[ OK ] Started OpenBSD Secure Shell server. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.216' (ECDSA) to the list of known hosts. 2020/07/18 03:25:32 fuzzer started 2020/07/18 03:25:33 dialing manager at 10.128.0.26:33695 2020/07/18 03:25:33 syscalls: 3087 2020/07/18 03:25:33 code coverage: enabled 2020/07/18 03:25:33 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/07/18 03:25:33 extra coverage: enabled 2020/07/18 03:25:33 setuid sandbox: enabled 2020/07/18 03:25:33 namespace sandbox: enabled 2020/07/18 03:25:33 Android sandbox: enabled 2020/07/18 03:25:33 fault injection: enabled 2020/07/18 03:25:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/18 03:25:33 net packet injection: enabled 2020/07/18 03:25:33 net device setup: enabled 2020/07/18 03:25:33 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/18 03:25:33 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/18 03:25:33 USB emulation: /dev/raw-gadget does not exist 03:28:19 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000b40)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c10300000300000000030000400100000000000040010000400100000000000030020000300200003002000030020000300200000300000000000000000000000000004d4700000000000000000000000000004c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000180000000000000000000000000000000000000000000060000000000000000000000f8004001000000000000000000000000000000000000000000000000280061646472747970650000000000000000000000000000000000000000000100000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000048004c454400000000000000000000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000033000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004c454400000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000200000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) syzkaller login: [ 329.805270][ T32] audit: type=1400 audit(1595042899.628:8): avc: denied { execmem } for pid=8489 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 330.115787][ T8490] IPVS: ftp: loaded support on port[0] = 21 [ 330.404127][ T8490] chnl_net:caif_netlink_parms(): no params data found [ 330.663102][ T8490] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.671155][ T8490] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.680637][ T8490] device bridge_slave_0 entered promiscuous mode [ 330.724898][ T8490] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.732146][ T8490] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.741559][ T8490] device bridge_slave_1 entered promiscuous mode [ 330.823490][ T8490] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 330.850855][ T8490] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 330.915780][ T8490] team0: Port device team_slave_0 added [ 330.927765][ T8490] team0: Port device team_slave_1 added [ 330.999752][ T8490] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 331.007356][ T8490] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 331.033591][ T8490] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 331.047727][ T8490] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 331.054909][ T8490] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 331.082496][ T8490] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 331.181922][ T8490] device hsr_slave_0 entered promiscuous mode [ 331.296072][ T8490] device hsr_slave_1 entered promiscuous mode [ 331.779525][ T8490] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 331.933751][ T8490] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 332.014113][ T8490] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 332.212756][ T8490] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 332.659747][ T8490] 8021q: adding VLAN 0 to HW filter on device bond0 [ 332.696208][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 332.705709][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.723675][ T8490] 8021q: adding VLAN 0 to HW filter on device team0 [ 332.741938][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 332.751992][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.762873][ T3082] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.770135][ T3082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.828036][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 332.837814][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.847859][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.857373][ T3082] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.864578][ T3082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.873487][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 332.884311][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 332.895262][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 332.905848][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 332.916223][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 332.926867][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 332.962762][ T8490] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 332.973665][ T8490] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 333.041624][ T8490] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 333.065392][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 333.075852][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 333.085566][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.095985][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 333.105632][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.115379][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 333.123025][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 333.140625][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 333.162628][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 333.171992][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 333.246698][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 333.257715][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.283967][ T8490] device veth0_vlan entered promiscuous mode [ 333.305263][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.314265][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.345641][ T8490] device veth1_vlan entered promiscuous mode [ 333.421587][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 333.431279][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 333.442311][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 333.452245][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 333.472533][ T8490] device veth0_macvtap entered promiscuous mode [ 333.496502][ T8490] device veth1_macvtap entered promiscuous mode [ 333.510057][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 333.520263][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 333.574211][ T8490] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 333.582113][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 333.592093][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 333.629366][ T8490] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 333.638161][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 333.648544][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 03:28:23 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x58, 0x2, {{}, [@TCA_NETEM_LOSS={0x30, 0x5, 0x0, 0x1, [@NETEM_LOSS_GE={0x14}, @NETEM_LOSS_GI={0x12, 0x2}]}, @TCA_NETEM_REORDER={0xc}]}}}]}, 0x88}}, 0x0) [ 334.219649][ T8716] netem: incorrect ge model size [ 334.224675][ T8716] netem: change failed [ 334.336413][ T8719] netem: incorrect ge model size [ 334.341428][ T8719] netem: change failed 03:28:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000000)="11", 0x1) getsockopt$inet_opts(r0, 0x0, 0x400000000000009, &(0x7f0000937fed)=""/16, &(0x7f0000000080)=0x10) 03:28:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x4007f}, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, 0x5a, 0xe01}, 0x14}}, 0x0) 03:28:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0xfffff008}, {0x80000006}]}, 0x10) 03:28:25 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@private0, 0x800, 0x0, 0x3, 0x9}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @ipv4={[], [], @empty}}, 0x1c) 03:28:25 executing program 0: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="758200736b3d30"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000140)={'dummy0\x00', {0x2, 0x4e24, @multicast2}}) fcntl$lock(r1, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r1, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) getpeername$unix(r1, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x80010, r0, 0xdbfe5000) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r2, &(0x7f0000000280)={0xb}, 0xb) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r2, 0x800c4151, &(0x7f0000000240)={0x0, &(0x7f0000000180)="0ade286fbfa3808580e02450b7d37cafd3ef1cf0186b85c5a6a87b72f10045a451497be29eb70376ab3875154cf442c31b5bbcc240e8ec3a1a1f87554d545427cef3badd11ecf40771dbfd916fd56b", 0x4f}) [ 335.667064][ T8737] hfs: unable to parse mount options [ 336.435021][ T8742] hfs: unable to parse mount options 03:28:26 executing program 1: getpeername(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='wg1\x00', 0x4) ioctl$VFIO_CHECK_EXTENSION(r2, 0x3b65, 0x1) syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0x40, 0x101) r3 = openat$full(0xffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f0000000240)=0x100aa06, 0x4) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000280)) r4 = openat$zero(0xffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x189500, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000000340)={&(0x7f0000000300), 0x0, 0x7fffffff, 0x1822, 0x98c1, 0x92, 0x1, 0x9001, {0xffffffff, 0x2, 0x7, 0xfffc, 0x0, 0xffff, 0x3f, 0x3f, 0x3, 0x847d, 0x81, 0x3, 0x0, 0x80000001, "7c2a060e559db8d222830a4fd44f796044ce476c6d3d3a1dc294e6b67550ea7e"}}) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000003c0)=0xfffffff9, 0x4) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000440)={'filter\x00', 0x7, 0x4, 0x404, 0x10c, 0x0, 0x10c, 0x324, 0x324, 0x324, 0x4, &(0x7f0000000400), {[{{@arp={@dev={0xac, 0x14, 0x14, 0x25}, @empty, 0xffffff00, 0x0, 0xd, 0x5, {@empty, {[0xff, 0x0, 0x0, 0xff]}}, {@empty, {[0x0, 0xff, 0x0, 0xff, 0x0, 0xff]}}, 0x2, 0x80, 0x1ff, 0x7, 0x7, 0x6, 'dummy0\x00', 'wg0\x00', {0xff}, {0xff}, 0x0, 0x10}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @multicast1, @dev={0xac, 0x14, 0x14, 0x35}, 0x8, 0xfffffffe}}}, {{@arp={@multicast1, @dev={0xac, 0x14, 0x14, 0x23}, 0xffffffff, 0xffffff00, 0x0, 0x10, {@mac=@broadcast, {[0xff, 0x0, 0xff]}}, {@mac, {[0xff, 0x0, 0xff, 0xff, 0xff]}}, 0x2, 0x5, 0x400, 0x3, 0x3, 0x9, 'gre0\x00', 'dummy0\x00', {0xff}, {0xff}, 0x0, 0x288}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @empty, @dev={0xac, 0x14, 0x14, 0x18}, @loopback, 0x1, 0xffffffff}}}, {{@arp={@broadcast, @empty, 0xff000000, 0xffffffff, 0xa, 0xb, {@empty, {[0xff, 0x0, 0x0, 0xff]}}, {@empty, {[0xff, 0x0, 0xff, 0xff, 0xff, 0xff]}}, 0x817, 0x200, 0x7fff, 0x9, 0x9, 0x30, 'ip6_vti0\x00', 'vcan0\x00', {}, {0xff}, 0x0, 0x220}, 0xbc, 0x10c}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @empty, 0x8, 0x1}}}], {{[], 0xbc, 0xe0}, {0x24}}}}, 0x450) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x186) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f00000008c0)='batadv0\x00') r6 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000000900)={0x3, 'vcan0\x00', {0x8}, 0x100}) r7 = openat$vcs(0xffffff9c, &(0x7f0000000940)='/dev/vcs\x00', 0x0, 0x0) write$P9_RCREATE(r7, &(0x7f0000000980)={0x18, 0x73, 0x2, {{0x2, 0x4, 0x4}, 0x5}}, 0x18) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000a00)={0x20}) [ 336.526848][ T32] audit: type=1400 audit(1595042906.346:9): avc: denied { execmem } for pid=8744 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 03:28:26 executing program 0: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="758200736b3d30"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000140)={'dummy0\x00', {0x2, 0x4e24, @multicast2}}) fcntl$lock(r1, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r1, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) getpeername$unix(r1, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x80010, r0, 0xdbfe5000) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r2, &(0x7f0000000280)={0xb}, 0xb) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r2, 0x800c4151, &(0x7f0000000240)={0x0, &(0x7f0000000180)="0ade286fbfa3808580e02450b7d37cafd3ef1cf0186b85c5a6a87b72f10045a451497be29eb70376ab3875154cf442c31b5bbcc240e8ec3a1a1f87554d545427cef3badd11ecf40771dbfd916fd56b", 0x4f}) [ 336.838714][ T8749] hfs: unable to parse mount options [ 337.061706][ T8755] IPVS: ftp: loaded support on port[0] = 21 [ 337.371596][ T8755] chnl_net:caif_netlink_parms(): no params data found [ 337.580436][ T8755] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.587831][ T8755] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.597305][ T8755] device bridge_slave_0 entered promiscuous mode [ 337.609806][ T8755] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.617103][ T8755] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.626715][ T8755] device bridge_slave_1 entered promiscuous mode [ 337.678468][ T8755] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 337.712344][ T8755] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:28:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipmr_getroute={0x1c, 0x1a, 0xf, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r2, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0185647, &(0x7f0000000140)={0x9f0000, 0xc0d, 0x5, r2, 0x0, &(0x7f0000000000)={0x990902, 0x401, [], @ptr=0x7}}) [ 337.851629][ T8755] team0: Port device team_slave_0 added [ 337.884651][ T8755] team0: Port device team_slave_1 added [ 337.970198][ T8755] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 337.978633][ T8755] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 338.004733][ T8755] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 338.022005][ T8755] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 338.029588][ T8755] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 338.055671][ T8755] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 338.155369][ T8755] device hsr_slave_0 entered promiscuous mode [ 338.188465][ T8755] device hsr_slave_1 entered promiscuous mode [ 338.247395][ T8755] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 338.255031][ T8755] Cannot create hsr debugfs directory [ 338.632650][ T8755] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 338.701584][ T8755] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 338.749950][ T8755] netdevsim netdevsim1 netdevsim2: renamed from eth2 03:28:28 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000100)) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1, 0x0, 0x2, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r3, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) setsockopt$SO_BINDTODEVICE_wg(r3, 0x1, 0x19, &(0x7f0000000140)='wg2\x00', 0x4) r4 = pidfd_getfd(0xffffffffffffffff, r2, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000180)=@fragment={0x87, 0x0, 0x6, 0x1, 0x0, 0x7, 0x67}, 0x8) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x2, &(0x7f00000000c0)={0x5, &(0x7f0000000040)=[{0x9, 0xc8, 0x4, 0x5}, {0x7ff, 0x2, 0x0, 0x11}, {0x4, 0xba, 0x9c, 0x9}, {0x7, 0x3, 0x5, 0x9}, {0xbeca, 0x8, 0x71, 0x80000000}]}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r5, &(0x7f0000000280)={0xb}, 0xb) ioctl$KDENABIO(r5, 0x4b36) [ 338.817371][ T8755] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 339.102986][ T8755] 8021q: adding VLAN 0 to HW filter on device bond0 [ 339.133513][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 339.143724][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 339.170198][ T8755] 8021q: adding VLAN 0 to HW filter on device team0 [ 339.213152][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 339.224549][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 339.234032][ T8923] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.241335][ T8923] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.339710][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 339.349355][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 339.359160][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 339.368534][ T8923] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.375726][ T8923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.384670][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 339.395358][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 339.406131][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 339.416647][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 339.426751][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 339.437242][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 339.447345][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 339.456873][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 339.466613][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 339.476224][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 03:28:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @remote, 0x3f}, 0x80) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f0000000100)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf) [ 339.492899][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:28:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000004c0)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000f00004e2f98b579a782d257146d0e0206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000080)={'veth0_macvtap\x00', 0x3}) [ 339.694072][ T8755] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 339.732043][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 339.741857][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 339.749651][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 339.765765][ T8982] EXT4-fs (loop0): Invalid log cluster size: 3840 [ 339.835565][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 339.845994][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 339.861211][ T8982] EXT4-fs (loop0): Unrecognized mount option "veth0_macvtap" or missing value [ 339.934450][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 339.944552][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 03:28:29 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001145042, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYBLOB="9070bb21dc4c261f4fee60506c49c712000000359a7e"], &(0x7f00000000c0)=0x1a) r4 = openat2(r0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x240000, 0xf2}, 0x18) read$rfkill(r4, &(0x7f0000000000), 0x8) [ 339.985450][ T8755] device veth0_vlan entered promiscuous mode [ 340.028586][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.037645][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.059012][ T32] audit: type=1800 audit(1595042909.885:10): pid=8990 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15728 res=0 [ 340.078069][ T8755] device veth1_vlan entered promiscuous mode [ 340.128586][ T32] audit: type=1800 audit(1595042909.925:11): pid=8990 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15728 res=0 03:28:30 executing program 0: clone(0x6340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @timestamp, @timestamp, @mss={0x2, 0x100}], 0x4) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x218, 0x184, 0x228, 0x0, 0xf0, 0x228, 0x184, 0x2d8, 0x2d8, 0x184, 0x2d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x90, 0xf0, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {0xffff, [], 0x0, 0x2}}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'ipvlan0\x00'}, 0x0, 0x70, 0x94}, @common=@unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00', 0x0, {0x2}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x274) [ 340.253175][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 340.262535][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 340.271913][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 340.281786][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 340.315740][ T8755] device veth0_macvtap entered promiscuous mode [ 340.343075][ T8755] device veth1_macvtap entered promiscuous mode [ 340.408722][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 340.418946][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 03:28:30 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000280)={0xb}, 0xb) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000040)={0x20, r4, 0x703, 0x0, 0x0, {0x7, 0x7}, [@ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x4}]}]}, 0x20}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000200ffffffff0000000008000100736671"], 0x74}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000000660007c8370000000000810000000000", @ANYRES32=r8, @ANYBLOB="00000000110a02"], 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f0000000b80)={0x3bc, r4, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_SOPASS={0x1b, 0x3, "e53469d87e4a997291148005e6925f2ab142fc12cae05e"}, @ETHTOOL_A_WOL_SOPASS={0xb1, 0x3, "c2a5fd4de8f1c09dda1d5d209409d3d049a9e1f427b75b93be5602492668d9dc6eb59d6cca2983ee50231b2ed2c78a0ff183710797fe503fe3b2f8d6af94f206a05b287154a928919ae2b5b86f898e4a9da03af9e3b93daa59a3101eb2580d827567f788dc41672869cfd2f28c06450be8371bee0dbedbf1a03c4d88dc37e62d5c3c6e022dbb8ff5a81d40b1eba25fb40f5ef42c91deadb5b7fb14e7ab88cb71352d0048a49e069fa016723d69"}, @ETHTOOL_A_WOL_SOPASS={0x6d, 0x3, "8ea77d81bc3d6424261ba62ad654c30afb81a06bbb70801b451f7c44d0008551459e5b7bf33e0e612bbec5bedd703d519d074e710c01677f3e78bf1e0317f85e75f2d355951fab94b917032f4b66b6d5ac6d1b84273ccb6fe8aa307dafb4d103fb81248495f5e3ff5f"}, @ETHTOOL_A_WOL_SOPASS={0x1fe, 0x3, "9b5382e90cd4cbcdd264ab660279cbc9a1b9f90ec644b3b0a20c9dfc4c3fa001fa99a96193d921118c5ecaeab501f90894fa42d32a7ae709973b53e079ce7c51606264bc017ef6aaf3299243f6a55f67de3683ae6849fae969ffbb66ffd4ac2f0fdc5705a8fc8999094e35cfeac6b70e2d3f10df4376fd2a2b964c2aa32fb205564ad28322e8b821c20bf70342ab4a4745f2b4e47d2948ff6fb9da7725edddbd88b9a2b979b879b842831db2b02bc81ee11ee82ce61af7437dfadd96e423522eb07a5e23011c1627eac55ec8ad19c6cde5900841f1e914167606bcf4f0cd3c11ac1b9563559d96367c92e37d26b1a65cf8156115f14b63d91581cda8898c78f0fff5a70c9b5005523a72c5581a7dd76fec5b848dffab5e3114d45151a44ec894b5653085d190c19da6e37c0af116e7c0169222f869a97a9f4b292d68290d19c2145e6866f41d717cc94b0dae742cac452958820781c61771268ce62a85e6c7878d82f262f5809ca19f1641aadc7a38c77095bed4d365520a877a190196ce5ccb99819406530d617f1385c6f20e60fc3b45ded150f07b78975bb394c43ab8e0059f14acb5c121ebeccd3ed3265e79ca70e97bd604325367b1c333c2f730fe67219acdabc04e48fb97d205d6d2a27d75259c1aa99a5f5f6014754e459f4f325cf8c1794d4cdcda4721d86090316fa2102779851e85ea5a0d003c31"}, @ETHTOOL_A_WOL_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x4}, 0x48000) [ 340.486353][ T8755] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 340.498366][ T8755] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.512147][ T8755] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 340.537513][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 340.548067][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 340.634998][ T8755] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 340.645996][ T8755] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.660523][ T8755] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 340.669615][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 340.680810][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 340.817214][ T9005] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.0'. [ 340.861175][ T9007] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 340.928508][ T9005] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 340.954343][ T9007] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. 