444576] security_transition_sid+0xcb/0x120 [ 1001.444578] selinux_determine_inode_label+0x230/0x310 [ 1001.444579] may_create+0x2b2/0x3d0 [ 1001.444581] ? selinux_inode_permission+0x221/0x460 [ 1001.444583] ? selinux_dentry_init_security+0x220/0x220 [ 1001.444585] ? selinux_inode_link+0x20/0x20 [ 1001.444587] ? security_inode_permission+0xc1/0xf0 [ 1001.444589] security_inode_create+0xc5/0x110 [ 1001.444591] lookup_open+0x77e/0x1750 [ 1001.444593] ? may_open.isra.21+0x2b0/0x2b0 [ 1001.444594] path_openat+0xf7d/0x2930 [ 1001.444596] ? path_mountpoint+0x9a0/0x9a0 [ 1001.444598] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 1001.444600] ? trace_hardirqs_on+0x10/0x10 [ 1001.444602] ? __might_fault+0x104/0x1b0 [ 1001.444603] ? lock_downgrade+0x560/0x560 [ 1001.444605] ? lock_acquire+0x10f/0x380 [ 1001.444607] do_filp_open+0x197/0x270 [ 1001.444609] ? may_open_dev+0xd0/0xd0 [ 1001.444610] ? _raw_spin_unlock+0x29/0x40 [ 1001.444612] do_sys_open+0x2ef/0x580 [ 1001.444614] ? filp_open+0x60/0x60 [ 1001.444616] ? do_syscall_64+0x43/0x4b0 [ 1001.444617] ? do_sys_open+0x580/0x580 [ 1001.444619] do_syscall_64+0x19b/0x4b0 [ 1001.444621] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1001.444623] RIP: 0033:0x7f00e3910120 [ 1001.444625] RSP: 002b:00007ffdf8f25058 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1001.444629] RAX: ffffffffffffffda RBX: 00000000007fe190 RCX: 00007f00e3910120 [ 1001.444632] RDX: 00000000000001b6 RSI: 0000000000080241 RDI: 00007ffdf8f25540 [ 1001.444634] RBP: 00007ffdf8f250d0 R08: 0000000000000004 R09: 0000000000000001 [ 1001.444637] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000004 [ 1001.444640] R13: 0000000000420721 R14: 00007ffdf8f25140 R15: 0000000000000000 [ 1001.444641] Code: 0a fa 8e ff 45 85 e4 0f 85 06 05 00 00 e8 fc f9 8e ff 48 8d 7b 50 48 89 f8 48 c1 e8 03 80 3c 28 00 0f 85 cd 0a 00 00 48 8b 5b 50 <48> 85 db 0f 84 9a 06 00 00 e8 d5 f9 8e ff 48 8d 7b 14 48 89 f8 [ 1001.445145] Kernel panic - not syncing: hung_task: blocked tasks [ 1001.445152] CPU: 1 PID: 23 Comm: khungtaskd Not tainted 4.14.87+ #19 [ 1001.445154] Call Trace: [ 1001.445162] dump_stack+0xb9/0x11b [ 1001.445174] panic+0x1bf/0x3a4 [ 1001.445182] ? add_taint.cold.4+0x16/0x16 [ 1001.445195] ? printk_safe_flush+0xb6/0x110 [ 1001.445211] watchdog+0x585/0xa70 [ 1001.445227] ? reset_hung_task_detector+0x10/0x10 [ 1001.445234] kthread+0x348/0x420 [ 1001.445241] ? kthread_create_on_node+0xe0/0xe0 [ 1001.445251] ret_from_fork+0x3a/0x50 [ 1001.445785] Kernel Offset: 0x10a00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1013.138657] Rebooting in 86400 seconds..