03:28:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="b2a30005513d7141ec71149007d9e7e00000000000004ed32b4ab06e94ad2f9c565895c11edc5e5c3205811846f9d05b8526593275477609ff79cefe9a481ce7696b71cfc5e1d950e5fc622b9be4162d919a683cfcf23e86fbdbd6b93860bbf98933b3abda9fd6e2e811bd0d5cbd2a5541179933ff460b2144c6fe284a9e734b9bd9af24dc6b810d30be2b19e97bc77d3a99b7f5a82dc744c0c6b316", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="700000002cb12084bdfa668ee800270d00000000", @ANYRES32=r2, @ANYBLOB="00000000000000000800000009000100666c6f77"], 0x70}}, 0x0) r3 = socket(0x26, 0x80002, 0x803) sendmmsg$alg(r3, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 341.722925][ T9024] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 341.767285][ T9026] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 03:28:31 executing program 0: syz_read_part_table(0x8000000, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}, {&(0x7f0000000040)="ea482965686ee6b523b4c8312c176a0f6de254aa35406eb79ad67a41308657dfd049c98f8f64e95abdd9f1bec299bbc1c10d3cafa520a915aa7bff", 0x3b, 0x3dab}]) 03:28:31 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="75707065726400000000000100042c776f728ff595f03e37e8055d16dfc8e606f96b6469657264696c65302c000000000000000000000000a200"]) r0 = openat$null(0xffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x149003, 0x0) unlinkat(r0, &(0x7f0000000100)='./file2\x00', 0x200) getuid() mount$9p_virtio(0x0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x10020, 0x0) [ 342.155909][ T9036] overlayfs: unrecognized mount option "upperd" or missing value [ 342.165044][ T9033] loop0: p1 p2 p3 p4 [ 342.169789][ T9033] loop0: p1 size 11290111 extends beyond EOD, truncated [ 342.191597][ T9033] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 342.220612][ T9036] overlayfs: unrecognized mount option "upperd" or missing value [ 342.231432][ T9033] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 342.279760][ T9033] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:28:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x2}, @IFLA_GENEVE_UDP_ZERO_CSUM6_TX={0x5}]}}}]}, 0x44}}, 0x0) openat$sequencer(0xffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x1, 0x0) 03:28:32 executing program 0: syz_read_part_table(0x8000000, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}, {&(0x7f0000000040)="ea482965686ee6b523b4c8312c176a0f6de254aa35406eb79ad67a41308657dfd049c98f8f64e95abdd9f1bec299bbc1c10d3cafa520a915aa7bff", 0x3b, 0x3dab}]) 03:28:32 executing program 1: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000000c0)={0x7}, 0x1) r2 = syz_open_procfs(r0, &(0x7f0000000300)='fd/3\x00') ioctl$int_out(r2, 0x40084504, 0x0) 03:28:32 executing program 0: syz_read_part_table(0x8000000, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}, {&(0x7f0000000040)="ea482965686ee6b523b4c8312c176a0f6de254aa35406eb79ad67a41308657dfd049c98f8f64e95abdd9f1bec299bbc1c10d3cafa520a915aa7bff", 0x3b, 0x3dab}]) [ 343.012432][ T9054] loop0: p1 p2 p3 p4 [ 343.017635][ T9054] loop0: p1 size 11290111 extends beyond EOD, truncated [ 343.088069][ T9054] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 343.098618][ T9054] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 343.129459][ T9054] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:28:33 executing program 0: syz_read_part_table(0x8000000, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}, {&(0x7f0000000040)="ea482965686ee6b523b4c8312c176a0f6de254aa35406eb79ad67a41308657dfd049c98f8f64e95abdd9f1bec299bbc1c10d3cafa520a915aa7bff", 0x3b, 0x3dab}]) 03:28:33 executing program 1: mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x50) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYRESOCT=r2, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00th\x00'/20], 0x48}, 0x1, 0x0, 0x0, 0x20008080}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000200ffffffff0000000008000100736671"], 0x74}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="34000000660007c8370000000000810000000000", @ANYRES32=r4, @ANYRES64=r1], 0x34}}, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, @hci={0x1f, 0x0, 0x4}, @generic={0x2c, "55b1bee2b62df71bb645aacaa9a4"}, @can={0x1d, r4}, 0x7eb, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000180)='vlan0\x00', 0x9d0, 0x7, 0xfff}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x22}}, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffff, 0x3, 0xcae8, 0x500, 0x6, 0x20011, r5}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) sendto(0xffffffffffffffff, &(0x7f0000000300)="ca1cdb5498fbb67a4a751d8e8a5785457d6110829c4202cdd3624c68131db0dbd830397c004b0ec94b1f2fcbdcaa02f7fed57b55bf61cd06bdc5f703766cb6b95cd7ebe69c9ebc9b7c63b8731f1c75fe3f5d684d69c63376afd9e37db115eda59a2051ddee061f5acab05c2247c250358657523dae2aa1fdb40948402aec8caab1b5d5ee1b7129c72d783a4a4dc13f69dad077", 0x93, 0x20000040, 0x0, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, 0x0, &(0x7f0000000040)) 03:28:33 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}, {&(0x7f0000000040)="ea482965686ee6b523b4c8312c176a0f6de254aa35406eb79ad67a41308657dfd049c98f8f64e95abdd9f1bec299bbc1c10d3cafa520a915aa7bff", 0x3b, 0x3dab}]) 03:28:33 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}, {&(0x7f0000000040)="ea482965686ee6b523b4c8312c176a0f6de254aa35406eb79ad67a41308657dfd049c98f8f64e95abdd9f1bec299bbc1c10d3cafa520a915aa7bff", 0x3b, 0x3dab}]) [ 344.320124][ T9091] loop0: p1 p2 p3 p4 [ 344.324352][ T9091] loop0: partition table partially beyond EOD, truncated [ 344.332201][ T9091] loop0: p1 start 4106 is beyond EOD, truncated [ 344.338667][ T9091] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 344.457360][ T9091] loop0: p3 start 225 is beyond EOD, truncated [ 344.463787][ T9091] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:28:34 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}, {&(0x7f0000000040)="ea482965686ee6b523b4c8312c176a0f6de254aa35406eb79ad67a41308657dfd049c98f8f64e95abdd9f1bec299bbc1c10d3cafa520a915aa7bff", 0x3b, 0x3dab}]) 03:28:34 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) r2 = socket(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x4}, 0x14}}, 0x0) [ 344.930749][ T9103] loop0: p1 p2 p3 p4 [ 344.934815][ T9103] loop0: partition table partially beyond EOD, truncated [ 344.942684][ T9103] loop0: p1 start 4106 is beyond EOD, truncated [ 344.949114][ T9103] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 345.041700][ T9103] loop0: p3 start 225 is beyond EOD, truncated [ 345.048026][ T9103] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:28:35 executing program 0: syz_read_part_table(0x8000000, 0x0, 0x0) [ 345.320082][ T32] audit: type=1800 audit(1595042915.144:12): pid=9113 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=15722 res=0 [ 345.360041][ T3082] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=3082 comm=kworker/1:2 [ 345.404898][ T9113] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9113 comm=syz-executor.1 03:28:35 executing program 0: syz_read_part_table(0x8000000, 0x0, 0x0) 03:28:35 executing program 0: syz_read_part_table(0x8000000, 0x0, 0x0) 03:28:36 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:28:36 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r2, &(0x7f0000000280)={0xb}, 0xb) ioctl$SIOCPNDELRESOURCE(r2, 0x89ef, &(0x7f0000000100)=0x7fff) ioctl$TIOCL_SELLOADLUT(r1, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x4, 0xffffffffffff79f0, 0x4}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newtaction={0x50, 0x30, 0x53b, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_connmark={0x38, 0x1, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x10000000}}}]}, {0x4}}}]}]}, 0x50}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r3, &(0x7f0000000280)={0xb}, 0xb) set_tid_address(&(0x7f0000000140)) ioctl$BLKGETSIZE(r3, 0x1260, &(0x7f0000000080)) [ 346.531410][ T9132] loop0: p1 p2 p3 p4 [ 346.536062][ T9132] loop0: p1 size 11290111 extends beyond EOD, truncated [ 346.555448][ T9132] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 346.577683][ T9132] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 346.598916][ T9132] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:28:36 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r2, &(0x7f0000000280)={0xb}, 0xb) ioctl$SIOCPNDELRESOURCE(r2, 0x89ef, &(0x7f0000000100)=0x7fff) ioctl$TIOCL_SELLOADLUT(r1, 0x541c, &(0x7f0000000000)={0x5, 0x5, 0x4, 0xffffffffffff79f0, 0x4}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newtaction={0x50, 0x30, 0x53b, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_connmark={0x38, 0x1, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x10000000}}}]}, {0x4}}}]}]}, 0x50}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r3, &(0x7f0000000280)={0xb}, 0xb) set_tid_address(&(0x7f0000000140)) ioctl$BLKGETSIZE(r3, 0x1260, &(0x7f0000000080)) 03:28:36 executing program 0: syz_read_part_table(0x8000000, 0x0, &(0x7f00000000c0)) 03:28:36 executing program 0: syz_read_part_table(0x8000000, 0x0, &(0x7f00000000c0)) 03:28:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xf, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/479], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x9c}, 0x48) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) 03:28:37 executing program 0: syz_read_part_table(0x8000000, 0x0, &(0x7f00000000c0)) 03:28:37 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x20) ioctl$KDMKTONE(r2, 0x4b30, 0x606b) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x1d00002b) 03:28:37 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x1c0}]) [ 347.884665][ T32] audit: type=1800 audit(1595042917.704:13): pid=9163 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=15747 res=0 03:28:37 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x1c0}]) 03:28:37 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc004240a, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r2, &(0x7f0000000280)={0xb}, 0xb) prctl$PR_SET_ENDIAN(0x14, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r3, &(0x7f0000000280)={0xb}, 0xb) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @raw_data=[0x9d6, 0xd7d, 0x101, 0x6, 0x8, 0x9, 0x0, 0x2152, 0xfffffffc, 0x8, 0x9, 0x40, 0x1, 0x3, 0x1000, 0x2, 0x1f, 0x8, 0x1, 0x1ff, 0x5, 0x4, 0x0, 0x264, 0x1f, 0xff, 0x4129, 0x0, 0x1, 0xa, 0x9d, 0x9]}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r4, &(0x7f0000000280)={0xb}, 0xb) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r5, &(0x7f0000000280)={0xb}, 0xb) r6 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0xa8) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4008ae89, &(0x7f0000000080)={0x5, 0xfffffffe, [0xc0000100, 0x0, 0x3, 0x8, 0xc0010058]}) 03:28:38 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x1c0}]) 03:28:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0xafe281, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$tun(r0, &(0x7f0000000240)={@void, @val={0x0, 0x0, 0x2}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x88, 0x0, @dev, @remote}, @timestamp={0xd, 0x0, 0x0, 0xfee, 0x2}}}}, 0x100c) 03:28:38 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0x1c0}]) 03:28:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0x800, 0x1a78]}, &(0x7f0000000200), &(0x7f0000000100)={r2, r3+60000000}, 0x8) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @loopback}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}]]}}}, @IFLA_MASTER={0x8}]}, 0x48}}, 0x0) 03:28:38 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0x1c0}]) 03:28:39 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0x1c0}]) 03:28:39 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ff", 0x20, 0x1c0}]) 03:28:39 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0x50, 0x4, 0x470, 0xf8, 0xf8, 0x1dc, 0xf8, 0x1dc, 0x3a8, 0x3a8, 0x3a8, 0x3a8, 0x3a8, 0x4, 0x0, {[{{@ipv6={@mcast1, @loopback={0x0, 0x8a00}, [], [], 'bond_slave_0\x00', 'veth0\x00'}, 0x0, 0xd4, 0xf8, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}]}, @REJECT={0x24, 'REJECT\x00', 0x0, {0x5}}}, {{@uncond, 0x0, 0xa4, 0xe4}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0x160, 0x1cc, 0x0, {}, [@common=@unspec=@conntrack2={{0xbc, 'conntrack\x00'}, {{@ipv6=@remote, [], @ipv4=@empty, [], @ipv6=@remote, [], @ipv6=@loopback}}}]}, @common=@unspec=@NFLOG={0x6c, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "20390d5191ef6c3e476b0cc0f829610aab687a97ccc06ba96316e8049485430074ac887ae5d484ca881bc1097c5f159057e2d69efbfac943fccefb7564dc749c"}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x4cc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e23, @private=0xa010101}}, 0x80000000, 0x5, 0x80000000, 0x8, 0x210000}, &(0x7f00000000c0)=0x98) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000200)=0x400, &(0x7f0000000240)=0x4) write$P9_RWRITE(r3, &(0x7f0000000280)={0xb}, 0xb) setns(r3, 0x20000000) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f00000001c0)={0x2, 0x0, 0x1b, 0xe, 0xd7, &(0x7f00000002c0)="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"}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={r2, @in={{0x2, 0x4e22, @empty}}, 0x80, 0x6}, 0x88) [ 349.932231][ T9218] ip6t_REJECT: ECHOREPLY is not supported [ 349.946342][ T9218] ip6t_REJECT: ECHOREPLY is not supported 03:28:39 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ff", 0x20, 0x1c0}]) 03:28:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = msgget$private(0x0, 0x200) msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)) msgsnd(r5, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) msgctl$IPC_RMID(r5, 0x0) [ 350.186127][ C1] hrtimer: interrupt took 128243 ns 03:28:40 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ff", 0x20, 0x1c0}]) 03:28:40 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e1000000887700720030", 0x30, 0x1c0}]) 03:28:40 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = msgget$private(0x0, 0x200) msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)) msgsnd(r5, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) msgctl$IPC_RMID(r5, 0x0) 03:28:40 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e1000000887700720030", 0x30, 0x1c0}]) 03:28:41 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e1000000887700720030", 0x30, 0x1c0}]) 03:28:41 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff0000", 0x38, 0x1c0}]) 03:28:42 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = msgget$private(0x0, 0x200) msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)) msgsnd(r5, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) msgctl$IPC_RMID(r5, 0x0) 03:28:42 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff0000", 0x38, 0x1c0}]) 03:28:42 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff0000", 0x38, 0x1c0}]) 03:28:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = msgget$private(0x0, 0x200) msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)) msgsnd(r5, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) msgctl$IPC_RMID(r5, 0x0) 03:28:42 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff000000000080", 0x3c, 0x1c0}]) 03:28:43 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff000000000080", 0x3c, 0x1c0}]) 03:28:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = msgget$private(0x0, 0x200) msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)) msgsnd(r5, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) msgctl$IPC_RMID(r5, 0x0) 03:28:43 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff000000000080", 0x3c, 0x1c0}]) [ 353.831483][ T9287] IPVS: ftp: loaded support on port[0] = 21 03:28:44 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da", 0x3e, 0x1c0}]) [ 354.617083][ T9287] chnl_net:caif_netlink_parms(): no params data found 03:28:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = msgget$private(0x0, 0x200) msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)) msgsnd(r5, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:28:44 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da", 0x3e, 0x1c0}]) 03:28:45 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da", 0x3e, 0x1c0}]) [ 355.269490][ T9287] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.276771][ T9287] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.286410][ T9287] device bridge_slave_0 entered promiscuous mode [ 355.400950][ T9287] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.408723][ T9287] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.418308][ T9287] device bridge_slave_1 entered promiscuous mode 03:28:45 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55", 0x3f, 0x1c0}]) [ 355.743004][ T9287] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 355.804457][ T9287] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 355.918136][ T9287] team0: Port device team_slave_0 added [ 355.931467][ T9287] team0: Port device team_slave_1 added 03:28:45 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = msgget$private(0x0, 0x200) msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)) msgsnd(r5, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 356.035496][ T9287] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 356.042684][ T9287] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 356.068853][ T9287] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 356.085131][ T9287] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 356.092728][ T9287] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 356.118809][ T9287] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 03:28:46 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55", 0x3f, 0x1c0}]) [ 356.217566][ T9287] device hsr_slave_0 entered promiscuous mode [ 356.249019][ T9287] device hsr_slave_1 entered promiscuous mode [ 356.278245][ T9287] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 356.286649][ T9287] Cannot create hsr debugfs directory [ 356.806733][ T9287] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 356.903883][ T9287] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 356.982094][ T9287] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 357.057360][ T9287] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 357.502603][ T9287] 8021q: adding VLAN 0 to HW filter on device bond0 [ 357.606177][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 357.616291][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 357.637374][ T9287] 8021q: adding VLAN 0 to HW filter on device team0 [ 357.677548][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.689174][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.698774][ T8923] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.706222][ T8923] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.802090][ T9287] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 357.812626][ T9287] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 357.833779][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.843711][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.853599][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.862987][ T8923] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.870460][ T8923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.879469][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 357.890258][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 357.902196][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 357.912846][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 357.922950][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 357.933486][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 357.943627][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 357.953240][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 357.963772][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 357.973645][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.991538][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 358.001480][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 358.070799][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 358.078576][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 358.110785][ T9287] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 358.175037][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 358.186023][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 358.254290][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 358.264620][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 358.286259][ T9287] device veth0_vlan entered promiscuous mode [ 358.300983][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 358.310542][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 358.339484][ T9287] device veth1_vlan entered promiscuous mode [ 358.483379][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 358.493400][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 358.503283][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 358.513154][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 358.556752][ T9287] device veth0_macvtap entered promiscuous mode [ 358.589116][ T9287] device veth1_macvtap entered promiscuous mode [ 358.623079][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 358.632980][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 358.671625][ T9287] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 358.682624][ T9287] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 358.692812][ T9287] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 358.703462][ T9287] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 358.718849][ T9287] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 358.731673][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 358.742651][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 358.775956][ T9287] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 358.792594][ T9287] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 358.802856][ T9287] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 358.813404][ T9287] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 358.827539][ T9287] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 358.856227][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 358.866575][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 03:28:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = msgget$private(0x0, 0x200) msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)) msgsnd(r5, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:28:50 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55", 0x3f, 0x1c0}]) 03:28:50 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = msgget$private(0x0, 0x200) msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)) msgsnd(r5, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1, 0x0) 03:28:51 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40}]) 03:28:51 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40}]) 03:28:51 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55", 0x3f, 0x1c0}]) 03:28:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = msgget$private(0x0, 0x200) msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)) msgsnd(r5, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1, 0x0) 03:28:52 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40}]) 03:28:52 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55", 0x3f, 0x1c0}]) 03:28:53 executing program 0 (fault-call:0 fault-nth:0): syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:28:53 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55", 0x3f, 0x1c0}]) [ 363.384070][ T9591] FAULT_INJECTION: forcing a failure. [ 363.384070][ T9591] name failslab, interval 1, probability 0, space 0, times 1 [ 363.397861][ T9591] CPU: 0 PID: 9591 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 363.406770][ T9591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.416969][ T9591] Call Trace: [ 363.420370][ T9591] dump_stack+0x1df/0x240 [ 363.424800][ T9591] should_fail+0x8b7/0x9e0 [ 363.429318][ T9591] __should_failslab+0x1f6/0x290 [ 363.434517][ T9591] should_failslab+0x29/0x70 [ 363.439206][ T9591] __kmalloc+0xae/0x460 [ 363.443546][ T9591] ? __se_sys_memfd_create+0x2a1/0xba0 [ 363.449100][ T9591] __se_sys_memfd_create+0x2a1/0xba0 [ 363.454562][ T9591] ? kmsan_set_origin_checked+0x95/0xf0 [ 363.460199][ T9591] ? kmsan_get_metadata+0x11d/0x180 [ 363.465485][ T9591] ? __se_sys_memfd_create+0xba0/0xba0 [ 363.471038][ T9591] __ia32_sys_memfd_create+0x3e/0x60 [ 363.476413][ T9591] __do_fast_syscall_32+0x2aa/0x400 [ 363.481842][ T9591] do_fast_syscall_32+0x6b/0xd0 [ 363.486788][ T9591] do_SYSENTER_32+0x73/0x90 [ 363.491473][ T9591] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 363.497875][ T9591] RIP: 0023:0xf7ffb549 [ 363.501990][ T9591] Code: Bad RIP value. [ 363.506116][ T9591] RSP: 002b:00000000f5df5eac EFLAGS: 00000292 ORIG_RAX: 0000000000000164 [ 363.514702][ T9591] RAX: ffffffffffffffda RBX: 00000000080d7744 RCX: 0000000000000000 [ 363.522747][ T9591] RDX: 000000000804cef3 RSI: 0000000000000000 RDI: 0000000000000000 [ 363.530792][ T9591] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 363.538832][ T9591] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 363.546875][ T9591] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 03:28:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = msgget$private(0x0, 0x200) msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)) msgsnd(r5, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1, 0x0) 03:28:53 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55", 0x3f, 0x1c0}]) 03:28:54 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000002140)=0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r2, &(0x7f0000000280)={0xb}, 0xb) clone3(&(0x7f00000021c0)={0x4001080, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), {0x1c}, &(0x7f0000000140)=""/4096, 0x1000, &(0x7f0000001140)=""/4096, &(0x7f0000002180)=[r1], 0x1, {r2}}, 0x58) [ 364.539329][ T9602] Dev loop2: unable to read RDB block 1 [ 364.545244][ T9602] loop2: unable to read partition table [ 364.551367][ T9602] loop2: partition table beyond EOD, truncated [ 364.557753][ T9602] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:28:54 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) 03:28:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = msgget$private(0x0, 0x200) msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 364.892212][ T9607] loop0: p1 p2 p3 p4 [ 364.896970][ T9607] loop0: p1 size 11290111 extends beyond EOD, truncated [ 364.986242][ T9607] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 365.046433][ T9607] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 365.080419][ T9607] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:28:55 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) 03:28:55 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) 03:28:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) r5 = msgget$private(0x0, 0x200) msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:28:56 executing program 2: syz_read_part_table(0x0, 0x0, &(0x7f00000000c0)) 03:28:56 executing program 2: syz_read_part_table(0x0, 0x0, &(0x7f00000000c0)) 03:28:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:28:57 executing program 2: syz_read_part_table(0x0, 0x0, &(0x7f00000000c0)) 03:28:57 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x1c0}]) [ 368.299329][ T9661] Dev loop2: unable to read RDB block 1 [ 368.305041][ T9661] loop2: unable to read partition table [ 368.311158][ T9661] loop2: partition table beyond EOD, truncated [ 368.317450][ T9661] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:28:58 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x1c0}]) 03:28:58 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 368.890597][ T9665] Dev loop2: unable to read RDB block 1 [ 368.896368][ T9665] loop2: unable to read partition table [ 368.902738][ T9665] loop2: partition table beyond EOD, truncated [ 368.909122][ T9665] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:28:59 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x1c0}]) [ 369.750439][ T9673] Dev loop2: unable to read RDB block 1 [ 369.756153][ T9673] loop2: unable to read partition table [ 369.762458][ T9673] loop2: partition table beyond EOD, truncated [ 369.768788][ T9673] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:28:59 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0x1c0}]) 03:28:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 370.249616][ T9679] Dev loop2: unable to read RDB block 1 [ 370.255432][ T9679] loop2: unable to read partition table [ 370.261501][ T9679] loop2: partition table beyond EOD, truncated [ 370.267825][ T9679] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:29:00 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0x1c0}]) [ 370.874969][ T9687] Dev loop2: unable to read RDB block 1 [ 370.880975][ T9687] loop2: unable to read partition table [ 370.886801][ T9687] loop2: partition table beyond EOD, truncated [ 370.893246][ T9687] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:29:01 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0x0, 0x1c0}]) 03:29:01 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 371.422304][ T9690] Dev loop2: unable to read RDB block 1 [ 371.428253][ T9690] loop2: unable to read partition table [ 371.434082][ T9690] loop2: partition table beyond EOD, truncated [ 371.440493][ T9690] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:29:01 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ff", 0x20, 0x1c0}]) 03:29:01 executing program 0: r0 = gettid() r1 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x101) ptrace$pokeuser(0x6, r0, 0x28, 0xfffffffc) ioctl$FITHAW(r1, 0xc0045878) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r2, &(0x7f0000000280)={0xb}, 0xb) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f0000000100)) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c000000130a010200f6ffffff9d263268ee3200000000eefff837f440c8575134a9e70ab0ff000000000000a39d7a37ff70c6c10fb24e43d062e20a72ccd1e223106ff13038dcff43c5c207f0a288cc7ba65bdf914d6d6e64511f7728f264068bf775f9726ec5877cafd9c4a7d0e3786e5f3404d3fa4d43adf64aca017ade8b2406245f12d5ae2c3ff0e3739f24f4f5b4741691d8fac106004fe7bdc8fb99544436af019d44bc8e"], 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x4000010) gettid() r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r3, &(0x7f0000000280)={0xb}, 0xb) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000240)={0x1, 0xe4d6, 0x0, 0x7f, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f00000002c0)={r4}) ptrace$setopts(0x4206, r0, 0x0, 0x0) r5 = syz_open_procfs(r0, &(0x7f00000000c0)='net/nf_conntrack\x00') r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r6, &(0x7f0000000280)={0x12, 0x77, 0x2, 0x4}, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r6, 0xc0485510, &(0x7f0000000540)={0x20, 0x6, 0x10000, 0xdef1c16, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}]}) write$P9_RWRITE(r5, &(0x7f0000000280)={0xb, 0x77, 0x8000, 0xfffffffd}, 0xb) getsockopt$IPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x43, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) 03:29:01 executing program 0: syz_read_part_table(0x8000000, 0x0, &(0x7f00000000c0)) r0 = openat$autofs(0xffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0xa000, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000001c0)={'batadv0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000002c0)={'batadv_slave_0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000200ffffffff0000000008000100736671"], 0x74}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000000660007c8370000000000810000000000", @ANYRES32=r8, @ANYBLOB="00000000110a02"], 0x34}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x24, r3, 0x4, 0x3, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r3, 0x8, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x20}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7ff}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2000000}, 0x1004c044) 03:29:01 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 372.169390][ T9702] Dev loop2: unable to read RDB block 1 [ 372.175239][ T9702] loop2: unable to read partition table [ 372.181512][ T9702] loop2: partition table beyond EOD, truncated [ 372.187875][ T9702] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 372.245302][ T9707] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 372.352183][ T9705] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. [ 372.503340][ T9719] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 372.551152][ T9705] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. 03:29:02 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ff", 0x20, 0x1c0}]) 03:29:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) write$P9_RWRITE(r1, &(0x7f0000000040)={0xb, 0x77, 0x0, 0x7}, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:29:03 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ff", 0x20, 0x1c0}]) [ 373.115655][ T9725] Dev loop2: unable to read RDB block 1 [ 373.121518][ T9725] loop2: unable to read partition table [ 373.127507][ T9725] loop2: partition table beyond EOD, truncated [ 373.133726][ T9725] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 373.300477][ T9728] loop0: p1 p2 p3 p4 [ 373.305198][ T9728] loop0: p1 size 11290111 extends beyond EOD, truncated [ 373.341048][ T9728] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 373.374165][ T9728] loop0: p3 size 1912633224 extends beyond EOD, truncated 03:29:03 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 373.435419][ T9728] loop0: p4 size 3657465856 extends beyond EOD, truncated [ 373.452645][ T9734] Dev loop2: unable to read RDB block 1 [ 373.459106][ T9734] loop2: unable to read partition table [ 373.464932][ T9734] loop2: partition table beyond EOD, truncated [ 373.471345][ T9734] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:29:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r1, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) fcntl$lock(r0, 0x25, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x28c, r2}) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, r3}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000400)={0x0, 0x0, 0x2, 0x8}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="02001445ac0000ffffff8100030000000000000002ff12ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa5aabacd32077", 0x3e, 0x1c3}]) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r4, &(0x7f0000000280)={0xb}, 0xb) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r4, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x60090400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="00800000004f5d9b0000000800150004fffb0508004a00010000000800010001000000"], 0x30}, 0x1, 0x0, 0x0, 0x4800}, 0x44000) 03:29:03 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e1000000887700720030", 0x30, 0x1c0}]) [ 374.270913][ T9752] Dev loop2: unable to read RDB block 1 [ 374.276836][ T9752] loop2: unable to read partition table [ 374.282658][ T9752] loop2: partition table beyond EOD, truncated [ 374.289111][ T9752] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 374.311372][ T4876] loop0: p1 p2 p3 p4 [ 374.316026][ T4876] loop0: p1 size 11290111 extends beyond EOD, truncated [ 374.326062][ T4876] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 374.335968][ T4876] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 374.346547][ T4876] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:29:04 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e1000000887700720030", 0x30, 0x1c0}]) 03:29:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 374.958030][ T4876] Dev loop2: unable to read RDB block 1 [ 374.963723][ T4876] loop2: unable to read partition table [ 374.969701][ T4876] loop2: partition table beyond EOD, truncated [ 375.010063][ T9771] Dev loop2: unable to read RDB block 1 [ 375.015877][ T9771] loop2: unable to read partition table [ 375.021910][ T9771] loop2: partition table beyond EOD, truncated [ 375.029510][ T9771] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:29:05 executing program 0: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) ptrace$poke(0x5, r0, &(0x7f0000000000), 0x1cb29) syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:29:05 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e1000000887700720030", 0x30, 0x1c0}]) [ 375.523856][ T9782] loop0: p1 p2 p3 p4 [ 375.529177][ T9782] loop0: p1 size 11290111 extends beyond EOD, truncated [ 375.547320][ T9782] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 375.557896][ T9782] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 375.602484][ T9782] loop0: p4 size 3657465856 extends beyond EOD, truncated [ 375.649814][ T9786] Dev loop2: unable to read RDB block 1 [ 375.655726][ T9786] loop2: unable to read partition table [ 375.661741][ T9786] loop2: partition table beyond EOD, truncated [ 375.669024][ T9786] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:29:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r3, 0xe4af}, &(0x7f0000000140)=0x8) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r4, &(0x7f0000000280)={0xb}, 0xb) read$dsp(r4, &(0x7f0000000000)=""/122, 0x7a) syz_read_part_table(0x7fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff8100080000000000da4c01a110542dfaa9000000e10000008877007200300700a6ffffff00000000029de71255aa", 0x40, 0x1c8}]) 03:29:05 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff0000", 0x38, 0x1c0}]) [ 376.160267][ T9805] Dev loop2: unable to read RDB block 1 [ 376.166311][ T9805] loop2: unable to read partition table [ 376.172137][ T9805] loop2: partition table beyond EOD, truncated [ 376.178524][ T9805] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:29:06 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff0000", 0x38, 0x1c0}]) 03:29:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r1, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) sendfile(r0, r1, 0x0, 0x6) write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000040)=@urb_type_interrupt={0x1, {0xb, 0x1}, 0x0, 0xa7, &(0x7f0000000000)="9ace9c16664b8e131e27e55bbd595a2b521f6790141a15422b277a65acb09648742dde775b7a75", 0x27, 0x40000000, 0x7, 0x0, 0xffffffb9, 0xffffd0f3, &(0x7f0000000100)="b645ba1b4cc592cc2dcdea4ed11fa10a2649c5c89b779900c6fd9e1f191667f2f359be3b06d2403fa1644515186e2aa64bda42b473d929a7c742c40bb0f5125f6472edf2c50732da7c5b787982b37a1a592121b800dc9609a680003797f268a7b7a1e935e9c94009fe037a07b5c6558229c98e2cb1f1dd24a0827dab480fbfa3c54fb70a5ce9923b8383a28c25404dd6526f5307070675e55642f987f6e087fc076ce7bc6136c189e3833954502ad1543b98ce31fa1048522b8414506da6b43a104343095215a27ae2a36acfece303b497a56964057105"}) syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="93b20000000000000000010000000020000001410000001c001700020000000000006574683a73"], 0x38}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, r3, 0x2, 0x70bd2d, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000010}, 0x4) [ 376.609638][ T9815] Dev loop2: unable to read RDB block 1 [ 376.615550][ T9815] loop2: unable to read partition table [ 376.621552][ T9815] loop2: partition table beyond EOD, truncated [ 376.627897][ T9815] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 376.784664][ T9821] loop0: p1 p2 p3 p4 [ 376.789611][ T9821] loop0: p1 size 11290111 extends beyond EOD, truncated [ 376.810309][ T9823] tipc: Enabling of bearer rejected, failed to enable media [ 376.887220][ T9821] loop0: p2 size 1073872896 extends beyond EOD, truncated 03:29:06 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 376.943851][ T9821] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 376.960602][ T9821] loop0: p4 size 3657465856 extends beyond EOD, truncated [ 376.999576][ T4876] loop0: p1 p2 p3 p4 [ 377.004126][ T4876] loop0: p1 size 11290111 extends beyond EOD, truncated [ 377.028150][ T4876] loop0: p2 size 1073872896 extends beyond EOD, truncated 03:29:06 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff0000", 0x38, 0x1c0}]) [ 377.057963][ T4876] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 377.090665][ T4876] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:29:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 377.299938][ T9848] Dev loop2: unable to read RDB block 1 [ 377.305645][ T9848] loop2: unable to read partition table [ 377.311720][ T9848] loop2: partition table beyond EOD, truncated [ 377.318097][ T9848] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 377.397769][ T9821] tipc: Enabling of bearer rejected, failed to enable media [ 377.460149][ T9818] loop0: p1 p2 p3 p4 [ 377.464842][ T9818] loop0: p1 size 11290111 extends beyond EOD, truncated [ 377.491400][ T9818] loop0: p2 size 1073872896 extends beyond EOD, truncated 03:29:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 377.522391][ T4876] Dev loop2: unable to read RDB block 1 [ 377.528460][ T4876] loop2: unable to read partition table [ 377.534285][ T4876] loop2: partition table beyond EOD, truncated [ 377.535314][ T9818] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 377.639781][ T9818] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:29:07 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff000000000080", 0x3c, 0x1c0}]) 03:29:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) write$tun(r1, &(0x7f0000000080)={@val={0x0, 0x17}, @void, @ipx={0xffff, 0x38, 0x2, 0x11, {@current, @broadcast, 0xd9d}, {@broadcast, @random="60d044f61324"}, "5baed6d13b63aafc2924dc77fa46195524432a040a5cf16ceaab"}}, 0x3c) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0086401, &(0x7f00000001c0)={0x95, &(0x7f0000000440)=""/149}) write$P9_RWRITE(r2, &(0x7f0000000280)={0xb}, 0xb) getsockopt$packet_buf(r2, 0x107, 0x1, &(0x7f0000000300)=""/105, &(0x7f0000000380)=0x69) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r3, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) write$FUSE_DIRENT(r0, &(0x7f0000000200)=ANY=[@ANYRESOCT=r3], 0x140) syz_read_part_table(0x7ffffff, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c1}, {&(0x7f0000000100)="9b9029e8d1abb52b7ae021d4e86b2c1f0fb402e1a128dabffc1a1dd0573e2f2017dd842633db3b8c64af7e6042258b3c24e158a09645e1e4cdde75b807cbc135eb1309ff599983221a60f721a45c80d77c0e7a373ad3b5a0fee340630720c2338a5ebf9cdf48f2d19d7ecbe963a156c65d6fa6993eb4aa54fefe15c4d25f5b4070f4e2537383e74c2fb1bc6301408ca7a3aa28865a53b360707a7f693c39028641fea89b522cd3186c90768fe29cb5e14e12232034", 0xffb9}]) [ 377.978460][ T9865] Dev loop2: unable to read RDB block 1 [ 377.984309][ T9865] loop2: unable to read partition table [ 377.990949][ T9865] loop2: partition table beyond EOD, truncated [ 377.997252][ T9865] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:29:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:08 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff000000000080", 0x3c, 0x1c0}]) [ 378.370500][ T9881] Dev loop2: unable to read RDB block 1 [ 378.376342][ T9881] loop2: unable to read partition table [ 378.382595][ T9881] loop2: partition table beyond EOD, truncated [ 378.389113][ T9881] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 378.411438][ T4876] Dev loop2: unable to read RDB block 1 [ 378.417344][ T4876] loop2: unable to read partition table [ 378.423149][ T4876] loop2: partition table beyond EOD, truncated 03:29:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 378.638171][ T9884] IPVS: ftp: loaded support on port[0] = 21 03:29:08 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff000000000080", 0x3c, 0x1c0}]) [ 379.124678][ T9915] Dev loop2: unable to read RDB block 1 [ 379.130696][ T9915] loop2: unable to read partition table [ 379.136960][ T9915] loop2: partition table beyond EOD, truncated [ 379.143189][ T9915] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:29:09 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da", 0x3e, 0x1c0}]) 03:29:09 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:09 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = getpid() tkill(r1, 0xa) r2 = getpid() tkill(r2, 0xa) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r3, &(0x7f0000000280)={0xb}, 0xb) r4 = clone3(&(0x7f0000000280)={0x202200000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), {0x2c}, &(0x7f0000000340)=""/91, 0x5b, &(0x7f00000001c0)=""/82, &(0x7f0000000240)=[0xffffffffffffffff, r0, r1, 0xffffffffffffffff, r2, 0xffffffffffffffff], 0x6, {r3}}, 0x58) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) ptrace$poke(0x1, r5, &(0x7f0000000300), 0x5) ptrace$peekuser(0x3, r4, 0x2) [ 379.658754][ T9884] chnl_net:caif_netlink_parms(): no params data found [ 379.714477][ T9992] Dev loop2: unable to read RDB block 1 [ 379.720341][ T9992] loop2: unable to read partition table [ 379.726306][ T9992] loop2: partition table beyond EOD, truncated [ 379.732523][ T9992] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:29:09 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x9}]) [ 380.039577][ T9884] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.047526][ T9884] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.057052][ T9884] device bridge_slave_0 entered promiscuous mode [ 380.181161][ T9884] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.188753][ T9884] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.198346][ T9884] device bridge_slave_1 entered promiscuous mode [ 380.465431][ T9884] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 380.506671][ T9884] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 380.624361][ T9884] team0: Port device team_slave_0 added [ 380.662497][ T9884] team0: Port device team_slave_1 added [ 380.747583][ T9884] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 380.754639][ T9884] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 380.780756][ T9884] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 380.798334][ T9884] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 380.805351][ T9884] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 380.831571][ T9884] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 380.958966][ T9884] device hsr_slave_0 entered promiscuous mode [ 381.018669][ T9884] device hsr_slave_1 entered promiscuous mode [ 381.080330][ T9884] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 381.088091][ T9884] Cannot create hsr debugfs directory [ 381.460555][ T9884] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 381.516954][ T9884] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 381.579981][ T9884] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 381.647420][ T9884] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 381.991942][ T9884] 8021q: adding VLAN 0 to HW filter on device bond0 [ 382.034382][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 382.043943][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 382.066417][ T9884] 8021q: adding VLAN 0 to HW filter on device team0 [ 382.090218][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 382.099987][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 382.109787][ T3082] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.117050][ T3082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.130839][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 382.152579][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 382.162250][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 382.171487][ T8923] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.178794][ T8923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.257145][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 382.268561][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 382.279390][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 382.290241][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 382.300459][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 382.311047][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 382.391918][ T9884] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 382.402439][ T9884] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 382.439087][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 382.448806][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 382.458588][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 382.469335][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 382.479117][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 382.546114][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 382.619144][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 382.628141][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 382.686561][ T9884] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 382.770031][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 382.780736][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 382.894055][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 382.904278][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.926923][ T9884] device veth0_vlan entered promiscuous mode [ 382.965658][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 382.974568][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 382.999658][ T9884] device veth1_vlan entered promiscuous mode [ 383.155751][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 383.165253][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 383.174596][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 383.184413][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 383.216306][ T9884] device veth0_macvtap entered promiscuous mode [ 383.255548][ T9884] device veth1_macvtap entered promiscuous mode [ 383.391864][ T9884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 383.402611][ T9884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 383.412593][ T9884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 383.423145][ T9884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 383.433924][ T9884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 383.444614][ T9884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 383.458816][ T9884] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 383.474227][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 383.483713][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 383.493091][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 383.503118][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 383.620890][ T9884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 383.632051][ T9884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 383.643857][ T9884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 383.654403][ T9884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 383.664347][ T9884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 383.674912][ T9884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 383.689161][ T9884] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 383.697926][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 383.707924][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 03:29:16 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:16 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da", 0x3e, 0x1c0}]) 03:29:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:16 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) r4 = openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r5, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r7, &(0x7f0000000280)={0xb}, 0xb) getsockopt$CAN_RAW_FD_FRAMES(r7, 0x65, 0x5, &(0x7f0000000200), &(0x7f0000000240)=0x4) dup3(r6, r5, 0x0) getsockname$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) setsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000140)=@int=0x8001, 0x4) [ 386.556242][T10151] Dev loop2: unable to read RDB block 1 [ 386.562016][T10151] loop2: unable to read partition table [ 386.568078][T10151] loop2: partition table beyond EOD, truncated [ 386.574302][T10151] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 386.660544][T10152] loop0: p1 p2 p3 p4 [ 386.665457][T10152] loop0: p1 size 11290111 extends beyond EOD, truncated [ 386.690707][T10152] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 386.740389][T10152] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 386.781584][T10152] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:29:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da", 0x3e, 0x1c0}]) 03:29:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 388.217337][T10196] Dev loop2: unable to read RDB block 1 [ 388.223119][T10196] loop2: unable to read partition table [ 388.230221][T10196] loop2: partition table beyond EOD, truncated [ 388.236661][T10196] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:29:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55", 0x3f}]) 03:29:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:19 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55", 0x3f}]) 03:29:20 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55", 0x3f}]) 03:29:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:21 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) r4 = openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r5, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r7, &(0x7f0000000280)={0xb}, 0xb) getsockopt$CAN_RAW_FD_FRAMES(r7, 0x65, 0x5, &(0x7f0000000200), &(0x7f0000000240)=0x4) dup3(r6, r5, 0x0) getsockname$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) setsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000140)=@int=0x8001, 0x4) [ 391.588773][T10229] loop2: p1 p2 p3 p4 [ 391.593794][T10229] loop2: p1 size 11290111 extends beyond EOD, truncated [ 391.732297][T10229] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 391.887816][T10229] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 391.960430][T10229] loop2: p4 size 3657465856 extends beyond EOD, truncated 03:29:21 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:22 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) r4 = openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r5, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r7, &(0x7f0000000280)={0xb}, 0xb) getsockopt$CAN_RAW_FD_FRAMES(r7, 0x65, 0x5, &(0x7f0000000200), &(0x7f0000000240)=0x4) dup3(r6, r5, 0x0) getsockname$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) setsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000140)=@int=0x8001, 0x4) [ 392.979788][T10260] loop2: p1 p2 p3 p4 [ 392.984602][T10260] loop2: p1 size 11290111 extends beyond EOD, truncated [ 393.020475][T10260] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 393.088271][T10260] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 393.178928][T10260] loop2: p4 size 3657465856 extends beyond EOD, truncated 03:29:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:23 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) r4 = openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r5, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r7, &(0x7f0000000280)={0xb}, 0xb) getsockopt$CAN_RAW_FD_FRAMES(r7, 0x65, 0x5, &(0x7f0000000200), &(0x7f0000000240)=0x4) dup3(r6, r5, 0x0) getsockname$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) setsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000140)=@int=0x8001, 0x4) 03:29:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 393.886842][T10284] loop2: p1 p2 p3 p4 [ 393.891656][T10284] loop2: p1 size 11290111 extends beyond EOD, truncated [ 394.036746][T10284] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 394.179687][T10284] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 394.290047][T10284] loop2: p4 size 3657465856 extends beyond EOD, truncated 03:29:24 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r6, &(0x7f0000000280)={0xb}, 0xb) getsockopt$CAN_RAW_FD_FRAMES(r6, 0x65, 0x5, &(0x7f0000000200), &(0x7f0000000240)=0x4) dup3(r5, r4, 0x0) getsockname$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) 03:29:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 395.141209][T10313] loop2: p1 p2 p3 p4 [ 395.146021][T10313] loop2: p1 size 11290111 extends beyond EOD, truncated [ 395.279252][T10313] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 395.423389][T10313] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 395.465101][T10313] loop2: p4 size 3657465856 extends beyond EOD, truncated 03:29:25 executing program 0: syz_read_part_table(0x8000000, 0x1555555555555876, &(0x7f00000000c0)) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = getpid() tkill(r1, 0x100000b) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r2, &(0x7f0000000280)={0xb}, 0xb) clone3(&(0x7f0000001200)={0x1041000, &(0x7f0000000040), &(0x7f0000000100)=0x0, &(0x7f0000000140), {0x32}, &(0x7f0000000180)=""/14, 0xe, &(0x7f00000001c0)=""/4096, &(0x7f00000011c0)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r1, 0x0], 0x7, {r2}}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r4, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r4, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r4, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r5, &(0x7f0000000280)={0xb}, 0xb) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r6, &(0x7f0000000280)={0xb}, 0xb) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000001280)={0x0, 0x80000, r6}) kcmp(0x0, r3, 0x0, r4, r7) [ 395.750352][ T4876] loop2: p1 p2 p3 p4 [ 395.755118][ T4876] loop2: p1 size 11290111 extends beyond EOD, truncated [ 395.793535][ T4876] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 395.861440][ T4876] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:29:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(0xffffffffffffffff, 0x200004) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 395.940911][ T4876] loop2: p4 size 3657465856 extends beyond EOD, truncated 03:29:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(0xffffffffffffffff, 0x200004) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:26 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r6, &(0x7f0000000280)={0xb}, 0xb) getsockopt$CAN_RAW_FD_FRAMES(r6, 0x65, 0x5, &(0x7f0000000200), &(0x7f0000000240)=0x4) dup3(r5, r4, 0x0) [ 396.696332][T10361] loop2: p1 p2 p3 p4 [ 396.701101][T10361] loop2: p1 size 11290111 extends beyond EOD, truncated [ 396.833693][T10361] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 396.885827][T10361] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 396.926899][T10361] loop2: p4 size 3657465856 extends beyond EOD, truncated 03:29:26 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(0xffffffffffffffff, 0x200004) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(0xffffffffffffffff, 0x200004) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:27 executing program 0: syz_read_part_table(0x8000000, 0x1a, &(0x7f00000000c0)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0xef3, 0x4) 03:29:27 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r6, &(0x7f0000000280)={0xb}, 0xb) dup3(r5, r4, 0x0) 03:29:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 397.536874][T10396] loop2: p1 p2 p3 p4 [ 397.541514][T10396] loop2: p1 size 11290111 extends beyond EOD, truncated [ 397.649426][T10396] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 397.662522][T10396] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 397.672198][T10396] loop2: p4 size 3657465856 extends beyond EOD, truncated 03:29:27 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') dup3(r5, r4, 0x0) 03:29:27 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x1}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r2, &(0x7f0000000280)={0xb}, 0xb) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0185647, &(0x7f00000002c0)={0x4, 0x6, 0x7, r0, 0x0, &(0x7f0000000040)={0x990a68, 0x8, [], @p_u16=&(0x7f0000000340)=0x9}}) ioctl$VIDIOC_TRY_ENCODER_CMD(r3, 0xc028564e, &(0x7f0000000300)={0x3, 0x1, [0x74, 0x8000, 0x1, 0x100, 0x5, 0xe371, 0x4, 0x3b9]}) getpgid(0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r5, &(0x7f0000000280)={0xb}, 0xb) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000200)) r6 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r6) prctl$PR_SET_PTRACER(0x59616d61, r6) fcntl$lock(r1, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2, 0x200, r6}) setsockopt(r1, 0x9, 0x0, &(0x7f0000000100)="556aa7b3b92a8cd26e20c884ba26ab70f91119f8e71d25285d04106e62fe3741928a8657813e57991a36296d915084c47c63096a32242672059a8bc5b8ca0cba49906cdad8ae5ecf53128ad083c9ed53ad576fc643d55cffa6f489370d46fe21ad810414224cbcc6f9c175e380fad792a6e03a9541a752e47772fc81aa6c8f1a390d385c46987cab616d85a39b93c734ec8e185d139daf8be3d64278ad888f2aaa124f6c997a0fc098ff90cae18c2fba9aff3519c8fe62ffe368206c874af73f5e73b91413b3282ea4d1ac", 0xcb) 03:29:28 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r6, &(0x7f0000000280)={0xb}, 0xb) getsockopt$CAN_RAW_FD_FRAMES(r6, 0x65, 0x5, &(0x7f0000000200), &(0x7f0000000240)=0x4) dup3(r5, r4, 0x0) [ 398.385997][T10430] loop2: p1 p2 p3 p4 [ 398.390746][T10430] loop2: p1 size 11290111 extends beyond EOD, truncated [ 398.427772][T10430] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 398.457034][T10429] loop0: p1 p2 p3 p4 [ 398.464737][T10429] loop0: p1 size 11290111 extends beyond EOD, truncated 03:29:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 398.542715][T10445] loop3: p1 p2 p3 p4 [ 398.547436][T10445] loop3: p1 size 11290111 extends beyond EOD, truncated [ 398.570479][T10429] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 398.584226][T10430] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 398.692102][T10445] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 398.708020][T10429] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 398.723879][T10430] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 398.794589][T10445] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 398.809933][T10429] loop0: p4 size 3657465856 extends beyond EOD, truncated [ 398.867329][T10445] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:29:28 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r5, r4, 0x0) 03:29:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 399.193100][T10429] loop0: p1 p2 p3 p4 [ 399.197832][T10429] loop0: p1 size 11290111 extends beyond EOD, truncated [ 399.304558][T10429] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 399.324248][T10429] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 399.344503][T10429] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:29:29 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r6, &(0x7f0000000280)={0xb}, 0xb) getsockopt$CAN_RAW_FD_FRAMES(r6, 0x65, 0x5, &(0x7f0000000200), &(0x7f0000000240)=0x4) dup3(r5, r4, 0x0) 03:29:29 executing program 0: r0 = openat$sequencer(0xffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x501000, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6}, 0x10) [ 399.521158][T10495] loop2: p1 p2 p3 p4 [ 399.526469][T10495] loop2: p1 size 11290111 extends beyond EOD, truncated [ 399.592904][T10495] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 399.695283][T10495] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 399.738642][T10495] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 399.836042][T10518] loop3: p1 p2 p3 p4 [ 399.840869][T10518] loop3: p1 size 11290111 extends beyond EOD, truncated [ 399.899261][T10518] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:29:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 399.942448][T10518] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 399.973141][T10518] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:29:29 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) dup3(0xffffffffffffffff, r4, 0x0) 03:29:30 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r6, &(0x7f0000000280)={0xb}, 0xb) getsockopt$CAN_RAW_FD_FRAMES(r6, 0x65, 0x5, &(0x7f0000000200), &(0x7f0000000240)=0x4) dup3(r5, r4, 0x0) [ 400.614688][T10547] loop2: p1 p2 p3 p4 [ 400.619435][T10547] loop2: p1 size 11290111 extends beyond EOD, truncated [ 400.679281][T10547] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 400.696483][T10557] loop3: p1 p2 p3 p4 [ 400.702464][T10557] loop3: p1 size 11290111 extends beyond EOD, truncated [ 400.716208][T10547] loop2: p3 size 1912633224 extends beyond EOD, truncated 03:29:30 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 400.730317][T10547] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 400.813023][T10557] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 400.868227][T10557] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 400.921188][T10557] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:29:30 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) dup3(0xffffffffffffffff, r4, 0x0) 03:29:31 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r6, &(0x7f0000000280)={0xb}, 0xb) dup3(r5, r4, 0x0) 03:29:31 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 401.394791][T10600] loop2: p1 p2 p3 p4 [ 401.399535][T10600] loop2: p1 size 11290111 extends beyond EOD, truncated [ 401.471832][T10600] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 401.533511][T10600] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 401.602123][T10600] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 401.614251][T10613] loop3: p1 p2 p3 p4 [ 401.618928][T10613] loop3: p1 size 11290111 extends beyond EOD, truncated [ 401.685803][T10613] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 401.786561][T10613] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 401.838015][T10613] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:29:31 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) dup3(0xffffffffffffffff, r4, 0x0) 03:29:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:32 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') dup3(r5, r4, 0x0) [ 402.386486][T10649] loop2: p1 p2 p3 p4 [ 402.391458][T10649] loop2: p1 size 11290111 extends beyond EOD, truncated [ 402.420318][T10649] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 402.476813][T10649] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 402.560123][T10662] loop3: p1 p2 p3 p4 [ 402.565103][T10662] loop3: p1 size 11290111 extends beyond EOD, truncated [ 402.661202][T10649] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 402.676464][T10662] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 402.723363][T10662] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 402.770111][T10662] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:29:32 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r5, r4, 0x0) 03:29:33 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r5, r4, 0x0) 03:29:33 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 403.415822][T10696] loop2: p1 p2 p3 p4 [ 403.421125][T10696] loop2: p1 size 11290111 extends beyond EOD, truncated [ 403.507815][T10698] loop3: p1 p2 p3 p4 [ 403.512586][T10698] loop3: p1 size 11290111 extends beyond EOD, truncated [ 403.524809][T10698] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 403.536141][T10698] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 403.556392][T10698] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 403.563034][T10696] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 403.586448][T10696] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 403.608238][T10696] loop2: p4 size 3657465856 extends beyond EOD, truncated 03:29:33 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) dup3(0xffffffffffffffff, r4, 0x0) 03:29:33 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r5, r4, 0x0) [ 404.393884][T10738] loop2: p1 p2 p3 p4 [ 404.398593][T10738] loop2: p1 size 11290111 extends beyond EOD, truncated [ 404.446696][T10738] loop2: p2 size 1073872896 extends beyond EOD, truncated 03:29:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 404.503721][T10743] loop3: p1 p2 p3 p4 [ 404.508357][T10743] loop3: p1 size 11290111 extends beyond EOD, truncated [ 404.569336][T10738] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 404.623372][T10743] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 404.646670][T10743] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 404.669354][T10743] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 404.672325][T10738] loop2: p4 size 3657465856 extends beyond EOD, truncated 03:29:34 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) dup3(0xffffffffffffffff, r4, 0x0) 03:29:34 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r5, r4, 0x0) [ 405.404151][T10782] loop3: p1 p2 p3 p4 [ 405.408945][T10782] loop3: p1 size 11290111 extends beyond EOD, truncated [ 405.477695][T10782] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 405.575335][T10794] loop2: p1 p2 p3 p4 [ 405.580269][T10794] loop2: p1 size 11290111 extends beyond EOD, truncated [ 405.592755][T10782] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 405.595310][T10794] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 405.612905][T10794] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 405.623964][T10794] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 405.712415][T10782] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 405.818817][ T4876] loop3: p1 p2 p3 p4 [ 405.823672][ T4876] loop3: p1 size 11290111 extends beyond EOD, truncated 03:29:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:35 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) [ 405.893881][ T4876] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 405.926148][ T4876] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 405.967926][ T4876] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:29:35 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) dup3(0xffffffffffffffff, r4, 0x0) [ 406.236723][T10830] loop2: p1 p2 p3 p4 [ 406.241562][T10830] loop2: p1 size 11290111 extends beyond EOD, truncated [ 406.385386][T10830] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 406.457190][T10830] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 406.495197][T10842] loop3: p1 p2 p3 p4 [ 406.500195][T10842] loop3: p1 size 11290111 extends beyond EOD, truncated 03:29:36 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 406.601566][T10830] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 406.655667][T10842] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:29:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 406.700908][T10842] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 406.731081][T10842] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 406.849055][ T4876] loop3: p1 p2 p3 p4 [ 406.853776][ T4876] loop3: p1 size 11290111 extends beyond EOD, truncated [ 406.898319][ T4876] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 406.919405][ T4876] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 406.947335][ T4876] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:29:36 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) 03:29:37 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r5, r4, 0x0) [ 407.427226][T10886] loop2: p1 p2 p3 p4 [ 407.432083][T10886] loop2: p1 size 11290111 extends beyond EOD, truncated 03:29:37 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 407.566178][T10886] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 407.578529][T10886] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 407.596375][T10886] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 407.621489][T10895] loop3: p1 p2 p3 p4 [ 407.626238][T10895] loop3: p1 size 11290111 extends beyond EOD, truncated [ 407.692643][T10895] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 407.715212][T10895] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 407.735577][T10895] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:29:37 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) 03:29:37 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r5, r4, 0x0) [ 408.067149][T10922] IPVS: ftp: loaded support on port[0] = 21 [ 408.306418][T10925] loop2: p1 p2 p3 p4 [ 408.311171][T10925] loop2: p1 size 11290111 extends beyond EOD, truncated 03:29:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) close(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(0xffffffffffffffff, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 408.430914][T10925] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 408.511953][T10925] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 408.557026][T10925] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 408.583744][T10956] loop3: p1 p2 p3 p4 [ 408.588437][T10956] loop3: p1 size 11290111 extends beyond EOD, truncated [ 408.751105][T10956] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:29:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) close(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(0xffffffffffffffff, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 408.877907][T10956] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 408.924847][T10956] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 408.998043][T10922] chnl_net:caif_netlink_parms(): no params data found 03:29:39 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r5, r4, 0x0) 03:29:39 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r5, r4, 0x0) [ 409.461576][T10922] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.468829][T10922] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.478405][T10922] device bridge_slave_0 entered promiscuous mode [ 409.570497][T10922] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.577753][T10922] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.587579][T10922] device bridge_slave_1 entered promiscuous mode 03:29:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) close(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(0xffffffffffffffff, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 409.760539][T10922] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 409.782264][T10922] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 409.806656][T11089] loop2: p1 p2 p3 p4 [ 409.811626][T11089] loop2: p1 size 11290111 extends beyond EOD, truncated [ 409.875453][T11096] loop3: p1 p2 p3 p4 [ 409.880570][T11096] loop3: p1 size 11290111 extends beyond EOD, truncated [ 409.934199][T11089] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 409.962858][T10922] team0: Port device team_slave_0 added [ 409.983426][T10922] team0: Port device team_slave_1 added [ 410.004865][T11096] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 410.040649][T11089] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 410.055841][T11096] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 410.069381][T11089] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 410.091753][T11096] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 410.218294][T10922] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 410.226085][T10922] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 410.252251][T10922] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 410.542914][T10922] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 410.550815][T10922] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 410.576868][T10922] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 411.106528][T10922] device hsr_slave_0 entered promiscuous mode [ 411.149898][T10922] device hsr_slave_1 entered promiscuous mode [ 411.188926][T10922] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 411.196535][T10922] Cannot create hsr debugfs directory [ 411.952402][T10922] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 412.012725][T10922] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 412.080113][T10922] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 412.179575][T10922] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 412.592491][T10922] 8021q: adding VLAN 0 to HW filter on device bond0 [ 412.653381][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 412.662497][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 412.681808][T10922] 8021q: adding VLAN 0 to HW filter on device team0 [ 412.761542][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 412.771487][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 412.780977][ T3082] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.788172][ T3082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 412.941086][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 412.950785][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 412.960701][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 412.970048][ T3082] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.977241][ T3082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.986138][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 412.996933][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 413.007797][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 413.018449][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 413.028751][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 413.039455][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 413.049767][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 413.059414][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 413.150773][T10922] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 413.165297][T10922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 413.353673][T10922] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 413.453386][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 413.463295][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 413.472932][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 413.483175][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 413.490930][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 413.804513][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 413.815016][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 413.930540][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 413.940825][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 413.955332][T10922] device veth0_vlan entered promiscuous mode [ 414.002924][T10922] device veth1_vlan entered promiscuous mode [ 414.027566][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.036645][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 414.046094][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 414.156179][T10922] device veth0_macvtap entered promiscuous mode [ 414.170685][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 414.182783][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 414.193022][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 414.215920][T10922] device veth1_macvtap entered promiscuous mode [ 414.244128][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 414.253530][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 414.294402][T10922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 414.305471][T10922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.315432][T10922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 414.325932][T10922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.335852][T10922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 414.346355][T10922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.356303][T10922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 414.366804][T10922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.381051][T10922] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 414.436462][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 414.446581][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 414.697304][T10922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 414.708098][T10922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.718104][T10922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 414.728693][T10922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.738666][T10922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 414.749222][T10922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.759185][T10922] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 414.769713][T10922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.784078][T10922] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 414.801909][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 414.812019][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 03:29:47 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r5, r4, 0x0) 03:29:47 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r5, r4, 0x0) 03:29:47 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) 03:29:47 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:47 executing program 0: syz_read_part_table(0x8000001, 0x9, &(0x7f0000002680)=[{&(0x7f0000000080)="5196088d44a473f0b10e13bf59a733501cdbc7e316353c5ec687949e88daf9aff377d2e26a8197b280813d818b2041fc3e4fa3b633d0aa8dd8bc8ab8db0bcb0f080bcae76e935457642d3c730afe00b917c2834146a5b09236e4ec9bb461330742ddd4fdcaa8b96b8296caa52110e33fc21d719e118b4159f637c2271d147a2958cb0f8531bb814625881934bb384a7c3ffbf6936dfc49a5552f0fc464f2db491f6907704ee4924fcc730e9d8b3aaaaf66bb6ba702957fca42014acc3d9cd3d14999071edeac49cd5a5e40f987992381", 0xd0, 0x7fffffff}, {&(0x7f0000000180)="45048983b85b4971a19fef8c2bbab0d44d060cab30788cc968a183408327170070f9208136c51cb6fdb1dc5f88b080f1327458ffcc24a444314b1916adf740906fa3aefb838392f41e6876188789f6753546b7ab56ec46e0b920de49a70a1bde709e636c586d81f153060dc44cfec959659d3b0fcf7b54680796bed147bfaa7ca2b2021a62add9ee8c5f7de7aefef7b929d297e20a66e25b238f7e3d", 0x9c, 0x80000000}, {&(0x7f0000000240)="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", 0x1000, 0x5d}, {&(0x7f0000001240)="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", 0xff, 0xfffffffa}, {&(0x7f0000001340)="3acb761f4875b0ede5d4b8b641bc5853ec1aefa69e454c05aad97f8f39168aab4b1f0a7e2beff9f463884648d25d973dd780ed5ea74d2b70175baadec72aa81d19d480e9756a0edbdefba424cdc9145eccd23901c1d8fd2dc6ee4454d7baa4b45b97c1787830cf8e098bd6c5f7c527d3c69645c0fc251b29213169718aa936d4cfc77f893d4291b8c36143df6246bad8b4", 0x91, 0x3ff}, {&(0x7f0000002700)="0acaad3654c38abc8d3a21bbc756f1fd459f3204b03e27e879155a834e65a4e6bf7541454d6959f96edd5a3e5b4b7f33fd8881de1afc0334625c77f66762dfa70bf8453b8898f75e6fed4d2ca30d118d93916db768e8ed3e8241333d6dc1637946f91faf137b6df5c23d633bf3aa11fd65d057b53a5c7c5e0d35f1120bd36129dbe2d77f96f3aeeeb54613ab10e5a31c7ed001343f43242b", 0x98, 0x400}, {&(0x7f00000014c0)="e16077ac823cd91c246329d04a6658834ed8bf7afe1b50a8888d45ea029b76641825883bcbf10e55dd9c957707984b7fff1dae9ed6974fdbe4c7327d33d2a7413951e94ac646a8b6debf948e940e4e10389e2301908dc7641619a4ff9ef6b23deb76ef6db181a930d514fb323cb3432683dd434dfe1b147e5d47d49505b8f589ed488f3d2a4a3863c8f6f53dc2e1f3c29c05d81ea83c2b5b625885305efe74161b391c1662e249c33be2040c0403723271c489df80c2f4ff8d0de554c77093d510", 0xc1}, {&(0x7f00000015c0)="7252112dca561c7ff1e4292b88c0b834895ec088a6965c805c1294249057cd388059138d66f7a57601cc164978272d63c8b371f3ffa69166492f8416865494f44861c2171fcf04db24e9a686da42ad9dc7a755842454b896438f34ae8241505a1dfb2ee03d93d542db376dfeecb8d7e20d93de51d05a84666fa5bcf4eadb42295a73004908de1dc64cb77cd944bbaa30fc2692f126d1e6cffe9645702d01a5220ff4e0cfa7bb1086bdd4eb597b8d60a5d4f9e2c5479b80165f849f1b4b2c", 0xbe, 0xfffff06b}, {&(0x7f0000001680)="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", 0x1000, 0x34a}]) r0 = openat$zero(0xffffff9c, &(0x7f0000001400)='/dev/zero\x00', 0x8000, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000001440)={&(0x7f00000027c0)="44dce56b441492ebc565cc7c50debd57f658bb090c07d8fd7f23dad25bcb8470156629077c33864829f8ee5fe773986d6209b796541f4f8616c0519a35e5a040956902428d970942e882b16124de6f395b78e987244799a81cf4ac592c1804c2f1caae5b9fbc193f9da0bfbfaa6d9b77f3bd7f609dccef2dffb7d397fb554fa20520dc6dd89527a65a4f49400aba43e3a29bfd7adb061dbf5dcb9005ca45bfa6887ce48387b5ebc15a", 0xa9, 0x2}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r0, 0xc00464be, &(0x7f0000001480)={r1}) [ 417.732562][T11245] loop3: p1 p2 p3 p4 [ 417.737413][T11245] loop3: p1 size 11290111 extends beyond EOD, truncated [ 417.757368][T11245] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 417.788584][T11245] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 417.836202][T11249] loop2: p1 p2 p3 p4 [ 417.841005][T11249] loop2: p1 size 11290111 extends beyond EOD, truncated [ 417.898358][T11245] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 418.050535][T11249] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 418.210035][T11249] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 418.294917][T11249] loop2: p4 size 3657465856 extends beyond EOD, truncated 03:29:48 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @private2}, &(0x7f00000000c0)=0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) fcntl$lock(r2, 0x6, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r3}) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r2, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x7fffffff, 0x0, &(0x7f0000000500), 0x2004800, &(0x7f0000000140)=ANY=[@ANYBLOB='part=0x0000000000000043,nls=iso8859-2,uid=', @ANYRESDEC=r2, @ANYBLOB="2ce4a361736b3d30303030303030303030303030303030303030303030362c706172743d30783030303030303030303030303030621f000000000000000000000000000969745f646972656374696f2c736d61636b6673666c6f6f723d2d2c00f9d1fd577385fc83d6a0cd3adda94a9731e9340242e38dc24f25dc6419f4f0760181d89a0a169f2eeda278dc4d9823da0b195fc24500a450b00b6835d5ac64bdcb2b20baeaa7d5e493d51091c023"]) 03:29:48 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) 03:29:48 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 418.789491][T11289] loop4: p1 p2 p3 p4 [ 418.794183][T11289] loop4: p1 size 11290111 extends beyond EOD, truncated [ 418.891548][T11289] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 418.901724][T11289] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 418.912745][T11289] loop4: p4 size 3657465856 extends beyond EOD, truncated 03:29:48 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r3 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r3, r2, 0x0) [ 419.139783][T11304] hfsplus: unable to parse mount options [ 419.164968][T11305] loop3: p1 p2 p3 p4 [ 419.170253][T11305] loop3: p1 size 11290111 extends beyond EOD, truncated [ 419.261464][T11305] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:29:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 419.329237][T11305] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 419.418956][T11305] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 419.632327][T11339] hfsplus: unable to parse mount options 03:29:49 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x20002, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) [ 419.905436][T11347] loop2: p1 p2 p3 p4 [ 419.910309][T11347] loop2: p1 size 11290111 extends beyond EOD, truncated 03:29:50 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) getsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 420.157487][T11347] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 420.263620][T11347] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 420.302555][T11347] loop2: p4 size 3657465856 extends beyond EOD, truncated 03:29:50 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 420.852934][T11366] loop0: p1 p2 p3 p4 [ 420.857652][T11366] loop0: p1 size 11290111 extends beyond EOD, truncated 03:29:50 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r3 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r3, r2, 0x0) [ 420.942134][T11371] loop3: p1 p2 p3 p4 [ 420.946864][T11371] loop3: p1 size 11290111 extends beyond EOD, truncated [ 420.970755][T11371] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 420.980847][T11371] loop3: p3 size 1912633224 extends beyond EOD, truncated 03:29:50 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 421.000052][T11371] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 421.000902][T11366] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 421.242298][T11366] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 421.330186][T11366] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:29:51 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={r3, 0x7fff}, &(0x7f0000000040)=0x8) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r5, r4, 0x0) 03:29:51 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x101}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000100)="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") 03:29:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:52 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x2, 0x82) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r2, r1, 0x0) [ 422.553090][T11416] loop3: p1 p2 p3 p4 [ 422.557870][T11416] loop3: p1 size 11290111 extends beyond EOD, truncated [ 422.576556][T11416] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 422.594618][T11416] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 422.637247][T11416] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 422.667348][T11421] Dev loop0: unable to read RDB block 1 [ 422.673031][T11421] loop0: unable to read partition table [ 422.679022][T11421] loop0: partition table beyond EOD, truncated [ 422.685254][T11421] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 03:29:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:52 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x14) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r5 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r5, r4, 0x0) [ 423.130523][T11452] loop2: p1 p2 p3 p4 [ 423.135420][T11452] loop2: p1 size 11290111 extends beyond EOD, truncated [ 423.158452][T11452] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 423.262214][T11452] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 423.364157][T11421] Dev loop0: unable to read RDB block 1 [ 423.369996][T11421] loop0: unable to read partition table [ 423.375948][T11421] loop0: partition table beyond EOD, truncated [ 423.382172][T11421] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 03:29:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)={0x18, 0x0, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x18}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x50, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x10, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x3}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffff4a3}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x4c004}, 0x240408c0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000200)={0x4, 0x0, [{0x80000008, 0x7fff, 0x401, 0x8, 0x1}, {0x80000000, 0xa9b, 0x800, 0x9, 0x20}, {0x80000007, 0x3, 0x4, 0x1f, 0x10001}, {0x4000000f, 0x2, 0x0, 0x80000000}]}) syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0xb38f}]) [ 423.456843][T11452] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 423.474826][T11462] loop3: p1 p2 p3 p4 [ 423.479593][T11462] loop3: p1 size 11290111 extends beyond EOD, truncated [ 423.576980][T11462] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 423.653986][T11462] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 423.726304][T11462] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:29:53 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r2, r1, 0x0) 03:29:54 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x2, 0x82) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r3 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r3, r2, 0x0) 03:29:54 executing program 0: syz_read_part_table(0x8002000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="9a63cab520960683e1732ffff19016fef17e968f6e2f69f739d117dd1c6d2a146d1b44ac8b0f27de23b4711733db20a3335f6345bd4d5d2326e8a7649914aae368576bc419ed974e1687855db57398071c74d203962098f5e45ef82f83bf5fb263cf29aeff301cba79a4bddba895d219b4c7", 0x72, 0x8000}]) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r3, &(0x7f0000000280)={0xb}, 0xb) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001300)={&(0x7f00000001c0)="98dd9d8ebbee141ec9ba21", &(0x7f0000000200)=""/118, &(0x7f0000000280)="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", &(0x7f0000001280)="f28262911f846dd8211c8a200f2e88a600792ed144bdc4475c8a8934a7f3c0ba8e40cc272899e7dce36bb3b9da13ea3bb528c5da2cf5aa101372ff242badfb7c77cbae2181f44c62e3", 0xfffffffd, r3, 0x4}, 0x38) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000180)={0x100, 0xfffffffffffff730, 0xff, 0xccc}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={r2}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={r2, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e20, 0x3a, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x5}]}, &(0x7f0000000140)=0xc) [ 424.512836][T11510] loop2: p1 p2 p3 p4 [ 424.517696][T11510] loop2: p1 size 11290111 extends beyond EOD, truncated [ 424.639801][T11510] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 424.689234][T11510] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 424.725670][T11510] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 424.793219][T11522] loop3: p1 p2 p3 p4 [ 424.798133][T11522] loop3: p1 size 11290111 extends beyond EOD, truncated 03:29:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 424.884441][T11522] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 424.912558][T11522] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 424.938127][T11522] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:29:55 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r2, r1, 0x0) 03:29:55 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x2, 0x82) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r2, r1, 0x0) [ 425.979335][T11565] loop2: p1 p2 p3 p4 [ 425.984035][T11565] loop2: p1 size 11290111 extends beyond EOD, truncated [ 426.118401][T11575] loop3: p1 p2 p3 p4 [ 426.123213][T11575] loop3: p1 size 11290111 extends beyond EOD, truncated [ 426.142496][T11575] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 426.165092][T11575] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 426.184481][T11575] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 426.195479][T11565] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 426.237243][T11565] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 426.287447][T11565] loop2: p4 size 3657465856 extends beyond EOD, truncated 03:29:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:56 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:56 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r2, r1, 0x0) 03:29:56 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 427.818865][T11614] loop2: p1 p2 p3 p4 [ 427.823769][T11614] loop2: p1 size 11290111 extends beyond EOD, truncated [ 427.869817][T11616] loop3: p1 p2 p3 p4 [ 427.874616][T11616] loop3: p1 size 11290111 extends beyond EOD, truncated [ 427.884370][T11616] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 427.913508][T11616] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 427.986009][T11614] loop2: p2 size 1073872896 extends beyond EOD, truncated 03:29:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 428.045533][T11616] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 428.065417][T11614] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 428.075386][T11614] loop2: p4 size 3657465856 extends beyond EOD, truncated 03:29:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:58 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r2, r1, 0x0) 03:29:58 executing program 2: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 428.321276][ T4876] loop3: p1 p2 p3 p4 [ 428.327645][ T4876] loop3: p1 size 11290111 extends beyond EOD, truncated [ 428.417651][ T4876] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 428.463379][ T4876] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 428.530450][ T4876] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 428.938684][T11666] loop2: p1 p2 p3 p4 [ 428.943346][T11666] loop2: p1 size 11290111 extends beyond EOD, truncated [ 429.044980][T11675] loop3: p1 p2 p3 p4 [ 429.049928][T11675] loop3: p1 size 11290111 extends beyond EOD, truncated [ 429.062856][T11675] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 429.073327][T11675] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 429.085423][T11675] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 429.087708][T11666] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 429.102152][T11666] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 429.130664][T11666] loop2: p4 size 3657465856 extends beyond EOD, truncated 03:29:59 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:29:59 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:29:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:29:59 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r2, r1, 0x0) [ 429.831745][T11705] loop3: p1 p2 p3 p4 [ 429.836595][T11705] loop3: p1 size 11290111 extends beyond EOD, truncated [ 429.928876][T11705] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 429.962739][T11705] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 429.998675][T11705] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:30:00 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 430.551718][T11723] loop4: p1 p2 p3 p4 [ 430.556593][T11723] loop4: p1 size 11290111 extends beyond EOD, truncated [ 430.578370][T11723] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 430.606634][T11723] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 430.638116][T11723] loop4: p4 size 3657465856 extends beyond EOD, truncated 03:30:00 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:00 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:00 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 431.189773][T11756] loop3: p1 p2 p3 p4 [ 431.194443][T11756] loop3: p1 size 11290111 extends beyond EOD, truncated [ 431.204858][T11756] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 431.225801][T11756] loop3: p3 size 1912633224 extends beyond EOD, truncated 03:30:01 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 431.244929][T11756] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 431.299115][ T4876] loop3: p1 p2 p3 p4 [ 431.305122][ T4876] loop3: p1 size 11290111 extends beyond EOD, truncated [ 431.335842][ T4876] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 431.366713][ T4876] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 431.415294][ T4876] loop3: p4 size 3657465856 extends beyond EOD, truncated 03:30:01 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000040)={&(0x7f0000000000)="61b13de6fd1111d63117271f18aaeb1e5e10415ce187b5f6724b44f7c57805488b92882ab7b7714256d287ae54467f20a898c02e", 0x34, 0x1}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r0, 0xc00464be, &(0x7f0000000100)={r1}) 03:30:01 executing program 3: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 431.655816][T11778] loop4: p1 p2 p3 p4 [ 431.660544][T11778] loop4: p1 size 11290111 extends beyond EOD, truncated [ 431.769816][T11778] loop4: p2 size 1073872896 extends beyond EOD, truncated 03:30:01 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 431.832645][T11778] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 431.860015][T11795] loop0: p1 p2 p3 p4 [ 431.864733][T11795] loop0: p1 size 11290111 extends beyond EOD, truncated [ 431.890399][T11795] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 431.917148][T11795] loop0: p3 size 1912633224 extends beyond EOD, truncated 03:30:01 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 431.961217][T11778] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 431.974976][T11795] loop0: p4 size 3657465856 extends beyond EOD, truncated [ 432.221705][T11795] loop0: p1 p2 p3 p4 [ 432.226508][T11795] loop0: p1 size 11290111 extends beyond EOD, truncated [ 432.302097][T11820] loop3: p1 p2 p3 p4 [ 432.306932][T11820] loop3: p1 size 11290111 extends beyond EOD, truncated [ 432.318892][T11795] loop0: p2 size 1073872896 extends beyond EOD, truncated 03:30:02 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 432.377741][T11795] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 432.427719][T11820] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 432.440796][T11795] loop0: p4 size 3657465856 extends beyond EOD, truncated [ 432.457291][T11820] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 432.475763][T11820] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 432.579828][ T4876] loop3: p1 p2 p3 p4 [ 432.585089][ T4876] loop3: p1 size 11290111 extends beyond EOD, truncated 03:30:02 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 432.674239][ T4876] loop3: p2 size 1073872896 extends beyond EOD, truncated 03:30:02 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x25, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r2, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) write(r2, &(0x7f0000000000)="d8f7258b5c9ba37e", 0x8) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000280)={0xb, 0x77, 0x1}, 0xb) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) [ 432.715122][ T4876] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 432.791846][ T4876] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 432.972553][T11851] loop4: p1 p2 p3 p4 [ 432.978523][T11851] loop4: p1 size 11290111 extends beyond EOD, truncated 03:30:02 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 433.146314][T11851] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 433.254872][T11851] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 433.363847][T11851] loop4: p4 size 3657465856 extends beyond EOD, truncated 03:30:03 executing program 0: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) r2 = openat2(r1, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x64001, 0x20, 0x7}, 0x18) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)={0x24, r4, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000001880)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f0000000480)={0x1394, r4, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_HIDDEN_SSID={0x8, 0x7e, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x4}}, @NL80211_ATTR_INACTIVITY_TIMEOUT={0x6, 0x96, 0x8000}, @NL80211_ATTR_FTM_RESPONDER={0x11a8, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0xf1, 0x2, "24155bf883663ee780c7fc823fe375a971b608a892e6bc8356660d3c5c46188c96eff901801338614c6e4e923658d6f1b209e1c5cd689fbd55cd2a46f0c4f7d1e5fbb0c4890e91715c6076a1a2972a21130582b147d7116e71c9b8ce5f8c1e241fc3a0fb52c68f3926bc70b299b8993aa1a73216e50935811cf21e24154552ad7fa7d40c2fc921bc011198e76f37abb54784009c979e97472ff3c973864fe3a2c526b81bca8c700fd1d8aeca0f7d8b1f8165dadfbea93f8b98c18cc4bc2ea10312d11afe6af68578c6880c31083c2e7fa6c5f352b356f055f227b61e0293d36700af24808b2b5c42bf909a7d51"}, @NL80211_FTM_RESP_ATTR_LCI={0x1004, 0x2, "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"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x46, 0x3, "83d9e98495779b43ba0f455e34048547cf075a87e2f3920ce2d188f16dd28a274cc088b2b8e5210b9e83986372cc448e387cebffe7dfcb2177a114b55a546cf5763c"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x53, 0x3, "57840929646b460b567868a4f3e28814a2521844c9f63d5dfe64756dd4154c7e3857494a18154df4ced37a982f54c49eb6c7c154eb3e1495ae36e0de38f8c019e961f4aad6f4405b64b079c4d1016b"}, @NL80211_FTM_RESP_ATTR_LCI={0xe, 0x2, "02565cabe506e9bac1f3"}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_IE_PROBE_RESP={0x1a9, 0x7f, "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"}]}, 0x1394}, 0x1, 0x0, 0x0, 0x20048000}, 0x810) ptrace$peeksig(0x4209, r0, &(0x7f0000000000)={0x7f7706f2, 0x0, 0x2}, &(0x7f0000000080)=[{}, {}]) syz_read_part_table(0x2, 0x3, &(0x7f0000000040)=[{&(0x7f0000000200)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa6cb85bcf0d35e14830c1973cce5eb30e3c44109cb2d22edded4292ef500232e2a1a552b12157417c5636495e5ba876f30d517786144018299678e81f781f790f114f57c414be3217b3b1fca630be6e76edae4fac99c59f0f412862f5fa8ad58d12db61253059c9f9376815c7efd5afbeb31519bc31108dd5ff222431bb8cdaa3fefb", 0xc2, 0x1be}, {&(0x7f00000003c0)="22457e53cff865d6751a05fdd8b9726d3253248cafaf9433c53dcdd093dd148e0df35472a98d091dfa7f5f3bbb75b5c1be765d955aef51a276b06749e599c2872945a93b", 0x44, 0x5}, {&(0x7f0000000300)="917003bf821edb57b31b1617bc0747a843434e4a4fa407ce261c3d46555e77ae52b4a61108dc19ddb706674f2b5ad9937d6f75420e05c3e0ef200376b959e6fab3e58ff7e7f5c29f9a5a78fbe6d6ea8962635656b9adf695ee282a6b9ef37770f550e840b2fb6299a30c9eb92e71277e0533b40de1d55d796f90a272f242aba2be78596bdf1602bbc487c32f51f3508652e6d9d08e43757b", 0x98, 0x5}]) 03:30:03 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:30:03 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:03 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:03 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 433.913829][T11892] Dev loop0: unable to read RDB block 1 [ 433.919693][T11892] loop0: unable to read partition table [ 433.925717][T11892] loop0: partition table beyond EOD, truncated [ 433.931931][T11892] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 434.168876][T11902] Dev loop0: unable to read RDB block 1 [ 434.174983][T11902] loop0: unable to read partition table [ 434.180795][T11902] loop0: partition table beyond EOD, truncated [ 434.187238][T11902] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 03:30:04 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:04 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 434.420122][T11907] loop4: p1 p2 p3 p4 [ 434.425346][T11907] loop4: p1 size 11290111 extends beyond EOD, truncated [ 434.565998][T11907] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 434.624381][T11907] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 434.682860][T11907] loop4: p4 size 3657465856 extends beyond EOD, truncated 03:30:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) getsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000180)={0x3, 0x1, 0x1d, 0x4, 0x5f, &(0x7f0000000440)}) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="020163000000ef325c000000000000ffffff815561f65a3e1dbfd500ffffffa9000000e1000000887700720000a6ffffff00000000008000da55aa0000000000", 0x40, 0x1c0}]) 03:30:04 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:04 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:04 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:05 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:30:05 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x8, 0x9, 0x3, 0x9, 0x1, 0x2, 0x5}, 0x1c) socket$vsock_stream(0x28, 0x1, 0x0) syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xfffffffffffffea7, 0x77, 0x0, 0x2}, 0xb) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000040)={@default, @null, 0x2, 0x44}) 03:30:05 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 435.443727][T11942] loop4: p1 p2 p3 p4 [ 435.448359][T11942] loop4: p1 size 11290111 extends beyond EOD, truncated [ 435.529567][T11942] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 435.591129][T11942] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 435.617240][T11942] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 435.662818][T11957] loop0: p1 p2 p3 p4 [ 435.667555][T11957] loop0: p1 size 11290111 extends beyond EOD, truncated [ 435.697177][T11957] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 435.730650][T11957] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 435.753180][T11957] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:05 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:05 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 435.968701][T11963] loop0: p1 p2 p3 p4 [ 435.973549][T11963] loop0: p1 size 11290111 extends beyond EOD, truncated 03:30:05 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 436.062365][T11963] loop0: p2 size 1073872896 extends beyond EOD, truncated 03:30:06 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 436.139243][T11963] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 436.171465][T11963] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:06 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:06 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3) [ 436.440084][T11994] loop4: p1 p2 p3 p4 [ 436.444925][T11994] loop4: p1 size 11290111 extends beyond EOD, truncated 03:30:06 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 436.539132][T11994] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 436.608925][T11994] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 436.663447][T11994] loop4: p4 size 3657465856 extends beyond EOD, truncated 03:30:06 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 436.919134][T12021] loop0: p1 p2 p3 p4 [ 436.923951][T12021] loop0: p1 size 11290111 extends beyond EOD, truncated [ 436.933258][T12021] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 436.943351][T12021] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 436.953272][T12021] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:06 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:06 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:07 executing program 0: syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8d0, 0x40) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = openat$sequencer2(0xffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x40, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000340)={0x1, 0x0, @ioapic={0x10000, 0x1000, 0x40, 0x0, 0x0, [{0x8a, 0x5, 0x0, [], 0x1f}, {0x81, 0x80, 0x7, [], 0x2}, {0x80, 0xff, 0x9}, {0x2, 0x80, 0xc9, [], 0x3}, {0x3, 0x3, 0xfd}, {0x40, 0x3, 0xfd, [], 0x8}, {0xf9, 0x3, 0x7, [], 0x1c}, {0x3, 0x6, 0x5, [], 0xff}, {0x7, 0x81, 0x5, [], 0x1c}, {0x7, 0x4, 0x1, [], 0x80}, {0x25, 0x3, 0x3, [], 0x16}, {0x5, 0x9, 0x8, [], 0x8}, {0x1a, 0xf0, 0x5, [], 0x6}, {0x4, 0x1, 0x8, [], 0x2}, {0xff, 0xeb, 0x20, [], 0x3}, {0x0, 0x59, 0x50, [], 0x1d}, {0x7, 0x6, 0x0, [], 0x7}, {0x3, 0x0, 0x35, [], 0x3}, {0x1, 0x3f, 0x0, [], 0x4}, {0x7f, 0xf0, 0x4, [], 0x5}, {0xf2, 0x2, 0x7f, [], 0x5}, {0xc0, 0x2, 0xae, [], 0xff}, {0x0, 0x3, 0x3f, [], 0xe0}, {0x22, 0x7, 0x5, [], 0xff}]}}) write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x6, 0x1, 0x401, 0x0, 0x0, {0x1, 0x0, 0x6}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20044010}, 0x8004) syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) r2 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x7, 0x10000) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000140)={0x0, 0x0, [], {0x0, @bt={0x4, 0x4, 0x1, 0x2, 0x69, 0x1, 0xd11, 0x10000, 0x7fffffff, 0x80000001, 0x7fe000, 0x1000, 0x81, 0x800, 0x5, 0xa, {0x80, 0x81}, 0x6, 0x3f}}}) 03:30:07 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:30:07 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:07 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 437.562341][T12047] loop4: p1 p2 p3 p4 [ 437.567172][T12047] loop4: p1 size 11290111 extends beyond EOD, truncated [ 437.597134][T12047] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 437.696641][T12047] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 437.709153][T12052] loop0: p1 p2 p3 p4 [ 437.713981][T12052] loop0: p1 size 11290111 extends beyond EOD, truncated [ 437.779173][T12047] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 437.851135][T12052] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 437.930295][T12052] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 437.982299][T12052] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:08 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) dup3(0xffffffffffffffff, r0, 0x0) 03:30:08 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:08 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = openat$vga_arbiter(0xffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000100)={'syz0\x00', {0x8, 0x1ff, 0x3f, 0x8}, 0x3d, [0x7ff, 0x40, 0x7, 0xfc3, 0x7, 0x4, 0x2, 0x8, 0x8000, 0x2, 0x40, 0x2, 0xfffffffb, 0x32, 0x3, 0x1812, 0x400, 0x287, 0x5, 0x7fffffff, 0x0, 0xf5, 0x4, 0xfffffffc, 0x80000000, 0x97cf, 0x6, 0x2, 0x81, 0x101, 0x27f8, 0x8, 0x3, 0x2, 0x400, 0x1, 0x1, 0x80000001, 0x3b59bc78, 0x7fffffff, 0x5, 0x0, 0x9, 0x0, 0x100, 0x1, 0xf5, 0x2, 0x8000000, 0xa4, 0x1, 0x0, 0x4, 0x591, 0x3f, 0x3, 0xb793, 0x10001, 0x80000001, 0x3, 0x3, 0x6, 0x80, 0xa0], [0x6, 0x100, 0x7fffffff, 0x200, 0xaa, 0x8, 0x1, 0x80, 0x5, 0x7fff, 0x10000, 0x80, 0x6, 0x8000, 0x5, 0xd4, 0x3, 0x10001, 0xfe, 0x2, 0xfa27, 0x81, 0xfff, 0x1, 0x2, 0x5, 0x8, 0x7, 0x21a3, 0xc4c, 0x6, 0x2d56, 0x5, 0x0, 0x7fff, 0xfffffffe, 0x8, 0x3ff, 0xfffffffc, 0xb96, 0x8, 0x40, 0x7fffffff, 0x2, 0x80000001, 0x2, 0x1, 0xfff, 0x7, 0xec, 0x5, 0x1, 0x9, 0x1ff, 0x7ff, 0x5, 0x10001, 0x6, 0x8, 0x8000, 0x1ff, 0x9, 0x4, 0x1], [0x10000, 0x80, 0x5, 0x8cc, 0xffff, 0x2, 0x7fff, 0x88a, 0x1, 0x0, 0x8001, 0x0, 0x7fff, 0x81, 0xffff4b31, 0x3, 0x6, 0x1ff, 0xfffffff8, 0x100, 0xd1c5, 0x5, 0x5, 0x7ff, 0x0, 0x7, 0xffffffff, 0x80000001, 0x8, 0x8, 0x5, 0x3f, 0x7, 0xa4b3, 0x1, 0x7f, 0x6, 0x8, 0xce, 0x9, 0x6, 0x0, 0x502, 0x6, 0x7f, 0x18721efb, 0x4, 0x4, 0x1, 0x5, 0xffffffff, 0x8, 0x7, 0xa6, 0x1, 0x1a7, 0x7, 0x1, 0x4, 0x20, 0xffffffff, 0x8, 0x81, 0x2], [0x8001, 0x7ff, 0x6, 0x9, 0x1, 0x0, 0x6, 0x5, 0x1318, 0x7, 0x20, 0xfffffffc, 0x8, 0x3, 0x4, 0xffffffff, 0x101, 0xeb, 0x6, 0x1, 0x1, 0x1000, 0x6a7, 0x7, 0x0, 0x10001, 0x9, 0x3, 0x2, 0x8, 0x3fe5, 0x7, 0x101, 0x81, 0x200, 0x5, 0x8, 0x7f, 0xcb9, 0x4, 0x668, 0x101, 0xffff, 0x7fffffff, 0x0, 0x2, 0x1, 0x80000000, 0x0, 0x5, 0x2, 0x8000000, 0x100, 0x1f42, 0xffff310d, 0x6, 0x3, 0x400, 0x2, 0x6, 0x40000000, 0x7fffffff, 0x7fff, 0x40]}, 0x45c) [ 438.528178][T12087] loop4: p1 p2 p3 p4 [ 438.532963][T12087] loop4: p1 size 11290111 extends beyond EOD, truncated [ 438.567606][T12087] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 438.669085][T12087] loop4: p3 size 1912633224 extends beyond EOD, truncated 03:30:08 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 438.762049][T12087] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 438.868727][ T4876] loop4: p1 p2 p3 p4 [ 438.873431][ T4876] loop4: p1 size 11290111 extends beyond EOD, truncated [ 438.900620][T12096] loop0: p1 p2 p3 p4 [ 438.905446][T12096] loop0: p1 size 11290111 extends beyond EOD, truncated [ 438.930830][T12096] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 438.939715][ T4876] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 438.962507][T12096] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 438.972076][T12096] loop0: p4 size 3657465856 extends beyond EOD, truncated [ 439.003579][ T4876] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 439.063086][ T4876] loop4: p4 size 3657465856 extends beyond EOD, truncated 03:30:08 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 439.179232][T12096] loop0: p1 p2 p3 p4 [ 439.184023][T12096] loop0: p1 size 11290111 extends beyond EOD, truncated [ 439.270190][T12096] loop0: p2 size 1073872896 extends beyond EOD, truncated 03:30:09 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) dup3(0xffffffffffffffff, r0, 0x0) 03:30:09 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 439.349916][T12096] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 439.385246][T12096] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:09 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000002c0)='children\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb, 0x77, 0x1}, 0xb) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r3 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r3, r2, 0x0) perf_event_open(&(0x7f00000003c0)={0x4, 0x70, 0x7, 0x80, 0x7, 0x9, 0x0, 0x7f, 0x10008, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x0, 0x5}, 0x1000, 0xa1, 0xd278, 0x9, 0x9, 0x1, 0x2}, r0, 0x10, 0xffffffffffffffff, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="0044001a00ba53e500fbffd897305d03000100000600", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000200ffffffff0000000008000100736671"], 0x74}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000000660007c8370000000000810000000000", @ANYRES32=r7, @ANYBLOB="00000000110a02"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', r7, 0x29, 0x2, 0x8, 0x6, 0x20, @dev={0xfe, 0x80, [], 0x27}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7, 0x20, 0x444, 0x1}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xb5, 0xb5, &(0x7f0000000100)="cbdae50ad1c0f236789f5636a1e5e541095e26b0aacde14936daa2b8d16b57979409be9450410b186c651288dc060732b3e70284b4cc242b3a9b446a1ab6d9523558887dcb123298f342e9135f7bb26f8cf77973baed6a72d07c8caafce052cc1eae3154294474ece8d78b648b3c848de7fcbe4f4954bc56966963afc09f76f1de8d1c4e159328359ea88781feebcc3687daf4ef4c7a3fb2a205a12bd59b720a71f2f845413b2b5dcf0f4c28d2a062b12ed0bdcb21", &(0x7f00000001c0)=""/181, 0xfffffffe, 0x0, 0x40, 0x3f, &(0x7f0000000000)="7010475825a55d4f2d7a8ec35cc695272597bbb61cd00e89e088d4ee7373e3666e66ea0f32f73e232426a8677d7a11722b721435dac68f228af48d27ab7d1fd7", &(0x7f0000000040)="c23f40f28cf556bf00b80dd9b14d4bfd88b860fb214fa4fc1bbe89b826695c24cc09dbbbc816f0b66ae3fdd0cb408b1811aaa4295b423d34bb39f34f34a467"}, 0x40) 03:30:09 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 439.778553][T12154] loop4: p1 p2 p3 p4 [ 439.783222][T12154] loop4: p1 size 11290111 extends beyond EOD, truncated [ 439.806937][T12154] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 439.830869][T12154] loop4: p3 size 1912633224 extends beyond EOD, truncated 03:30:09 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 439.913677][T12154] loop4: p4 size 3657465856 extends beyond EOD, truncated 03:30:10 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 440.266068][T12169] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. [ 440.280422][T12168] loop0: p1 p2 p3 p4 [ 440.286484][T12168] loop0: p1 size 11290111 extends beyond EOD, truncated [ 440.352514][T12168] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 440.374292][T12168] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 440.392171][T12168] loop0: p4 size 3657465856 extends beyond EOD, truncated [ 440.588999][T12183] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. [ 440.620017][T12168] loop0: p1 p2 p3 p4 [ 440.624850][T12168] loop0: p1 size 11290111 extends beyond EOD, truncated [ 440.727354][T12168] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 440.809880][T12168] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 440.851998][T12168] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:18 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:18 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) dup3(0xffffffffffffffff, r0, 0x0) 03:30:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) tee(r1, r2, 0x0, 0x8) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x6, 0x22200) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xa0, r4, 0x1, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x73}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xa4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x2e}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7f}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20004804}, 0x9ea506eb6fc8a59f) syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:30:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) getsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000180)={0x3, 0x1, 0x1d, 0x4, 0x5f, &(0x7f0000000440)}) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="020163000000ef325c000000000000ffffff815561f65a3e1dbfd500ffffffa9000000e1000000887700720000a6ffffff00000000008000da55aa0000000000", 0x40, 0x1c0}]) 03:30:18 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 448.664941][T12265] loop4: p1 p2 p3 p4 [ 448.669750][T12265] loop4: p1 size 11290111 extends beyond EOD, truncated [ 448.725547][T12265] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 448.753436][T12267] loop0: p1 p2 p3 p4 [ 448.757256][T12265] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 448.758218][T12267] loop0: p1 size 11290111 extends beyond EOD, truncated [ 448.864999][T12265] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 448.891725][T12267] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 448.916332][T12267] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 448.958502][T12267] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:19 executing program 0: r0 = openat$proc_capi20ncci(0xffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) renameat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') r2 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r3, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) sendfile(r2, r3, &(0x7f0000000140)=0x3, 0x9) 03:30:19 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 449.674207][T12297] loop4: p1 p2 p3 p4 [ 449.679053][T12297] loop4: p1 size 11290111 extends beyond EOD, truncated [ 449.708045][T12297] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 449.754491][T12297] loop4: p3 size 1912633224 extends beyond EOD, truncated 03:30:19 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 449.805961][T12297] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 450.064080][T12311] IPVS: ftp: loaded support on port[0] = 21 03:30:20 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 450.681452][ T4876] loop4: p1 p2 p3 p4 [ 450.686231][ T4876] loop4: p1 size 11290111 extends beyond EOD, truncated 03:30:20 executing program 0: syz_read_part_table(0x7fffffe, 0x59, &(0x7f00000000c0)) r0 = shmget$private(0x0, 0xd000, 0x0, &(0x7f0000ff3000/0xd000)=nil) shmat(r0, &(0x7f0000ff7000/0x1000)=nil, 0x6000) shmctl$SHM_STAT_ANY(r0, 0xf, &(0x7f0000000040)=""/241) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000000)={'nr0\x00'}) [ 450.760399][ T4876] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 450.812704][ T4876] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 450.838705][ T4876] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 450.917480][T12349] loop4: p1 p2 p3 p4 [ 450.922455][T12349] loop4: p1 size 11290111 extends beyond EOD, truncated [ 451.025980][T12349] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 451.099557][T12349] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 451.116769][T12349] loop4: p4 size 3657465856 extends beyond EOD, truncated 03:30:21 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:21 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 451.458148][T12311] chnl_net:caif_netlink_parms(): no params data found [ 451.956008][T12311] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.964116][T12311] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.973698][T12311] device bridge_slave_0 entered promiscuous mode [ 451.995724][T12311] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.003162][T12311] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.012697][T12311] device bridge_slave_1 entered promiscuous mode [ 452.086524][T12311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 452.107065][T12311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 452.158011][T12311] team0: Port device team_slave_0 added [ 452.174679][T12311] team0: Port device team_slave_1 added [ 452.234197][T12311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 452.241310][T12311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 452.267423][T12311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 452.439685][T12311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 452.446740][T12311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 452.472918][T12311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 452.800778][T12311] device hsr_slave_0 entered promiscuous mode [ 452.840267][T12311] device hsr_slave_1 entered promiscuous mode [ 452.869686][T12311] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 452.877289][T12311] Cannot create hsr debugfs directory [ 453.263736][T12311] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 453.320666][T12311] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 453.412607][T12311] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 453.535702][T12311] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 454.305473][T12311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 454.476397][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 454.486012][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 454.523106][T12311] 8021q: adding VLAN 0 to HW filter on device team0 [ 454.584564][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 454.594634][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 454.604222][ T3082] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.611533][ T3082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.746393][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 454.756222][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 454.766317][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 454.776308][ T3082] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.783627][ T3082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.792723][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 454.803901][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 454.815104][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 454.826044][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 455.000519][T12311] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 455.011760][T12311] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 455.129668][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 455.140423][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 455.151212][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 455.161596][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 455.171418][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 455.181906][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 455.191600][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 455.201305][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 455.209038][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 455.237013][T12311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 455.255002][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 455.796718][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 455.807067][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 455.905645][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 455.917328][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 455.940581][T12311] device veth0_vlan entered promiscuous mode [ 455.973504][T12311] device veth1_vlan entered promiscuous mode [ 455.986724][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 455.996112][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 456.005981][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 456.094509][T12311] device veth0_macvtap entered promiscuous mode [ 456.107943][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 456.117738][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 456.128330][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 456.148943][T12311] device veth1_macvtap entered promiscuous mode [ 456.165652][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 456.175471][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 456.240379][T12311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 456.251556][T12311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.261540][T12311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 456.272051][T12311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.281999][T12311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 456.292504][T12311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.302443][T12311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 456.313299][T12311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.323235][T12311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 456.333874][T12311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.348375][T12311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 456.413844][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 456.427154][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 456.577694][T12311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 456.589492][T12311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.601165][T12311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 456.611687][T12311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.621630][T12311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 456.632149][T12311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.642097][T12311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 456.652619][T12311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.662580][T12311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 456.673099][T12311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 456.687462][T12311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 456.702199][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 456.713570][ T3082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 03:30:29 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:29 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:29 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ff17008200080000000000000002ffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0xffffffffffffff78, 0x1c0}]) 03:30:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) getsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000180)={0x3, 0x1, 0x1d, 0x4, 0x5f, &(0x7f0000000440)}) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="020163000000ef325c000000000000ffffff815561f65a3e1dbfd500ffffffa9000000e1000000887700720000a6ffffff00000000008000da55aa0000000000", 0x40, 0x1c0}]) 03:30:29 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r3, 0x200004) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r1, r3, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 459.682754][T12612] loop4: p1 p2 p3 p4 [ 459.687566][T12612] loop4: p1 size 11290111 extends beyond EOD, truncated [ 459.811744][T12612] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 459.889002][T12612] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 459.986387][T12612] loop4: p4 size 3657465856 extends beyond EOD, truncated 03:30:30 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r0 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 03:30:30 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:30:30 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1, 0x4}) fcntl$lock(r0, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r1, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r3, &(0x7f0000000280)={0xb}, 0xb) ioctl$TIOCMGET(r3, 0x5415, &(0x7f0000000040)) fcntl$lock(r2, 0x24, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r2, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r2, 0xf505, 0x0) [ 460.745454][T12641] loop4: p1 p2 p3 p4 [ 460.750332][T12641] loop4: p1 size 11290111 extends beyond EOD, truncated [ 460.822004][T12641] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 460.869660][T12641] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 460.944952][T12641] loop4: p4 size 3657465856 extends beyond EOD, truncated 03:30:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) getsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000180)={0x3, 0x1, 0x1d, 0x4, 0x5f, &(0x7f0000000440)}) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="020163000000ef325c000000000000ffffff815561f65a3e1dbfd500ffffffa9000000e1000000887700720000a6ffffff00000000008000da55aa0000000000", 0x40, 0x1c0}]) [ 461.065553][T12650] loop0: p1 p2 p3 p4 [ 461.070343][T12650] loop0: p1 size 11290111 extends beyond EOD, truncated [ 461.172955][T12650] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 461.264807][T12650] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 461.337082][T12650] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:31 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r0 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) [ 461.663032][T12684] loop4: p1 p2 p3 p4 [ 461.667976][T12684] loop4: p1 size 11290111 extends beyond EOD, truncated [ 461.693815][T12684] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 461.719495][T12684] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 461.751492][T12684] loop4: p4 size 3657465856 extends beyond EOD, truncated 03:30:31 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:31 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:30:40 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000100)="0201630000000a100000ff45ac0000ffffff810008000000008bb2000040ffffffa9000000e1000000887700720030eeffa6ffffff00000000008000da55aa00306f74d7353ca87b2911089e7144d44370eff0b7caf1b1cdf3d466176d791dbae30ae5d3fc83103ee49008cb53e15a2e36cd05bdfc82e0a33bc267af2835dec80c5885f258fda6b270686d42089671fdfdae37240711fda66b3f893050a7f330687d3a61dd1fc52066142197924db14722e91631aaf3aa0bd8921057a87cb2e625545bf870fa69fe387452375122ea196afc1cd2a658d3a0a7a84720f5015b7772c7eb76bd39ae9a3c9e4f659168ac4dc2651b4de2d584dd0577fe88c63b3d15ada164970a0dc10b085b94f8056a25896931667af3f950ee6cd3cdd154633745212ac011ed59a81eaaaa48a85cbd111a18b8e8eebfe5c556e20125e73ac915d06358c80f01d0d47d657d8416a5e38bb2ede282d7a6e7d49c1d17f19f05906189edc9ba59fbc8520610f8944a0b4b4fe1aab1b3140b053da2431548ca7264a4cce0fb36819ffc96", 0x187, 0x1bc}]) 03:30:40 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 03:30:40 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r0 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 03:30:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) getsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="020163000000ef325c000000000000ffffff815561f65a3e1dbfd500ffffffa9000000e1000000887700720000a6ffffff00000000008000da55aa0000000000", 0x40, 0x1c0}]) 03:30:40 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 470.597438][T12734] loop4: p1 p2 p3 p4 [ 470.602273][T12734] loop4: p1 size 11290111 extends beyond EOD, truncated [ 470.615439][T12734] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 470.627696][T12734] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 470.642557][T12734] loop4: p4 size 3657465856 extends beyond EOD, truncated 03:30:40 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 03:30:40 executing program 0: r0 = openat$sequencer2(0xffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x100, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e24, 0x0, @mcast1, 0x1}, 0x1c) syz_read_part_table(0x8000000, 0x3, &(0x7f0000000180)=[{&(0x7f0000000080)="0201630000000a100000ff45ac004f0fc01a81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}, {&(0x7f0000000000)="48511f1b6f6537a9add37f825af75ca5f695d20691e4e4b480dc94771d2d38acd4f9abf6bbf2353c3bc75c6cf30040eded1a989082380c946610d6f1f306eccbc3c1fb262ba6ed9d9a4f6b0d5d2c7c9166", 0x51, 0x3}, {&(0x7f0000000100)="461223e45fc5dab9ccbb0150b365bb22aac12195e7392e661fef524a2c9ce13c98c5bb53b5d5e9a2d91588e174fe7ff8876a9bf2e1285ceaf4d4764cbb422d69818c69509d", 0x45, 0xffff}]) 03:30:40 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:30:40 executing program 4: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) getsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') syz_read_part_table(0x8000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="020163000000ef325c000000000000ffffff815561f65a3e1dbfd500ffffffa9000000e1000000887700720000a6ffffff00000000008000da55aa0000000000", 0x40, 0x1c0}]) [ 471.686143][T12778] loop4: p1 p2 p3 p4 [ 471.690972][T12778] loop4: p1 size 11290111 extends beyond EOD, truncated [ 471.733136][T12778] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 471.756726][T12778] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 471.807155][T12778] loop4: p4 size 3657465856 extends beyond EOD, truncated 03:30:42 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 03:30:42 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 03:30:42 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:30:42 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:42 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:30:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) getsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="020163000000ef325c000000000000ffffff815561f65a3e1dbfd500ffffffa9000000e1000000887700720000a6ffffff00000000008000da55aa0000000000", 0x40, 0x1c0}]) [ 472.989811][T12815] loop0: p1 p2 p3 p4 [ 472.994739][T12815] loop0: p1 size 11290111 extends beyond EOD, truncated [ 473.017798][T12815] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 473.151633][T12815] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 473.273291][T12815] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:43 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:43 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:30:43 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 03:30:43 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) [ 473.538097][T12815] loop0: p1 p2 p3 p4 [ 473.543032][T12815] loop0: p1 size 11290111 extends beyond EOD, truncated [ 473.579343][T12815] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 473.634970][T12815] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 473.687765][T12815] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:43 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 473.799087][ T4876] loop0: p1 p2 p3 p4 [ 473.803878][ T4876] loop0: p1 size 11290111 extends beyond EOD, truncated 03:30:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="020163000000ef325c000000000000ffffff815561f65a3e1dbfd500ffffffa9000000e1000000887700720000a6ffffff00000000008000da55aa0000000000", 0x40, 0x1c0}]) [ 473.906849][ T4876] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 473.960173][ T4876] loop0: p3 size 1912633224 extends beyond EOD, truncated 03:30:43 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) [ 474.020116][ T4876] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:43 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 03:30:43 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:30:44 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:44 executing program 0: r0 = openat$vsock(0xffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000040)="0201630000000a100000ff45ac0000ffffff81000800000000fdd0b021c237147485bca1a7000000024000ffffffa9000000e10000008877007200300700a6ff", 0x40, 0x1c0}]) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0xdc, r1, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x44, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa762}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd7d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3c56}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x40881}, 0x20000) 03:30:44 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 03:30:44 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 03:30:44 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:44 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000100)="0201630200000a10003300ff5a6d5156996ba0bcfa4cc54a00000000000000024000dfffffa9000000e100000088770072003007000500fffe00000000008000da55ec96c870a79a026fb94216848aca22e7e556a9d3bfa861a83e288ef3f854dc7919ba6d91c7af41053618c3786271fd15a9a2bcc070b99e13b52c61fe2adf07f96fe47843c727203f60897448a3eee4737878eb811264b48b23475f35f59b026e57b89a9f29c36d7b733f89e2901b99e1dac18f58347e2d97f0ba2f0e46a760098167f5c4874f0e4f4a0b65a2b3aab6d0404bb94e1d290a05310a67223ffa4ae809ea1e5d9525bab1f50ab15d270bc1005ecb534ac67f3fb55a78603dae373d1743504e7b47944042f4978aad3d", 0x10f, 0x1c0}]) 03:30:45 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:30:45 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 03:30:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1}) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="020163000000ef325c000000000000ffffff815561f65a3e1dbfd500ffffffa9000000e1000000887700720000a6ffffff00000000008000da55aa0000000000", 0x40, 0x1c0}]) 03:30:45 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000002c0)={[{0x2d, 'io'}, {0x2b, 'pids'}]}, 0xa) 03:30:45 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:45 executing program 2: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={0x0, &(0x7f0000000000)="0562"}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x19, 0x4, 0x4, 0x3}, 0x40) bpf$BPF_GET_MAP_INFO(0x2, &(0x7f00000000c0)={r0, 0x28, &(0x7f00000003c0)}, 0x30) 03:30:45 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 03:30:46 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x80000000, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000100)="81c902c2d78d5ec440e20d43c626b6629b2e908cb66048bf37b036c2e8d261fa540bdf51e6ea92cacb617edc619c6a7531e8e6872d0de3c790cd9ed89a2a0aecaab28b1b00eec824d68b6904321c3d233c39d2b06a004bde7e8b9f0931a67dba1eaf47281749a497ffda00e465e79f4943c7067906e13e0d42d4bbd92af9a7f95c9507f35a534c", 0x87, 0xe1}, {&(0x7f00000001c0)="d7db7dca0c13a7775e1cae49e71b5a66f7c1333491594056746b6c3c4da8e547b71059f7bc715ec93839e84b1062c07ce2d0d9feaf659c170f6d5c51a7d4d30dcbf3eb50cb37159f0f671077da623e552528255c39a3c3bb78b0533707a25b5a03effd1279c70bb7e55ed3e8026800fef1ce1a2d", 0x74, 0x7}, {&(0x7f0000000240)="de4861145e0706bfbe4242011618fff737f705fa7fd1f82ed3e09b0ca7e77992a6922b7bd9700ee8909e2c2b4c010d5ef3ed48dec97a727b31d39b5e3960", 0x3e, 0x5}, {&(0x7f0000000280)="fd5f834a8c506bca89041053999f87dbb4056c668629321f9a790743015212721018278b72f3", 0x26, 0x3f}], 0xa000, &(0x7f0000000300)={[{@hostdata={'hostdata'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x64, 0x38, 0x57, 0x63, 0x38, 0x30, 0x61, 0x66], 0x2d, [0x33, 0x34, 0x38, 0x66], 0x2d, [0x31, 0x38, 0x33, 0x31], 0x2d, [0x66, 0x6e, 0x39, 0x61], 0x2d, [0x37, 0x64, 0x63, 0x39, 0x36, 0x65, 0x63, 0x65]}}}, {@uid_lt={'uid<', r1}}, {@obj_role={'obj_role', 0x3d, '%%'}}, {@subj_role={'subj_role', 0x3d, ',,**+'}}]}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r2, &(0x7f0000000280)={0xb}, 0xb) getsockname$l2tp(r2, &(0x7f0000000380)={0x2, 0x0, @broadcast}, &(0x7f00000003c0)=0x10) write$P9_RREADLINK(r2, &(0x7f0000000400)={0x10, 0x17, 0x2, {0x7, './file1'}}, 0x10) 03:30:46 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x1c}, 0x1c}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000280)=""/11, 0xb}, {&(0x7f0000000b00)=""/268, 0x10c}], 0x2}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:30:46 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:46 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 476.681340][T12978] loop0: p1 p2 p3 p4 [ 476.686170][T12978] loop0: p1 size 11290111 extends beyond EOD, truncated 03:30:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1}) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="020163000000ef325c000000000000ffffff815561f65a3e1dbfd500ffffffa9000000e1000000887700720000a6ffffff00000000008000da55aa0000000000", 0x40, 0x1c0}]) [ 476.849309][T12978] loop0: p2 size 1073872896 extends beyond EOD, truncated 03:30:46 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000440)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18b", 0xcd}], 0x1}, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000540)={0x0, &(0x7f0000000500)}) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2703000000000009, 0x8000000, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3000}]) [ 476.930393][T12978] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 476.992010][T12978] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:46 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:47 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2}}]}}, &(0x7f0000000000)=""/132, 0x32, 0x84, 0x8}, 0x20) 03:30:47 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000140)="240000001a005f0214f9f4070009040081", 0x11) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000100)={0x8}, 0x10) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0x0) [ 477.305301][T12978] loop0: p1 p2 p3 p4 [ 477.310203][T12978] loop0: p1 size 11290111 extends beyond EOD, truncated [ 477.323213][T13010] BPF:[1] ARRAY (anon) [ 477.327512][T13010] BPF:type_id=1 index_type_id=2 nr_elems=0 [ 477.333527][T13010] BPF: [ 477.336331][T13010] BPF:Invalid index [ 477.340180][T13010] BPF: [ 477.340180][T13010] [ 477.449545][T12978] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 477.498610][T12978] loop0: p3 size 1912633224 extends beyond EOD, truncated 03:30:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_MACSEC_CIPHER_SUITE={0xc}]}}}]}, 0x40}}, 0x0) [ 477.574111][T12978] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:47 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:47 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:30:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x14, &(0x7f000025e000), &(0x7f0000a8a000)=0x4) 03:30:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="020163000000ef325c000000000000ffffff815561f65a3e1dbfd500ffffffa9000000e1000000887700720000a6ffffff00000000008000da55aa0000000000", 0x40, 0x1c0}]) 03:30:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_MACSEC_CIPHER_SUITE={0xc}]}}}]}, 0x40}}, 0x0) 03:30:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000200ffffffff0000000008000100736671"], 0x74}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000000660007c8370000000000810000000000", @ANYRES32=r3, @ANYBLOB="00000000110a02"], 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="00000898ceb5e20017e90000", @ANYRES32=r7, @ANYBLOB="00000200ffffffff0000000008000100736671"], 0x74}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000000660007c8370000000000810000000000", @ANYRES32=r7, @ANYBLOB="00000000110a02"], 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xdc, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0xdc}}, 0x4044000) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r8, &(0x7f0000000280)={0xb}, 0xb) ioctl$KVM_RUN(r8, 0xae80, 0x0) [ 478.280571][T13040] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 03:30:48 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 478.343664][T13045] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. [ 478.426737][T13048] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 03:30:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 03:30:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_MACSEC_CIPHER_SUITE={0xc}]}}}]}, 0x40}}, 0x0) 03:30:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="020163000000ef325c000000000000ffffff815561f65a3e1dbfd500ffffffa9000000e1000000887700720000a6ffffff00000000008000da55aa0000000000", 0x40, 0x1c0}]) [ 478.684656][T13045] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 478.710353][T13048] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. [ 478.738263][T13040] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 03:30:48 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:30:48 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:48 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20214d501015eef8}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x20, 0x4, 0x8, 0x401, 0x0, 0x0, {0x7, 0x0, 0x4}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40001}, 0x48001) 03:30:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_MACSEC_CIPHER_SUITE={0xc}]}}}]}, 0x40}}, 0x0) 03:30:49 executing program 5: syz_read_part_table(0x8000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="020163000000ef325c000000000000ffffff815561f65a3e1dbfd500ffffffa9000000e1000000887700720000a6ffffff00000000008000da55aa0000000000", 0x40, 0x1c0}]) 03:30:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 03:30:49 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:49 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 479.552745][T13094] loop0: p1 p2 p3 p4 [ 479.557605][T13094] loop0: p1 size 11290111 extends beyond EOD, truncated [ 479.643425][T13094] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 479.677340][T13094] loop0: p3 size 1912633224 extends beyond EOD, truncated 03:30:49 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x4) [ 479.691894][T13094] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:49 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="020163000000ef325c000000000000ffffff815561f65a3e1dbfd500ffffffa9000000e1000000887700720000a6ffffff00000000008000da55aa0000000000", 0x40, 0x1c0}]) 03:30:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) [ 479.973969][T13094] loop0: p1 p2 p3 p4 [ 479.978720][T13094] loop0: p1 size 11290111 extends beyond EOD, truncated 03:30:49 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) [ 480.083641][T13094] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 480.101571][T13094] loop0: p3 size 1912633224 extends beyond EOD, truncated 03:30:50 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 480.156027][T13126] Dev loop5: unable to read RDB block 1 [ 480.161870][T13126] loop5: unable to read partition table [ 480.167908][T13126] loop5: partition table beyond EOD, truncated [ 480.174392][T13126] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 480.181583][T13094] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:50 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x42}}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) 03:30:50 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = open(&(0x7f0000000100)='./file0/file0\x00', 0x10900, 0x32) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000140)=r1) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x14) 03:30:50 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 03:30:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 03:30:50 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:30:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001880)={0x24, r1, 0x5, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x24}, 0x1, 0x6c}, 0x0) 03:30:50 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 480.947105][T13153] loop0: p1 p2 p3 p4 [ 480.951927][T13153] loop0: p1 size 11290111 extends beyond EOD, truncated [ 480.985542][T13153] loop0: p2 size 1073872896 extends beyond EOD, truncated 03:30:50 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) [ 481.010461][T13153] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 481.020024][T13153] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:51 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 481.281349][T13153] loop0: p1 p2 p3 p4 [ 481.286412][T13153] loop0: p1 size 11290111 extends beyond EOD, truncated [ 481.316352][T13153] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 481.339894][T13153] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 481.351685][T13153] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:30:51 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:30:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x1c}}, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00'}) ioctl(r0, 0x8b04, &(0x7f0000000040)) 03:30:51 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = openat$dlm_control(0xffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000002c0)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)={0x24, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r3, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x2c}}, 0x20044090) 03:30:51 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:30:51 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 03:30:51 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 03:30:51 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r1, 0x41, &(0x7f0000000440)=[&(0x7f0000000000)={0x4, 0x960000, 0x0, 0x1, 0x0, r0, &(0x7f00000001c0)="1000004004ffffffffff600000000000b22025285db74192e7576d9062ec6e2fe8ffff3ff248691861d03a71091d334252afb1af5b8f0474c2ed58338226131291198f3d70dcf797ac42d0eeed042c06b56b89f02f92b12ebe4c45948a362a76def2f4955f100a13131f474b140942110257e173cea102775e1b3873ebf98dac6421f6d449544114b8ce29f4b48d1738b5be127a96f24c9d3c130e1a6c2eb5b3f12eb6a1f5051594545cbb895e65d83c08d2d6cd56694e5a6c00f54aceaf498f57b2a56634a23ae7", 0x40000010}]) [ 482.018004][T13204] loop0: p1 p2 p3 p4 [ 482.022895][T13204] loop0: p1 size 11290111 extends beyond EOD, truncated [ 482.130068][T13204] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 482.158461][T13204] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 482.199854][T13204] loop0: p4 size 3657465856 extends beyond EOD, truncated [ 482.453016][T13204] loop0: p1 p2 p3 p4 [ 482.457948][T13204] loop0: p1 size 11290111 extends beyond EOD, truncated [ 482.600530][T13204] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 482.666816][T13204] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 482.718766][T13204] loop0: p4 size 3657465856 extends beyond EOD, truncated [ 482.942265][ T4876] loop0: p1 p2 p3 p4 [ 482.949089][ T4876] loop0: p1 size 11290111 extends beyond EOD, truncated [ 482.960998][ T4876] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 482.972570][ T4876] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 482.987952][ T4876] loop0: p4 size 3657465856 extends beyond EOD, truncated [ 488.065739][ T0] NOHZ: local_softirq_pending 08 03:31:01 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:31:01 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:31:01 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 03:31:01 executing program 5: syz_read_part_table(0x0, 0x0, &(0x7f0000000140)) 03:31:01 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000800)="d800000018008100e00f80ecdb4cb9040a0265ef0b007c05e87c55a1bc000900b8000699030000000500150008008178a8001600050006400200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:31:01 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="0201630000001a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 491.668728][T13315] loop0: p1 p2 p3 p4 [ 491.674153][T13315] loop0: p1 size 11290111 extends beyond EOD, truncated [ 491.760718][T13315] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 491.874637][T13315] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 491.936607][T13315] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:31:01 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 03:31:01 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:31:01 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000800)="d800000018008100e00f80ecdb4cb9040a0265ef0b007c05e87c55a1bc000900b8000699030000000500150008008178a8001600050006400200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:31:02 executing program 5: syz_read_part_table(0x0, 0x0, &(0x7f0000000140)) 03:31:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000001c0)={@pptp={0x18, 0x2, {0x3, @rand_addr=0x64010102}}, {&(0x7f0000000100)=""/131, 0x83}, &(0x7f0000000000), 0x1f}, 0xa0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r4) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x1800, &(0x7f0000000340)={'trans=unix,', {[{@cache_fscache='cache=fscache'}, {@access_uid={'access', 0x3d, r2}}], [{@smackfsroot={'smackfsroot', 0x3d, 'fd/3\x00'}}, {@obj_type={'obj_type', 0x3d, 'fd/3\x00'}}, {@fowner_lt={'fowner<', r4}}]}}) syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 03:31:02 executing program 5: syz_read_part_table(0x0, 0x0, &(0x7f0000000140)) 03:31:12 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:31:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x61b9, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000100)=0xf8df5f9, 0x4) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000080)=0x3, 0xfea3) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/35, 0x23}, 0x2000) 03:31:12 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000800)="d800000018008100e00f80ecdb4cb9040a0265ef0b007c05e87c55a1bc000900b8000699030000000500150008008178a8001600050006400200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:31:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) syz_read_part_table(0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000100)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa90000ff00000000008000da55aa0000000000000000662c58abb846c238621a14512f8352ed51d5e0f3f46e3a34355b65ec51c9bdb5da59b52e47bd4295a5032dcd1b0507fd55900c658ec491ef25b305674cb80267003453673eb41afafe10fcdeda705ffb449f29158d2cd5335a685899fdee1e4d18e767f319b31872410f54536ece391a75aecb52ca7eb7b53a61045baf8cb960f7499855f296e523587b97e8c4c7c974d0f1c527c65e7937eea9cd645e2d791ffb49b086f48daaf0ffc8cb69952dce6615caa7576fde", 0xee, 0x1c1}, {&(0x7f0000000000)="c411e3249cedcbf69503e52dbc21ed440f6b2a94151eb88467f71cff9ce898791a031205b0d98defc1e1bc64d9d86844c16179d50eac6e648189d0214bde869e39c3201045992089a30586080038b055ff56086821b0c76fb0ab4783d3db3d3238ccba231923a41cba4e4339ebc8b0fa70e087a0822948ccca7cd6284c62c83ded674ad053d1255912d558c68e6a657779fbaecff7da29", 0x97, 0x40}]) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000240)='./file0\x00', 0x52, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="6bae52a889f17f3a6f4f5b1d423bf4c4182886494292d001761baf6b10cf7e81e7f791d350be974f55553623e24baa1348f704a100ddc07912ed8151598347df3cdfd19697a5d4a2376f", 0x4a, 0x401}, {&(0x7f0000000300)="ff85e533754f8882796b5eaac747da09a07a580c9627558ad2c8654e18fda7eb960db22e8e67fd5d72f6e6f7a13f54197afe00d1681c0b9c1c4bd6e9c11ab162953e483c19753d17bdea59c167183ae5ff97e52c279004638914276deea76b7997e57cc488f1100d465e3a18988a2a3b6ee578932032c8028a88befcff98b5ecd27250bf225a7cf0fd291a37802ad01259979129a87fb6a6fc4d9b21cdba1c256f355532893297b74893217915417381d9965471c52db4fdb4354308e656d03d17397816333fd79b1320a93c28", 0xcd, 0x5}], 0x8000, &(0x7f0000000440)={[{@map_acorn='map=acorn'}, {@nojoliet='nojoliet'}, {@check_strict='check=strict'}, {@norock='norock'}, {@utf8='utf8'}, {@map_normal='map=normal'}, {@map_acorn='map=acorn'}, {@norock='norock'}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@obj_role={'obj_role', 0x3d, '\''}}]}) 03:31:12 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:31:12 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x1c0}]) [ 502.498354][T13386] Dev loop5: unable to read RDB block 1 [ 502.504704][T13386] loop5: unable to read partition table [ 502.510535][T13386] loop5: partition table beyond EOD, truncated [ 502.516919][T13386] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 502.556627][T13388] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:31:12 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:31:12 executing program 0: syz_read_part_table(0x8000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={{0x0, 0x0, @identifier="b4c58a76a9eeb18d6ea6cbd4ebafcea5"}}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r1, &(0x7f0000000280)={0xb}, 0xb) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x0, 0x1, 0x200, 0x3, "fc2a0739e8260a16a492be6c9af9616165ed4c6f8e442fb015e19caf53aa9a309788454f12c453e6eef9cf8602d75799968fea293cf94f25510c273acf61b6a7005c4a716a6c394bf542d5285478"}, 0x5e) rename(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='./file0\x00') 03:31:12 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000800)="d800000018008100e00f80ecdb4cb9040a0265ef0b007c05e87c55a1bc000900b8000699030000000500150008008178a8001600050006400200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:31:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x61b9, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000100)=0xf8df5f9, 0x4) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000080)=0x3, 0xfea3) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/35, 0x23}, 0x2000) 03:31:13 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x1c0}]) 03:31:13 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) [ 503.387460][T13404] loop0: p1 p2 p3 p4 [ 503.392234][T13404] loop0: p1 size 11290111 extends beyond EOD, truncated 03:31:13 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 503.527829][T13404] loop0: p2 size 1073872896 extends beyond EOD, truncated [ 503.608174][T13404] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 503.642613][T13417] Dev loop5: unable to read RDB block 1 [ 503.648692][T13417] loop5: unable to read partition table 03:31:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x61b9, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000100)=0xf8df5f9, 0x4) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000080)=0x3, 0xfea3) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/35, 0x23}, 0x2000) [ 503.654760][T13417] loop5: partition table beyond EOD, truncated [ 503.660978][T13417] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:31:13 executing program 3: creat(&(0x7f00000001c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}]}}) [ 503.752632][T13404] loop0: p4 size 3657465856 extends beyond EOD, truncated 03:31:13 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 03:31:13 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:31:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) r1 = openat$vfio(0xffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x210001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r2, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r3, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000400)={0x40001, 0x0, 0x2}) poll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x5029}, {r1, 0x1008}, {r2, 0x1452}, {r0, 0x1484}, {r3, 0x8060}, {0xffffffffffffffff, 0x500}], 0x6, 0x94) ioctl$CAPI_INSTALLED(r0, 0x80024322) 03:31:14 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x1c0}]) 03:31:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x61b9, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000100)=0xf8df5f9, 0x4) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000080)=0x3, 0xfea3) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/35, 0x23}, 0x2000) 03:31:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r0, &(0x7f000018efdc)="2400000052001f0814f9f407000904000a00071008004000fe0500ff0800030000000000", 0x24) [ 504.391658][T13441] Dev loop5: unable to read RDB block 1 [ 504.398434][T13441] loop5: unable to read partition table [ 504.404451][T13441] loop5: partition table beyond EOD, truncated [ 504.410671][T13441] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:31:14 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 03:31:14 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080), 0x0, 0x1c0}]) 03:31:14 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:31:14 executing program 3: ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f0000000000)={@none}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x14, &(0x7f0000000080)={r2}, &(0x7f0000000100)=0x18) 03:31:15 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind$phonet(r0, &(0x7f0000000000)={0x23, 0x0, 0x2}, 0x10) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) bind$phonet(r1, &(0x7f0000000000)={0x23, 0x0, 0x2}, 0x10) [ 505.188799][T13471] Dev loop5: unable to read RDB block 1 [ 505.194569][T13471] loop5: unable to read partition table [ 505.200416][T13471] loop5: partition table beyond EOD, truncated [ 505.207028][T13471] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:31:15 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080), 0x0, 0x1c0}]) 03:31:15 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 03:31:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r2, &(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x80) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ff2000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000001000/0x2000)=nil, &(0x7f0000008000/0xa000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000001000/0x3000)=nil, &(0x7f0000000000/0x2000)=nil, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000001000/0x1000)=nil, &(0x7f0000010000/0x3000)=nil, 0x0, 0x0, r3}, 0x68) 03:31:15 executing program 0: syz_read_part_table(0x8000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)="0201630000000a100000ff45ac0000ffffff81000800000000000000024000ffffffa9000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}, {&(0x7f00000000c0)="4c65bedcbfc06acf39ec50619bbd2cb0a06834fad3038dc78f5ed176d800d3ebf997cc30f032d0168262cb553c9dcf7733fef81370b8df5267a0ec311e5326d2a10601446d818a9d79efae09796d21bf6d61e59732263f0878bcd54106e4e90e9df4f668a47ecf4fd78ffc273fb53058d958d320d28ac7f61613671639eeac8c449633d64cc3bffa0015a943d3ace6b82b80a1", 0x93, 0x3ff}]) 03:31:15 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) [ 505.865112][T13488] Dev loop5: unable to read RDB block 1 [ 505.870808][T13488] loop5: unable to read partition table [ 505.877050][T13488] loop5: partition table beyond EOD, truncated [ 505.883266][T13488] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:31:15 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x7, 0x1) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) sendfile(r2, r4, 0x0, 0x80001d00c0d0) msgget$private(0x0, 0x200) msgrcv(0x0, 0x0, 0x0, 0x3, 0x3000) 03:31:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) socket(0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 03:31:15 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8002) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 03:31:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=0x8) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x76, &(0x7f0000000040)=@assoc_value={r2}, 0x8) [ 506.282622][T13503] loop0: p1 p2 p3 p4 [ 506.287840][T13503] loop0: p1 size 11290111 extends beyond EOD, truncated 03:31:16 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080), 0x0, 0x1c0}]) [ 506.383673][ C0] ===================================================== [ 506.390673][ C0] BUG: KMSAN: uninit-value in __skb_checksum_complete+0x37f/0x540 [ 506.398505][ C0] CPU: 0 PID: 13505 Comm: syz-executor.3 Not tainted 5.8.0-rc5-syzkaller #0 [ 506.407193][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.417244][ C0] Call Trace: [ 506.420529][ C0] [ 506.423402][ C0] dump_stack+0x1df/0x240 [ 506.427749][ C0] kmsan_report+0xf7/0x1e0 [ 506.432889][ C0] __msan_warning+0x58/0xa0 [ 506.437406][ C0] __skb_checksum_complete+0x37f/0x540 [ 506.443485][ C0] ? __skb_checksum+0x12a0/0x12a0 [ 506.448512][ C0] ? csum_partial_ext+0xa0/0xa0 [ 506.453370][ C0] nf_ip_checksum+0x53b/0x740 [ 506.458069][ C0] nf_nat_icmp_reply_translation+0x2ba/0x980 [ 506.464065][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 506.469241][ C0] nf_nat_ipv4_local_fn+0x215/0x830 [ 506.474484][ C0] ? nf_nat_ipv4_out+0x780/0x780 [ 506.479426][ C0] nf_hook_slow+0x16e/0x400 [ 506.483953][ C0] __ip_local_out+0x69b/0x800 [ 506.488649][ C0] ? __ip_local_out+0x800/0x800 [ 506.493528][ C0] ip_push_pending_frames+0x16f/0x460 [ 506.498918][ C0] icmp_push_reply+0x660/0x710 [ 506.503711][ C0] __icmp_send+0x23ca/0x3150 [ 506.508358][ C0] ? __udp4_lib_lookup+0x53f/0x5f0 [ 506.513493][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 506.518708][ C0] __udp4_lib_rcv+0x3773/0x4b80 [ 506.523612][ C0] udp_rcv+0x5c/0x70 [ 506.527514][ C0] ? udp_v4_early_demux+0x1ef0/0x1ef0 [ 506.532890][ C0] ip_protocol_deliver_rcu+0x619/0xbc0 [ 506.538365][ C0] ip_local_deliver+0x62a/0x7c0 [ 506.543247][ C0] ? ip_local_deliver+0x7c0/0x7c0 [ 506.548276][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 506.553913][ C0] ip_rcv+0x6cf/0x750 [ 506.557930][ C0] ? ip_rcv_core+0x12c0/0x12c0 [ 506.562703][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 506.568342][ C0] process_backlog+0xfb5/0x14e0 [ 506.573197][ C0] ? lapic_next_event+0x6e/0xa0 [ 506.578076][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 506.583364][ C0] net_rx_action+0x746/0x1aa0 [ 506.588069][ C0] ? net_tx_action+0xc40/0xc40 [ 506.592837][ C0] __do_softirq+0x311/0x83d [ 506.598314][ C0] asm_call_on_stack+0x12/0x20 [ 506.603073][ C0] [ 506.606021][ C0] do_softirq_own_stack+0x7c/0xa0 [ 506.611061][ C0] __local_bh_enable_ip+0x184/0x1d0 [ 506.616278][ C0] local_bh_enable+0x36/0x40 [ 506.620874][ C0] ip_finish_output2+0x1fee/0x24a0 [ 506.625996][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 506.632012][ C0] __ip_finish_output+0xaa7/0xd80 [ 506.637062][ C0] ip_finish_output+0x166/0x410 [ 506.641928][ C0] ip_output+0x593/0x680 [ 506.646209][ C0] ? ip_mc_finish_output+0x6c0/0x6c0 [ 506.651501][ C0] ? ip_finish_output+0x410/0x410 [ 506.656527][ C0] ip_send_skb+0x179/0x360 [ 506.660960][ C0] udp_send_skb+0x1046/0x18b0 [ 506.665674][ C0] udp_sendmsg+0x3bb5/0x4100 [ 506.670274][ C0] ? ip_do_fragment+0x3570/0x3570 [ 506.675316][ C0] ? update_stack_state+0x9a0/0xb40 [ 506.680565][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 506.685783][ C0] udpv6_sendmsg+0x1598/0x4940 [ 506.690561][ C0] ? is_module_text_address+0x4d/0x2a0 [ 506.696034][ C0] ? __kernel_text_address+0x171/0x2d0 [ 506.701521][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 506.706637][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 506.712448][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 506.718526][ C0] ? tomoyo_socket_sendmsg_permission+0x41c/0x4a0 [ 506.724948][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 506.730165][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 506.735978][ C0] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 506.742064][ C0] ? inet_send_prepare+0x92/0x600 [ 506.747789][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 506.753011][ C0] ? udpv6_rcv+0x70/0x70 [ 506.757256][ C0] ? udpv6_rcv+0x70/0x70 [ 506.761499][ C0] inet6_sendmsg+0x276/0x2e0 [ 506.766106][ C0] kernel_sendmsg+0x24a/0x440 [ 506.770800][ C0] sock_no_sendpage+0x235/0x300 [ 506.775678][ C0] ? sock_no_mmap+0x30/0x30 [ 506.780191][ C0] sock_sendpage+0x1e1/0x2c0 [ 506.784802][ C0] pipe_to_sendpage+0x38c/0x4c0 [ 506.789655][ C0] ? sock_fasync+0x250/0x250 [ 506.794265][ C0] __splice_from_pipe+0x565/0xf00 [ 506.799295][ C0] ? generic_splice_sendpage+0x2d0/0x2d0 [ 506.804964][ C0] generic_splice_sendpage+0x1d5/0x2d0 [ 506.810443][ C0] ? iter_file_splice_write+0x1800/0x1800 [ 506.816192][ C0] direct_splice_actor+0x1fd/0x580 [ 506.821336][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 506.826470][ C0] splice_direct_to_actor+0x6b2/0xf50 [ 506.831863][ C0] ? do_splice_direct+0x580/0x580 [ 506.836925][ C0] do_splice_direct+0x342/0x580 [ 506.841808][ C0] do_sendfile+0x101b/0x1d40 [ 506.847226][ C0] __se_compat_sys_sendfile+0x301/0x3c0 [ 506.852782][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 506.857984][ C0] ? __ia32_sys_sendfile64+0x70/0x70 [ 506.863273][ C0] __ia32_compat_sys_sendfile+0x56/0x70 [ 506.868827][ C0] __do_fast_syscall_32+0x2aa/0x400 [ 506.874063][ C0] do_fast_syscall_32+0x6b/0xd0 [ 506.878921][ C0] do_SYSENTER_32+0x73/0x90 [ 506.883429][ C0] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 506.889750][ C0] RIP: 0023:0xf7faa549 [ 506.893805][ C0] Code: Bad RIP value. [ 506.897862][ C0] RSP: 002b:00000000f5da50cc EFLAGS: 00000296 ORIG_RAX: 00000000000000bb [ 506.906271][ C0] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000004 [ 506.914240][ C0] RDX: 0000000000000000 RSI: 000000000000edc0 RDI: 0000000000000000 [ 506.922213][ C0] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 506.930210][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 506.938194][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 506.946209][ C0] [ 506.948546][ C0] Uninit was stored to memory at: [ 506.953578][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 506.959295][ C0] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 506.965384][ C0] kmsan_memcpy_metadata+0xb/0x10 [ 506.970408][ C0] __msan_memcpy+0x43/0x50 [ 506.974825][ C0] csum_partial_copy+0xae/0x100 [ 506.979675][ C0] skb_copy_and_csum_bits+0x227/0x1130 [ 506.985486][ C0] icmp_glue_bits+0x166/0x380 [ 506.990171][ C0] __ip_append_data+0x47c4/0x5630 [ 506.995196][ C0] ip_append_data+0x328/0x480 [ 506.999882][ C0] icmp_push_reply+0x206/0x710 [ 507.004677][ C0] __icmp_send+0x23ca/0x3150 [ 507.009267][ C0] __udp4_lib_rcv+0x3773/0x4b80 [ 507.014126][ C0] udp_rcv+0x5c/0x70 [ 507.018022][ C0] ip_protocol_deliver_rcu+0x619/0xbc0 [ 507.023477][ C0] ip_local_deliver+0x62a/0x7c0 [ 507.028322][ C0] ip_rcv+0x6cf/0x750 [ 507.032308][ C0] process_backlog+0xfb5/0x14e0 [ 507.037162][ C0] net_rx_action+0x746/0x1aa0 [ 507.041838][ C0] __do_softirq+0x311/0x83d [ 507.046326][ C0] [ 507.048644][ C0] Uninit was stored to memory at: [ 507.053690][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 507.059412][ C0] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 507.065480][ C0] kmsan_memcpy_metadata+0xb/0x10 [ 507.070511][ C0] __msan_memcpy+0x43/0x50 [ 507.074931][ C0] _copy_from_iter_full+0xbfe/0x13b0 [ 507.080217][ C0] ip_generic_getfrag+0x14a/0x3c0 [ 507.085244][ C0] __ip_append_data+0x47c4/0x5630 [ 507.090277][ C0] ip_make_skb+0x392/0x890 [ 507.094733][ C0] udp_sendmsg+0x36dc/0x4100 [ 507.099349][ C0] udpv6_sendmsg+0x1598/0x4940 [ 507.104112][ C0] inet6_sendmsg+0x276/0x2e0 [ 507.108700][ C0] kernel_sendmsg+0x24a/0x440 [ 507.113373][ C0] sock_no_sendpage+0x235/0x300 [ 507.118222][ C0] sock_sendpage+0x1e1/0x2c0 [ 507.122809][ C0] pipe_to_sendpage+0x38c/0x4c0 [ 507.127658][ C0] __splice_from_pipe+0x565/0xf00 [ 507.132701][ C0] generic_splice_sendpage+0x1d5/0x2d0 [ 507.138162][ C0] direct_splice_actor+0x1fd/0x580 [ 507.144227][ C0] splice_direct_to_actor+0x6b2/0xf50 [ 507.149602][ C0] do_splice_direct+0x342/0x580 [ 507.154450][ C0] do_sendfile+0x101b/0x1d40 [ 507.159040][ C0] __se_compat_sys_sendfile+0x301/0x3c0 [ 507.164600][ C0] __ia32_compat_sys_sendfile+0x56/0x70 [ 507.170144][ C0] __do_fast_syscall_32+0x2aa/0x400 [ 507.175344][ C0] do_fast_syscall_32+0x6b/0xd0 [ 507.180193][ C0] do_SYSENTER_32+0x73/0x90 [ 507.189227][ C0] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 507.195545][ C0] [ 507.197862][ C0] Uninit was created at: [ 507.202106][ C0] kmsan_save_stack_with_flags+0x3c/0x90 [ 507.207739][ C0] kmsan_alloc_page+0xb9/0x180 [ 507.212503][ C0] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 507.218075][ C0] alloc_pages_current+0x672/0x990 [ 507.223182][ C0] push_pipe+0x605/0xb70 [ 507.227424][ C0] iov_iter_get_pages_alloc+0x18a9/0x21c0 [ 507.233140][ C0] do_splice_to+0x4fc/0x14f0 [ 507.237732][ C0] splice_direct_to_actor+0x45c/0xf50 [ 507.243103][ C0] do_splice_direct+0x342/0x580 [ 507.247949][ C0] do_sendfile+0x101b/0x1d40 [ 507.252536][ C0] __se_compat_sys_sendfile+0x301/0x3c0 [ 507.258077][ C0] __ia32_compat_sys_sendfile+0x56/0x70 [ 507.263623][ C0] __do_fast_syscall_32+0x2aa/0x400 [ 507.268816][ C0] do_fast_syscall_32+0x6b/0xd0 [ 507.273665][ C0] do_SYSENTER_32+0x73/0x90 [ 507.278165][ C0] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 507.284476][ C0] ===================================================== [ 507.291396][ C0] Disabling lock debugging due to kernel taint [ 507.297537][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 507.304127][ C0] CPU: 0 PID: 13505 Comm: syz-executor.3 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 507.314191][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.324240][ C0] Call Trace: [ 507.327547][ C0] [ 507.330406][ C0] dump_stack+0x1df/0x240 [ 507.334753][ C0] panic+0x3d5/0xc3e [ 507.338687][ C0] kmsan_report+0x1df/0x1e0 [ 507.343216][ C0] __msan_warning+0x58/0xa0 [ 507.347741][ C0] __skb_checksum_complete+0x37f/0x540 [ 507.353208][ C0] ? __skb_checksum+0x12a0/0x12a0 [ 507.358232][ C0] ? csum_partial_ext+0xa0/0xa0 [ 507.363093][ C0] nf_ip_checksum+0x53b/0x740 [ 507.367796][ C0] nf_nat_icmp_reply_translation+0x2ba/0x980 [ 507.373809][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 507.378935][ C0] nf_nat_ipv4_local_fn+0x215/0x830 [ 507.384153][ C0] ? nf_nat_ipv4_out+0x780/0x780 [ 507.389089][ C0] nf_hook_slow+0x16e/0x400 [ 507.393614][ C0] __ip_local_out+0x69b/0x800 [ 507.398308][ C0] ? __ip_local_out+0x800/0x800 [ 507.403167][ C0] ip_push_pending_frames+0x16f/0x460 [ 507.408558][ C0] icmp_push_reply+0x660/0x710 [ 507.413369][ C0] __icmp_send+0x23ca/0x3150 [ 507.418012][ C0] ? __udp4_lib_lookup+0x53f/0x5f0 [ 507.423153][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 507.428397][ C0] __udp4_lib_rcv+0x3773/0x4b80 [ 507.433296][ C0] udp_rcv+0x5c/0x70 [ 507.437196][ C0] ? udp_v4_early_demux+0x1ef0/0x1ef0 [ 507.442569][ C0] ip_protocol_deliver_rcu+0x619/0xbc0 [ 507.448044][ C0] ip_local_deliver+0x62a/0x7c0 [ 507.452912][ C0] ? ip_local_deliver+0x7c0/0x7c0 [ 507.457940][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 507.463574][ C0] ip_rcv+0x6cf/0x750 [ 507.467570][ C0] ? ip_rcv_core+0x12c0/0x12c0 [ 507.472334][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 507.477971][ C0] process_backlog+0xfb5/0x14e0 [ 507.482843][ C0] ? lapic_next_event+0x6e/0xa0 [ 507.487724][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 507.493019][ C0] net_rx_action+0x746/0x1aa0 [ 507.497727][ C0] ? net_tx_action+0xc40/0xc40 [ 507.502496][ C0] __do_softirq+0x311/0x83d [ 507.507017][ C0] asm_call_on_stack+0x12/0x20 [ 507.511774][ C0] [ 507.514715][ C0] do_softirq_own_stack+0x7c/0xa0 [ 507.520451][ C0] __local_bh_enable_ip+0x184/0x1d0 [ 507.525664][ C0] local_bh_enable+0x36/0x40 [ 507.530253][ C0] ip_finish_output2+0x1fee/0x24a0 [ 507.535370][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 507.541379][ C0] __ip_finish_output+0xaa7/0xd80 [ 507.546427][ C0] ip_finish_output+0x166/0x410 [ 507.556068][ C0] ip_output+0x593/0x680 [ 507.560339][ C0] ? ip_mc_finish_output+0x6c0/0x6c0 [ 507.565626][ C0] ? ip_finish_output+0x410/0x410 [ 507.570652][ C0] ip_send_skb+0x179/0x360 [ 507.575086][ C0] udp_send_skb+0x1046/0x18b0 [ 507.579794][ C0] udp_sendmsg+0x3bb5/0x4100 [ 507.584391][ C0] ? ip_do_fragment+0x3570/0x3570 [ 507.589433][ C0] ? update_stack_state+0x9a0/0xb40 [ 507.594687][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 507.599897][ C0] udpv6_sendmsg+0x1598/0x4940 [ 507.604674][ C0] ? is_module_text_address+0x4d/0x2a0 [ 507.610149][ C0] ? __kernel_text_address+0x171/0x2d0 [ 507.615634][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 507.620751][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 507.626563][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 507.632634][ C0] ? tomoyo_socket_sendmsg_permission+0x41c/0x4a0 [ 507.639054][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 507.644257][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 507.650068][ C0] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 507.656139][ C0] ? inet_send_prepare+0x92/0x600 [ 507.661165][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 507.666371][ C0] ? udpv6_rcv+0x70/0x70 [ 507.670616][ C0] ? udpv6_rcv+0x70/0x70 [ 507.674861][ C0] inet6_sendmsg+0x276/0x2e0 [ 507.679490][ C0] kernel_sendmsg+0x24a/0x440 [ 507.684205][ C0] sock_no_sendpage+0x235/0x300 [ 507.689079][ C0] ? sock_no_mmap+0x30/0x30 [ 507.693586][ C0] sock_sendpage+0x1e1/0x2c0 [ 507.698196][ C0] pipe_to_sendpage+0x38c/0x4c0 [ 507.703049][ C0] ? sock_fasync+0x250/0x250 [ 507.707663][ C0] __splice_from_pipe+0x565/0xf00 [ 507.712692][ C0] ? generic_splice_sendpage+0x2d0/0x2d0 [ 507.718363][ C0] generic_splice_sendpage+0x1d5/0x2d0 [ 507.723842][ C0] ? iter_file_splice_write+0x1800/0x1800 [ 507.729564][ C0] direct_splice_actor+0x1fd/0x580 [ 507.734689][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 507.739814][ C0] splice_direct_to_actor+0x6b2/0xf50 [ 507.745258][ C0] ? do_splice_direct+0x580/0x580 [ 507.750335][ C0] do_splice_direct+0x342/0x580 [ 507.755218][ C0] do_sendfile+0x101b/0x1d40 [ 507.759850][ C0] __se_compat_sys_sendfile+0x301/0x3c0 [ 507.765405][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 507.770603][ C0] ? __ia32_sys_sendfile64+0x70/0x70 [ 507.775910][ C0] __ia32_compat_sys_sendfile+0x56/0x70 [ 507.781463][ C0] __do_fast_syscall_32+0x2aa/0x400 [ 507.786676][ C0] do_fast_syscall_32+0x6b/0xd0 [ 507.791531][ C0] do_SYSENTER_32+0x73/0x90 [ 507.796044][ C0] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 507.802364][ C0] RIP: 0023:0xf7faa549 [ 507.806419][ C0] Code: Bad RIP value. [ 507.810478][ C0] RSP: 002b:00000000f5da50cc EFLAGS: 00000296 ORIG_RAX: 00000000000000bb [ 507.818884][ C0] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000004 [ 507.826879][ C0] RDX: 0000000000000000 RSI: 000000000000edc0 RDI: 0000000000000000 [ 507.834845][ C0] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 507.842813][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 507.850783][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 507.859264][ C0] ------------[ cut here ]------------ [ 507.864704][ C0] kernel BUG at mm/kmsan/kmsan.h:87! [ 507.869975][ C0] invalid opcode: 0000 [#1] SMP [ 507.874805][ C0] CPU: 0 PID: 13505 Comm: syz-executor.3 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 507.884882][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.894948][ C0] RIP: 0010:kmsan_internal_check_memory+0x3c0/0x3d0 [ 507.901519][ C0] Code: 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 0b 48 c7 c7 ea 03 8a 94 31 c0 e8 81 fe 44 ff 0f 0b 0f 0b 0f 0b 0f 0b e8 32 3f 8c 0c 0f 0b <0f> 0b 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 83 ff [ 507.921116][ C0] RSP: 0018:ffff9e9bc0002d38 EFLAGS: 00010046 [ 507.927158][ C0] RAX: 0000000000000002 RBX: 00000000056000c8 RCX: 00000000056000c8 [ 507.935108][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff9e9bc0002e14 [ 507.943752][ C0] RBP: ffff9e9bc0002de0 R08: 0000000000000000 R09: ffff93806fc28210 [ 507.951712][ C0] R10: 0000000000000000 R11: ffffffff8b602730 R12: 0000000000000000 [ 507.959660][ C0] R13: 0000000000000001 R14: 0000000000000002 R15: 0000000000000001 [ 507.967610][ C0] FS: 0000000000000000(0000) GS:ffff93806fc00000(0063) knlGS:00000000f5da5b40 [ 507.976514][ C0] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 507.983095][ C0] CR2: 0000000033721000 CR3: 0000000108ce2000 CR4: 00000000001406f0 [ 507.991046][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 507.998997][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 508.006949][ C0] Call Trace: [ 508.010217][ C0] [ 508.013106][ C0] kmsan_check_memory+0xd/0x10 [ 508.017970][ C0] iowrite8+0x99/0x2e0 [ 508.022033][ C0] pvpanic_panic_notify+0x99/0xc0 [ 508.027765][ C0] ? pvpanic_mmio_remove+0x60/0x60 [ 508.032857][ C0] atomic_notifier_call_chain+0x130/0x250 [ 508.038568][ C0] panic+0x468/0xc3e [ 508.042470][ C0] kmsan_report+0x1df/0x1e0 [ 508.046958][ C0] __msan_warning+0x58/0xa0 [ 508.051445][ C0] __skb_checksum_complete+0x37f/0x540 [ 508.056899][ C0] ? __skb_checksum+0x12a0/0x12a0 [ 508.061908][ C0] ? csum_partial_ext+0xa0/0xa0 [ 508.066765][ C0] nf_ip_checksum+0x53b/0x740 [ 508.071464][ C0] nf_nat_icmp_reply_translation+0x2ba/0x980 [ 508.077434][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 508.082547][ C0] nf_nat_ipv4_local_fn+0x215/0x830 [ 508.087739][ C0] ? nf_nat_ipv4_out+0x780/0x780 [ 508.092673][ C0] nf_hook_slow+0x16e/0x400 [ 508.097170][ C0] __ip_local_out+0x69b/0x800 [ 508.101834][ C0] ? __ip_local_out+0x800/0x800 [ 508.106684][ C0] ip_push_pending_frames+0x16f/0x460 [ 508.112047][ C0] icmp_push_reply+0x660/0x710 [ 508.116802][ C0] __icmp_send+0x23ca/0x3150 [ 508.121401][ C0] ? __udp4_lib_lookup+0x53f/0x5f0 [ 508.127216][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 508.132423][ C0] __udp4_lib_rcv+0x3773/0x4b80 [ 508.137303][ C0] udp_rcv+0x5c/0x70 [ 508.141180][ C0] ? udp_v4_early_demux+0x1ef0/0x1ef0 [ 508.146547][ C0] ip_protocol_deliver_rcu+0x619/0xbc0 [ 508.151996][ C0] ip_local_deliver+0x62a/0x7c0 [ 508.156885][ C0] ? ip_local_deliver+0x7c0/0x7c0 [ 508.161886][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 508.167497][ C0] ip_rcv+0x6cf/0x750 [ 508.171469][ C0] ? ip_rcv_core+0x12c0/0x12c0 [ 508.176218][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 508.181856][ C0] process_backlog+0xfb5/0x14e0 [ 508.186707][ C0] ? lapic_next_event+0x6e/0xa0 [ 508.191585][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 508.196881][ C0] net_rx_action+0x746/0x1aa0 [ 508.201574][ C0] ? net_tx_action+0xc40/0xc40 [ 508.206318][ C0] __do_softirq+0x311/0x83d [ 508.210811][ C0] asm_call_on_stack+0x12/0x20 [ 508.215549][ C0] [ 508.218488][ C0] do_softirq_own_stack+0x7c/0xa0 [ 508.223511][ C0] __local_bh_enable_ip+0x184/0x1d0 [ 508.228694][ C0] local_bh_enable+0x36/0x40 [ 508.233263][ C0] ip_finish_output2+0x1fee/0x24a0 [ 508.238357][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 508.244337][ C0] __ip_finish_output+0xaa7/0xd80 [ 508.249353][ C0] ip_finish_output+0x166/0x410 [ 508.254207][ C0] ip_output+0x593/0x680 [ 508.258457][ C0] ? ip_mc_finish_output+0x6c0/0x6c0 [ 508.263725][ C0] ? ip_finish_output+0x410/0x410 [ 508.268744][ C0] ip_send_skb+0x179/0x360 [ 508.273146][ C0] udp_send_skb+0x1046/0x18b0 [ 508.277838][ C0] udp_sendmsg+0x3bb5/0x4100 [ 508.282427][ C0] ? ip_do_fragment+0x3570/0x3570 [ 508.287458][ C0] ? update_stack_state+0x9a0/0xb40 [ 508.292668][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 508.297851][ C0] udpv6_sendmsg+0x1598/0x4940 [ 508.302613][ C0] ? is_module_text_address+0x4d/0x2a0 [ 508.308156][ C0] ? __kernel_text_address+0x171/0x2d0 [ 508.313609][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 508.318701][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 508.324576][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 508.330712][ C0] ? tomoyo_socket_sendmsg_permission+0x41c/0x4a0 [ 508.337109][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 508.342303][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 508.348105][ C0] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 508.354152][ C0] ? inet_send_prepare+0x92/0x600 [ 508.359157][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 508.364353][ C0] ? udpv6_rcv+0x70/0x70 [ 508.368572][ C0] ? udpv6_rcv+0x70/0x70 [ 508.372793][ C0] inet6_sendmsg+0x276/0x2e0 [ 508.377372][ C0] kernel_sendmsg+0x24a/0x440 [ 508.382038][ C0] sock_no_sendpage+0x235/0x300 [ 508.386883][ C0] ? sock_no_mmap+0x30/0x30 [ 508.391381][ C0] sock_sendpage+0x1e1/0x2c0 [ 508.396010][ C0] pipe_to_sendpage+0x38c/0x4c0 [ 508.400860][ C0] ? sock_fasync+0x250/0x250 [ 508.405493][ C0] __splice_from_pipe+0x565/0xf00 [ 508.410498][ C0] ? generic_splice_sendpage+0x2d0/0x2d0 [ 508.416129][ C0] generic_splice_sendpage+0x1d5/0x2d0 [ 508.421592][ C0] ? iter_file_splice_write+0x1800/0x1800 [ 508.427306][ C0] direct_splice_actor+0x1fd/0x580 [ 508.432406][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 508.437524][ C0] splice_direct_to_actor+0x6b2/0xf50 [ 508.442876][ C0] ? do_splice_direct+0x580/0x580 [ 508.447910][ C0] do_splice_direct+0x342/0x580 [ 508.452758][ C0] do_sendfile+0x101b/0x1d40 [ 508.457353][ C0] __se_compat_sys_sendfile+0x301/0x3c0 [ 508.462886][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 508.468062][ C0] ? __ia32_sys_sendfile64+0x70/0x70 [ 508.473349][ C0] __ia32_compat_sys_sendfile+0x56/0x70 [ 508.478895][ C0] __do_fast_syscall_32+0x2aa/0x400 [ 508.484111][ C0] do_fast_syscall_32+0x6b/0xd0 [ 508.488944][ C0] do_SYSENTER_32+0x73/0x90 [ 508.493435][ C0] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 508.499738][ C0] RIP: 0023:0xf7faa549 [ 508.503777][ C0] Code: Bad RIP value. [ 508.507818][ C0] RSP: 002b:00000000f5da50cc EFLAGS: 00000296 ORIG_RAX: 00000000000000bb [ 508.516202][ C0] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000004 [ 508.524164][ C0] RDX: 0000000000000000 RSI: 000000000000edc0 RDI: 0000000000000000 [ 508.532112][ C0] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 508.540060][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 508.548020][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 508.555994][ C0] Modules linked in: [ 508.559876][ C0] ---[ end trace aae216edefcedecc ]--- [ 508.565333][ C0] RIP: 0010:kmsan_internal_check_memory+0x3c0/0x3d0 [ 508.571902][ C0] Code: 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 0b 48 c7 c7 ea 03 8a 94 31 c0 e8 81 fe 44 ff 0f 0b 0f 0b 0f 0b 0f 0b e8 32 3f 8c 0c 0f 0b <0f> 0b 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 83 ff [ 508.591529][ C0] RSP: 0018:ffff9e9bc0002d38 EFLAGS: 00010046 [ 508.597572][ C0] RAX: 0000000000000002 RBX: 00000000056000c8 RCX: 00000000056000c8 [ 508.605521][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff9e9bc0002e14 [ 508.613467][ C0] RBP: ffff9e9bc0002de0 R08: 0000000000000000 R09: ffff93806fc28210 [ 508.621421][ C0] R10: 0000000000000000 R11: ffffffff8b602730 R12: 0000000000000000 [ 508.629383][ C0] R13: 0000000000000001 R14: 0000000000000002 R15: 0000000000000001 [ 508.637333][ C0] FS: 0000000000000000(0000) GS:ffff93806fc00000(0063) knlGS:00000000f5da5b40 [ 508.646252][ C0] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 508.652811][ C0] CR2: 0000000033721000 CR3: 0000000108ce2000 CR4: 00000000001406f0 [ 508.660770][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 508.668727][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 508.676675][ C0] Kernel panic - not syncing: Fatal exception in interrupt [ 508.684481][ C0] Kernel Offset: 0x5200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 508.696004][ C0] Rebooting in 86400 seconds..